Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Week6_Test Plan Instructions: The Test Plan for each project includes the Pseudocode, Flowchart, Goals and Objectives, Functional Requirements, and Test Matrix including Actual Output column. Below t

Week6_Test Plan

Instructions:

The Test Plan for each project includes the Pseudocode, Flowchart, Goals and Objectives, Functional Requirements, and Test Matrix including Actual Output column.  Below the table are screenshots verifying the actual output for each case.

Week 6 Notes – Methods/Functions

Let us recall our Week 5 Notes:   We were using Loops, which we may use again each week.

For Week 5, we have all 4 usual tasks, including our Week 5 Projects 1 & 6 from the text.

For Week 6, we again have 4 graded items due this week:

(1) Week 6 Discussion, (2) Week 6 Projects 4 & 5 and quizzes from text, (3) Test Plan for each project

Our Test Plan has 5 parts, in order:  (1) Pseudocode, (2) Flowchart, (3) Goals & Objectives, (4) Functional Requirements, the (5) Test Matrix/table (simplified), and Output (screenshots, under your table, verifying  your Actual Result).   Please make it clear that all 5 tasks are covered for each of your projects.

Our Tasks this Week

You may have worked with functions before.  We call these “methods” in Java. 

Discussion:  We show examples of methods.

Quizzes:  As usual, just let me know if you seem to have questionable grading, for your quizzes or for your projects.

Test Plan:   Refers to Projects 4 and 5 in Chapter 6.  See above for details for 5 tasks.

Project 4 (Exercise 06_25)

Given user input of milliseconds, output the hours: minutes: seconds equivalent.  Create the method, called by main, to calculate this.   See instructions.

Sample run: 

Enter time in milliseconds: 555550000154:19:10

We may complete the method with something like this:

    // Compute the current minute in the hour

    int minutes = (int)(totalMinutes % 60);

    // Computer the current hours here

    return hours + “:” + minutes + “:” + seconds; // at end of method

Project 5 (Exercise 06_37)

Given user input of an integer and the desired length with leading 0’s, write a method to create the String.   This method is called from main.   See instructions.

Sample run:

Enter an Integer: 34Enter the width: 5The formatted number is 00034

You can imagine using a loop in the method, and the String length function (len) can be useful.  In the sample run above, the length (len) of the integer 34 is 2.  If the integer were 340, the length would be 3, and we would only need to add two leading 0’s for output of width 5  —  00340.

EXAMPLE:   Value-Returning Method

Our textbook prefers the first means of calling the method, which is inside the println statement.

Here is the method, often written below the main method, inside the class:

public static double convertMilesToKilometers(double miles) { // miles is a parameter     return miles * 0.60934;   }

Calling the method: 

Then inside main, we have two ways to call the convertMilesToMiles method (or any nonvoid method):

First,  we can call the method from inside a print or println statement. Preferred by Revel text.

System.out.print(“\n Enter distance in miles: “);double miles = scandouble.nextDouble();System.out.println(” ” + miles + ” miles = ” + convertMilesToKilometers(miles) + ” kilometers”);  

Second way to call the non-void method from inside main:

     double distanceInKilometers = convertMilesToKilometers(miles);  // calls the method

NOTE that when using this way to call the method, we needed to receive the answer returned from that method.   We used Assignment Statement distanceInKilometers = to do that. 

Flowcharting Example for Main and another Method  — see new Announcement.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

In Units V, VI, and VII, you learned about the components of a computer, how a computer works, the internet, networks and network communications, cloud computing, web development, digital identity, so

In Units V, VI, and VII, you learned about the components of a computer, how a computer works, the internet, networks and network communications, cloud computing, web development, digital identity, social media, e-commerce, ethical behavior, databases, and explored two Microsoft Office applications, PowerPoint and Access.  In this assignment, you will

In the previous assignment, the annotated bibliography, you collected 15 – 20 references. Now, you are to craft an analytical research paper. Using the same themes assigned for the previous assignment

In the previous assignment, the annotated bibliography, you collected 15 – 20 references. Now, you are to craft an analytical research paper. Using the same themes assigned for the previous assignment.  GROUP 1: Context-Aware Computing  Prepare a ten (10) page research paper. In the paper, you are to cover the

This week, you will submit the second project, the Desktop Migration Proposal. Using the requirements analysis your manager provided and the Internet research you conducted, submit your recommendation

This week, you will submit the second project, the Desktop Migration Proposal. Using the requirements analysis your manager provided and the Internet research you conducted, submit your recommendation to the assignment folder. As you are writing your recommendation, ensure your analysis and recommendations align with your manager’s priorities and concerns.

In Units I, II, and III, you learned about the history of computers, application and system software, blockchain, cryptocurrency, computer ethics, and explored two Microsoft Office applications, Word

In Units I, II, and III, you learned about the history of computers, application and system software, blockchain, cryptocurrency, computer ethics, and explored two Microsoft Office applications, Word and Excel.  In this assignment you will demonstrate what you have learned in these three units. This assignment will have five parts. 

Research and brainstorm three (3) proposals for a mobile computing solution. Write up a half-page (double-spaced, approx. 250 words) description of each mobile computing solution proposal. Provide an

Research and brainstorm three (3) proposals for a mobile computing solution.  Write up a half-page (double-spaced, approx. 250 words) description of each mobile computing solution proposal. Provide answers to the following questions: 1) What is the 1 sentence summary of the mobile computing solution? 2) Who and how big is

Creating and Submitting your Portfolio Overview Creating a professional cybersecurity portfolio is essential for showcasing your skills, achievements, and growth. This portfolio will serve as a valuab

Creating and Submitting your Portfolio Overview Creating a professional cybersecurity portfolio is essential for showcasing your skills, achievements, and growth. This portfolio will serve as a valuable tool for presenting yourself to universities, scholarship committees, employers, and beyond. Objective:: To design a professional cybersecurity portfolio that markets your academic and

IntroductionFor this project, you will create a personal portfolio website to demonstrate your ability to use HTML, CSS, and JavaScript and resolve software problems in web development environments. Y

IntroductionFor this project, you will create a personal portfolio website to demonstrate your ability to use HTML, CSS, and JavaScript and resolve software problems in web development environments. You will create three HTML pages: a résumé, a cover letter, and a career goals page. As you make your website, you

IntroductionFor this project, you will create a personal portfolio website to demonstrate your ability to use HTML, CSS, and JavaScript and resolve software problems in web development environments. Y

IntroductionFor this project, you will create a personal portfolio website to demonstrate your ability to use HTML, CSS, and JavaScript and resolve software problems in web development environments. You will create three HTML pages: a résumé, a cover letter, and a career goals page. As you make your website, you

Need to report 1 You will submit two reports generated from your developed database. These reports should be meaningful to your database. The report(s) resolve one of the problems that you originally

Need to report 1 You will submit two reports generated from your developed database. These reports should be meaningful to your database. The report(s) resolve one of the problems that you originally identified in your Database Proposal.  The lay out should be appealing to the eye and the design should

Select any example visualization or infographic and imagine the contextual factors have changed: If the selected project was a static work, what ideas do you have for potentially making it usefully in

Select any example visualization or infographic and imagine the contextual factors have changed: If the selected project was a static work, what ideas do you have for potentially making it usefully interactive? How might you approach the design if it had to work on both mobile/tablet and desktop? If the

Excel 365/2021 Capstone – Level 2 Working with Sales Data These instructions are compatible with both Microsoft Windows and Mac operating systems. In this project, you will work with sales data from T

Excel 365/2021 Capstone – Level 2 Working with Sales Data These instructions are compatible with both Microsoft Windows and Mac operating systems. In this project, you will work with sales data from Top’t Corn, a popcorn company with an online store, multiple food trucks, and two retail stores. You will

Hello Students, As discussed in class, the Workspaces and Challenges are now active. Required Challenges for Full Credit To earn full credit (30% of the assignment), you must complete 6 challenges fro

Hello Students, As discussed in class, the Workspaces and Challenges are now active. Required Challenges for Full Credit To earn full credit (30% of the assignment), you must complete 8 challenges from the following list: Interns & HR on the Domain Controller Help Desk Fun: User Workstation Nightmares Dangerous Drives Preventative Protection: Thwarting the Imminent Threat Security