What do you mean by prototype, Computer Engineering

Assignment Help:

Q. What do you mean by Prototype?

A prototyping approach lay emphasis on the construction model of a system. Designing and building a scaled-down though functional version of a desired system is the process called as Prototyping. A prototype is a working system which is developed to test assumptions and ideas about the new system. It comprises working software which accepts input, performs calculations, produces printed or displayed information or performs other meaningful activities. It's the first version or iteration of an information system which implies an original model. Customer evaluates this model. This can be efficiently done only if data are real and situations are live. Changes are expected as system is used. This technique is useful when requirements aren't well defined. A prototype is typically a test model. It's an interactive process. It may begin with only new functions and be expanded to comprise others which are identified later. Steps of Prototyping process are:

  • Identify user's known information requirements and features required in the system.
  • Develop a working prototype.
  • Revise prototype based on feedback received from customer
  • Repeat these steps as required to achieve a satisfactory system.

Actual development of a working prototype is responsibility of a systems analyst. The difference between an actual information system and a prototype model is that a prototype won't include the error checking, input data validation, security and processing completeness of a finished application. It won't provide user help as in the final system.

However sometimes prototype can evolve into the product to be built. Prototype can be easily developed with tools of fourth generation languages (4GL's) and with help of Computer Aided Software Engineering (CASE) tools. Prototyping approach is a form of rapid application development (RAD).


Related Discussions:- What do you mean by prototype

Risc architecture - computer architecture, RISC  architecture - computer a...

RISC  architecture - computer architecture: What is reduced regarding it? The answer of this question is that to make all instructions the equal length the number of bits that

What is the benefit of using linq on dataset, The main aim of using LINQ to...

The main aim of using LINQ to Dataset is to run strongly typed queries on Dataset. Assume we want to combine the results from two Datasets, or we need to take a distinct value f

Standard typewriter for information distribution, Standard typewriter : Yo...

Standard typewriter : You must have seen this manually operated machine. Standard typewriters of various makes such as Remington, Fact, Godrej, etc., are available in the market.

Multi-layer artificial neural networks, Multi-Layer Artificial Neural Netwo...

Multi-Layer Artificial Neural Networks : However we can now look at more sophisticated ANNs that are known as multi-layer artificial neural networks it means they have hidden

Algebraic method for simplification of boolean expressions, Define Algebrai...

Define Algebraic method for Simplification of the Boolean Expressions This method is depend on the by knowledge of the Boolean algebra. Expression can be making simpler by usin

Define the term- verification, Define the term- Verification It is a wa...

Define the term- Verification It is a way of preventing errors when data is copied from one medium to another (for instance from paper to disk/CD or from memory to DVD, etc.).

Illustrates about metal fix, Illustrates about Metal Fix. A Metal Fix i...

Illustrates about Metal Fix. A Metal Fix implies that only the upper metal interconnects layers are influenced. Connections may be made or broken, but new cells may not be adde

Explain the importance of computer architecture, Explain the importance of ...

Explain the importance of computer architecture Studying the architecture implies working on machine language programs. However, this isn't practical when we design a computer

Determine about the virtual private networks, Virtual Private Networks (VPN...

Virtual Private Networks (VPN) In order to encrypt/decrypt all the communication network traffic that passes through the Internet or Intranet, a VPN uses software or hardware.

What is macro-expansion, What is macro-expansion? Macro calls lead to m...

What is macro-expansion? Macro calls lead to macro expansion. Throughout macro expansion, the macro call statement is replaced through a sequence of assembly statements.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd