Stepwise refinement of the program, Computer Engineering

Assignment Help:

What do you understand by stepwise refinement of the program?

The method of "Stepwise refinement" means to take an object and move it from a general perspective to a exact level of detail and this cannot be completed in one jump but in steps. The number of steps required to decompose an object into sufficient detail is in the end based on the inherent nature of the object.  "Stepwise refinement" of program shows a "divide and conquer" approach to design. In other words, break a complex program into smaller, more manageable modules that can be reviewed and inspected before moving to the next level of feature. Step-wise refinement is a powerful paradigm for making a complex program from a simple program by adding features incrementally.   

 


Related Discussions:- Stepwise refinement of the program

Explain disk cartridges, Q. Explain Disk Cartridges ? Disk Cartridges:...

Q. Explain Disk Cartridges ? Disk Cartridges: Removable disk cartridges are an option to hard disk units as a form of secondary storage. Cartridge generally comprises one or

State about sixth generation electronic computers, Sixth Generation (1990 -...

Sixth Generation (1990 - ) This  generation  begun  with  many  gains  in  parallel  computing,  both  in  hardware area and in improved understanding of how to build up algori

A subroutine can be terminated unconditionally using exit, A subroutine can...

A subroutine can be terminated unconditionally using EXIT. True.

Assembler directives, Assembler directives: An assembler directive is ...

Assembler directives: An assembler directive is a statement to give direction to the assembler to perform the task of assembly process. Assembler directives control organizati

#title.sequential circuit, design modulo 12 up synchronous counter using t ...

design modulo 12 up synchronous counter using t flip flop

How many types of keys used to encrypt and decrypt data, How many types of ...

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

Number system, Number systems   Consider a decimal number:         ...

Number systems   Consider a decimal number:               7654.32   Short hand for:            7 * 103 + 6*102 + 5* 101 + 4*100 + 3*10 -1  + 2*10 -2   Likewise

Explain level of a node, Level of a node The root is at level zero and ...

Level of a node The root is at level zero and the level of the node is 1 more than the level of its parent

Which method is used for resolving data dependency, Which method is used fo...

Which method is used for resolving data dependency conflict by the compiler itself?  (A) Delayed load.   (B) operand forwarding.   (C) Pre fetch target instruction.  (D) loo

What is the principle of locality, What is "the principle of locality"? ...

What is "the principle of locality"? It's the nature of the processes that they refer only to the small subset of the total data space of the process. I.e. the process frequ

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd