Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Unit 1 Programming

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

INTERNATIONAL SCHOOL OF

MANAGEMENT AND TECHNOLOGY


KATHMANDU, NEPAL

Qualification Unit Number & Title


BTEC HND IN COMPUTING D/615/1618 - Unit 1: Programming
Student Name Assessor Name
Anoj Shrestha
Assignment Launch Date Due Date-Part 1 Due Date-Part 2 Completion Date
03/29/2021 04/28/2021 05/29/2021
Session/Year 01/2019 Assignment Number 1/1
Assignment Title Inventroy System

Assignment submission format

Each student has to submit their assignment as guided in the assignment brief. The students are
guided what sort of information is to produce to meet the criteria targeted. You are required to
make use of headings, paragraphs and subsections as appropriate, and all work must be
supported with research and referenced using the APA referencing system.

Learning outcomes covered

 LO1 Define basic algorithms to carry out an operation and outline the process of
programming an application
 LO2 Explain the characteristics of procedural, object oriented and event driven
programming, conduct an analysis of a suitable Integrated Development Environment
(IDE)
 LO3: Implement basic algorithms in code using an IDE
 LO4: Determine the debugging process and explain the importance of a coding standard

1|P ag e
Scenario 1

The necessity of an effective inventory management system is being increasingly realized in


the industrial and nonindustrial organization both in Nepal and abroad. This realization has
come about because of the increasing complexity of the task of managers and administrators.
Due to an increase in purchase and sales, the store owners are finding it difficult to manage a
large number of transactions which are causing discrepancies in data.

The store owner requires an application to keep the records of the products on stock based on
purchase and sales. When Stock owner purchase products from the customer, the stock
should be increased, while selling products to customers stock should be decreased.

The system should have at least three main menus which are Setup, Transaction, and
Reports. Under the main menu following sub-menu should contain.

Setup Transaction Reports

 Category  Purchase  Purchase Report


 Unit  Sales  Sales Report
 Product
 Customer
 Supplier

All students are encouraged to enhance or add other related forms you think required in
your system. One Id column, Primary Key with Identity Property should be assigned in
each table.

The database should include at least the following tables:


Table Name
Columns
Category CategoryId, CategoryName, Remarks, etc.
Unit UnitId, UnitName, Alias, Remarks, etc.
Product ProductId, ProductName, UnitId,Rate,Quantity etc.
CustSupplier CustSupplierId,Name,Type,Email,Phone,Mobile,Address, etc.
TransactionMasterId,TransactionDate,Type,CustSupplierId,
Transaction Master
GrandTotal,Vat,Discount,etc
TransactionDetailId,TransactionMasterId,ProductId,Qty,
Transaction Details
Rate,Total

2|P ag e
User UserId,UserName,Password,Email,Phone

The system should be implemented following features.


 User details with username and password (password should be stored in
encrypted format).
 Foreign key, Unique key and primary key should be maintained properly in
required tables.
 Each form should be validated properly before crud operation.
 Confirmation message, error message, warning message and success message
should be proper and meaningful.

Part 1

Assignment Task

Based on the context above, complete the followings:


Section A
Present a mini research project both in the form of a report and as a presentation. You will
need to explain what an algorithm is, with examples of their use, comparing their efficiency
against brute forcing, and how it will relate to the application development process, down to
the implementation in a suitable language. Research could be conducted on your choice of
algorithms, including sorting and searching data or encryption/decryption,
compression/decompression.

Note: Prepare a presentation for using Microsoft® PowerPoint® style presentation to be


presented to your colleagues.
Follow the guidelines below to design your presentation.
 Font style Arial or Times New Roman.
 Font size: Main text should be minimum font size 16 -24 (readable from 2 meters
away). Headings 30-42. Sub-headings can be smaller. Avoid writing all in capital
letters and use same font throughout the presentation (Margins, fonts, font size,
and colors should be consistent)
 Use same background on each slide. Label images and graphs. Use bulleted points
and avoid writing long sentences. And provide citations and references.

3|P ag e
Section B
The research and development team you work with have been tasked with further
investigation into how best to build more efficient, secure software. You have been asked to
look into programming paradigms and the advantages and disadvantages of using different
programming language approaches.

 You will need to create a report covering findings from research into the
characteristics of different programming paradigms – procedural, object-orientated
and event-driven programming.
 Your report should include an explanation of each paradigm, an analysis of suitable
IDEs, and an evaluation of source code that would be generated for an application.

Part 2

Assignment Task
The submission is in the form of five documents/files:

1. Stage 1 – Development Document


2. Stage 2 – Report (IDE Evaluation)
3. Stage 3 – Report (Debugging Evaluation)
4. Stage 4 – Report (Evaluation Report) including fully commented source code
5. An installable and executable version of your application

You are required to make use of appropriate structure, including headings, paragraphs,
subsections and illustrations as appropriate, and all work must be supported with research and
referenced using the APA referencing system.

As part of the application process, they senior management team want to see that you can
implement algorithms using an IDE as required.

You are asked to create a fully working, secure application that has been developed using an
IDE and adhere to coding standards.

The document portfolio should include:


1. Evidence of how the IDE was used to manage the development of your code.
2. An evaluation of developing applications using an IDE versus developing an application
without using an IDE.

4|P ag e
3. An evaluation of the debugging process in the IDE used and how it helped with
development.
4. An evaluation of coding standards and the benefits to organizations of using them.

The working application produced must also be demonstrated.

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1: Define basic algorithms to carry out an operation and


outline the process of programming an application LO1
D1 Examine the
implementation of an
P1 Provide the definition of M1 Determine the steps taken
algorithm in a suitable
what an algorithm is and from writing code to execution.
language. Evaluate the
outline the process in building
relationship between the
an application.
written algorithm and the
code variant.

LO2 Explain the characteristics of procedural, object oriented LO2


and event driven programming, conduct an analysis of a D2 Critically evaluates
suitable Integrated Development Environment (IDE) the source code of an
application which
P2 Give explanations of what M2 Analyze the common
implements the
procedural, object-oriented and features that a developer has
programming paradigms,
event driven paradigms are; access to in an IDE.
in terms of code structure
their characteristics and the
and characteristics.
relationship between them

LO3: Implement basic algorithms in code using an IDE LO3


D3 Evaluate the use of an
P3 Write a program that M3 Use the IDE to manage the
IDE for development of
implements and algorithm development process of the
applications contrasted
using an IDE. program.
with not using an IDE.

LO4: Determine the debugging process and explain the LO4


importance of a coding standard D4 Critically evaluate

5|P ag e
why a coding standard is
P4 Explain the debugging M4 Evaluate how the
necessary in a team as
process and explain the debugging process can be used
well as for the individual.
debugging facilities available to help develop more secure,
in an IDE. robust applications.
P5 Outline the coding standard
you have used in your code.

Grades Achieved

Note: Refer the unit details provided in your handbook when responding all the tasks above.
Make sure that you have understood and developed your response that matches the highlighted
key words in each task.

Plagiarism Notice

You are remined that there exist Academic Misconduct Policy and Regulation concerning
Cheating and Plagiarism.

Extracts from the Policy:

Section 3.4.1: Allowing others to do assignments / Copying others assignment is an offence


Section 3.4.2: Plagiarism, using the views, opinion or insights / paraphrasing of another person’s
original phraseology without acknowledgement
Requirements

 It should be the student’s own work – Plagiarism is unacceptable.


 Clarity of expression and structure are important features.
 Your work should be submitted as a well presented, word-processed document with
headers and footers, and headings and subheadings, both in hard and soft copies.
 You are expected to undertake research on this subject using books from the Library, and
resources available on the Internet.
 Any sources of information should be listed as references at the end of your document
and these sources should be referenced within the text of your document using APA
Referencing style
 Your report should be illustrated with screen-prints, images, tables, charts and/or
graphics.

6|P ag e
 All assignments must be typed in Times New Roman, font size 12, 1.5 spacing.

The center policy is that you must submit your work within due date to achieve “Merit”
and “Distinction”. Late submission automatically eliminates your chance of achieving
“Merit and Distinction”. Also, 80% attendance is required to validate this assignment.

I declare that all the work submitted for this assignment is my own work and I understand that if
any part of the work submitted for this assignment is found to be plagiarised, none of the work
submitted will be allowed to count towards the assessment of the assignment.

Assignment Prepared By Signature Date

Anoj Kumar Shrestha March 10, 2021

Brief Checked By Signature Date

Dhruba Babu Joshi March 15, 2021

7|P ag e

You might also like