What do you mean by prototype, Computer Engineering

Assignment Help:

Q. What do you mean by Prototype?

A prototyping approach lay emphasis on the construction model of a system. Designing and building a scaled-down though functional version of a desired system is the process called as Prototyping. A prototype is a working system which is developed to test assumptions and ideas about the new system. It comprises working software which accepts input, performs calculations, produces printed or displayed information or performs other meaningful activities. It's the first version or iteration of an information system which implies an original model. Customer evaluates this model. This can be efficiently done only if data are real and situations are live. Changes are expected as system is used. This technique is useful when requirements aren't well defined. A prototype is typically a test model. It's an interactive process. It may begin with only new functions and be expanded to comprise others which are identified later. Steps of Prototyping process are:

  • Identify user's known information requirements and features required in the system.
  • Develop a working prototype.
  • Revise prototype based on feedback received from customer
  • Repeat these steps as required to achieve a satisfactory system.

Actual development of a working prototype is responsibility of a systems analyst. The difference between an actual information system and a prototype model is that a prototype won't include the error checking, input data validation, security and processing completeness of a finished application. It won't provide user help as in the final system.

However sometimes prototype can evolve into the product to be built. Prototype can be easily developed with tools of fourth generation languages (4GL's) and with help of Computer Aided Software Engineering (CASE) tools. Prototyping approach is a form of rapid application development (RAD).


Related Discussions:- What do you mean by prototype

Hard-disk acquisition, Problem (a) Forensic methodology consists of t...

Problem (a) Forensic methodology consists of three phases. Briefly explian these three phases. (b) Sometimes it's best not to perform hard-disk acquisition. Provide two

Copy machine problem, We are trying to figure out how many copy machines we...

We are trying to figure out how many copy machines we should install in the basement of Stranahan Hall.  Copy machines should be available 24/7.  Students may walk up at any time o

How can i delete a file, The Standard C Library function is removing. (This...

The Standard C Library function is removing. (This is thus one of the few questions in this section for which the answer is not ''It's system-dependent.'') On older, pre-ANSI Unix

Components of flash, A piece of art can be looked at as having 3 main compo...

A piece of art can be looked at as having 3 main components, the subject, the composition and the content. Subject The subject of an artwork is, in simple terms, the object

Illustrates several names of popular internet browsers, Illustrates several...

Illustrates several names of popular internet browsers? Popular Internet Browsers are: Internet Explorer, Netscape Navigator and Mosaic, Google chrome and Mozilla and Opera.

Sdr, advantages of sdr

advantages of sdr

3 sets of input data, Prepare at least 3 sets of input data (Test data) alo...

Prepare at least 3 sets of input data (Test data) along with expected output for testing your program.

Segment combinations, Segment Combinations In 8086 assembler provides a...

Segment Combinations In 8086 assembler provides a means for combining segments declared in various modules. Some typical combine types are: 1.   PUBLIC: This combine directi

What is a heap dump, Thread Dump: When we trigger a thread dump on an appli...

Thread Dump: When we trigger a thread dump on an application server, all active thread informations will be deserted into file which is called as thread dump. Here, we can get info

What are program-invisible registers, What are program-invisible registers?...

What are program-invisible registers? Ans: the local and global descriptor tables are found in the memory system. To access and specify the address of these tables, program inv

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd