Writing software application is to determine requirements

Assignment Help Basic Computer Science
Reference no: EM132421378

The first step in writing a software application is to determine the requirements. There is no value in writing a program that does not address the needs of the client. Requirements can be gathered in many ways, but ultimately, the requirements serve to document what the application should and should not do. After the requirements are written, the application design can be prepared, followed by the actual coding. For this project, you will gain some practice in the design phase of software development by designing a program that will meet a given set of requirements.

In this assignment you will develop a console program that simulates a restaurant menu. The project instructions are as follows:

Program Requirements:

Each item on the menu must have a different price.

Your menu must define at least 10 different items.

Program Requirements:

1. Display the menu to the user.

2. Allow the user to select an item from the menu. (Record the selection in a variable.)

3. Once the user has selected an item, ask them how many they want (quantity). (Record the quantity in a variable.)

Calculate the total. (Sales tax is not included in this exercise.)

Ask the user to enter the amount of their payment. (Record this amount in a variable.)

Subtract the order total from the payment amount and present any remainder on screen as the customer's "change".

Remind the program operator to thank the customer for their patronage.

4. Remember to test your program fully to ensure that all functions operate correctly.

Documentation Requirements:

Create a document in Word and add the following:

- Title page

Course number and name

Project name

Student name

Date

- List the data items that must be stored and used by the program. Each data item should be given a name for reference. Create a diagram that illustrates where this data comes from (such as "selected by the user," "entered by the user," "item name from menu," "price from menu," etc.) and how it is handled by your program (what happens to that data).

- List the decisions the program must make. References to the data items in the previous step should be used where appropriate.

- Describe the flow of operation of the program so that a potential user can understand how it works. All key activities should be included, and references to the data items and decisions listed in the previous steps should be used.

Reference no: EM132421378

Questions Cloud

What is the purpose of HTTPS : What protocols comprise TLS? What is the difference between a TLS connection and a TLS session? What is the purpose of HTTPS?
Microsoft operating systems-standard life cycle model : Microsoft, after 14 years, ended support of Windows XP. Shortly after Microsoft introduced Windows 10. It falls right into a very standard Life Cycle mode
Why information security is important in healthcare : Determine why information security is so important in healthcare by analyzing at least two different types of safeguards for data
Single greatest physical threat to information systems : What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism?
Writing software application is to determine requirements : The first step in writing software application is to determine requirements. There is no value in writing a program that does not address the needs of client.
Identify the internal and external processes used by auditor : Organizations contract or hire individuals with specific skills to conduct internal audits. Identify the internal and external processes used by auditors
Gail industries case study : you will continue the Gail Industries Case Study. As the IT manager, you are working on the audit required for the SCOPE account.
Locate current news story in which web security issues : Locate a current news story in which web security issues were exploited in the form of either an attack or natural disaster.
Explanation of which web security threats are prevalent : Explanation of which web security threats are prevalent, hazards they present and how these threats are exploiting holes in current security countermeasures

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd