What do you mean by prototype, Computer Engineering

Assignment Help:

Q. What do you mean by Prototype?

A prototyping approach lay emphasis on the construction model of a system. Designing and building a scaled-down though functional version of a desired system is the process called as Prototyping. A prototype is a working system which is developed to test assumptions and ideas about the new system. It comprises working software which accepts input, performs calculations, produces printed or displayed information or performs other meaningful activities. It's the first version or iteration of an information system which implies an original model. Customer evaluates this model. This can be efficiently done only if data are real and situations are live. Changes are expected as system is used. This technique is useful when requirements aren't well defined. A prototype is typically a test model. It's an interactive process. It may begin with only new functions and be expanded to comprise others which are identified later. Steps of Prototyping process are:

  • Identify user's known information requirements and features required in the system.
  • Develop a working prototype.
  • Revise prototype based on feedback received from customer
  • Repeat these steps as required to achieve a satisfactory system.

Actual development of a working prototype is responsibility of a systems analyst. The difference between an actual information system and a prototype model is that a prototype won't include the error checking, input data validation, security and processing completeness of a finished application. It won't provide user help as in the final system.

However sometimes prototype can evolve into the product to be built. Prototype can be easily developed with tools of fourth generation languages (4GL's) and with help of Computer Aided Software Engineering (CASE) tools. Prototyping approach is a form of rapid application development (RAD).


Related Discussions:- What do you mean by prototype

Avoiding local minima of multi-layered networks, Avoiding Local Minima of m...

Avoiding Local Minima of multi-layered networks-Artificial intelligence : The error rate of multi-layered networks over a training set could be calculated as the number of mis

Execution of a program in cpu, Execution of a program in CPU is completed e...

Execution of a program in CPU is completed employing different set of registers and their individual circuitry. As CPU registers are used for execution of interrupt service routine

4 variable k-maps, 4-variable K-maps have 16 squares which arearranged in 4...

4-variable K-maps have 16 squares which arearranged in 4 columns and 4 rows.  Columns and rows are labeled with 2 variables. The rows are arranged so that C or D ch

Hard disk architecture, Hard disk Architecture: A hard disk drive ...

Hard disk Architecture: A hard disk drive having the platters and motor hub removed indicating the copper colored stator coils surrounding a bearing at the cen

What is home banking, Home Banking: E-commerce is used in Home Banking ...

Home Banking: E-commerce is used in Home Banking as single call or single click. Online banking (Internet banking) is a term used for performing transactions, payments etc. ove

Insert images in dreamweaver, Q. Insert images in Dreamweaver? You will...

Q. Insert images in Dreamweaver? You will learn two methods to insert images in Dreamweaver-using Dreamweaver's main menu and using Objects panel. 1. Click anywhere in the l

How to access the disk data, Q. How to Access the Disk Data? Disks oper...

Q. How to Access the Disk Data? Disks operate is semi-random mode of operation and generally referenced block wise. The data access time on a disk comprises two major component

When should we stop testing, When should you stop testing? It is quite ...

When should you stop testing? It is quite complex to determine as many modern software applications are so complex and run in like an interdependent environment that complete t

What are the different database integrities, What are the different databas...

What are the different database integrities? Semantic Integrity. Relational Integrity. Primary Key Integrity. Value Set Integrity. Foreign Key integrity and

Define a protocol when an error recovery develop for a link, Suppose you ha...

Suppose you have to develop an error recovery protocol for a link that is unreliable and delay sensitive, which of the following protocol would you choose? (i) Stop & wait.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd