Programming Environments And The Software Production Process

Introduction: The creating of a computer program involves a number of stages which can be made easier with several separate software utilities. There are now integrated set of support programs which combine all the necessary utilities to provide a complete program development environment. These are known as programming languages, which include:

BASIC: Beginner's All-purpose Symbolic Instruction Code originally designed for Dartmouth's experimental timesharing system in the early 1960s, which has since become the leading cause of brain damage in proto-hackers & programmer becouse it encourages bad habits that will make it harder to use more powerful languages well.

PASCAL: A language designed in 1967 and released in 1968 as an instructional tool for elementary programming. This language was designed primarily to keep students from shooting themselves in the foot, became the ancestor of a large family of languages including Modula

FORTRAN: FORmula TRANslator, is the oldest high-level programming language. Designed by John Backus for IBM in the late 1950s, it is still used, particularly for scientific applications that require extensive mathematical computations.

COBOL: COmmon Business Oriented Language, developed in the late 1950s and early 1960s, COBOL is the second-oldest high-level programming language. It is particularly popular for business applications that run on large computers.

COBOL is a wordy language, programs written in COBOL tend to be much longer than the same programs written in other languages. Although heated by many programmers for being outdated, COBOL is still the most widely used programming language in the world.

Java:nDeveloped by Sun Microsystems. Java was originally called OAK, and was designed for handheld devices and set-top boxes. Oak was so unsuccessful, in 1995 Sun changed the name to Java and modified the language to take advantage of the burgeoning World Wide Web.

Java is an object-oriented language similar to C++, but simplified to eliminate language features that cause common programming errors. Java source code files are compiled into a format called bytecode, which can then be executed by a Java interpreter.

C: Was developed by Dennis Ritchie and Brian Kernighan at Bell Labs in the mid 1970s. Although it is a high-level language, C is much closer to assembly language than are most other high-level languages. C has proved to be a powerful and flexible language that can be used for a variety of applications, C is a particularly popular language for personal computer programmers because it is relatively small it requires less memory than other languages.

C++:Is an object-oriented language developed by Bjarne Stroustrup at Bell Labs. C++ adds object-oriented features to its predecessor, C. C++ is rapidly becoming the programming language of choice for graphical applications, such as those that run in Windows and Macintosh environments.

Ada: Is an object-oriented language developed in the late 1970s for the United States Defense Department. Ada was designed to be a general-purpose language for everything from business applications to rocket guidance systems. In addition, Ada is often the language of choice for large systems that require real-time processing, such as banking and air traffic control systems.

Assembly: A programming language that is once removed from a computer's machine language. Machine languages consist entirely of binary numbers and are almost impossible to read and write because the programmer must know instruction for every operation the computer will perform. Assembly languages have the same structure and set of commands as machine languages, but assembly enable a programmer to use names instead of numbers.

Stages of software production

Introduction: Systems analysis and design is basically the precesses used to analyse, design and implement general solutions to major projects. The conventional approach designed for analysis and design consist of a set of rules to follow which are known as the system life cycle. These rules are now open to much flexibility but form a suitable starting point for getting an idea of how major projects can be approached. This method is a follows:

Definition of the problem: This first stage of the software production process is a detailed definition of the problem being addressed so a thorough understanding of the problem can be gained so that it is known what it is that the solution is to trying to achieve.

A feasibility study: A preliminary investigation of a proposed system is essential to find out if the system is technically feasible and if so, whether the benefit of the proposed system can justify the costs involved in developing it.

Collecting information about the proposed system: Assuming that the feasibility study produces a favourable report, a detailed analysis of the current systems is careered out to generate information. the preposes system's requirements can then be determined in more detail, and a more detailed estimate of likely costs is undertaken.

Analysis: An analysts of the problems that define how the preposed system will meet the requirements identified, this includes detailing what the software is required to do. Analysts involves identifying the system's inputs / outputs, etcetera. All the information generated in this stage is recorded in the form an algorithm that may ne expressed in many ways including reports tables and system flow charts.

Design of the system: Detailed design and coding (if necessary) to meet the requirements of the project including all the sub-sections of the project then testing and debugging the system using the specifications generated in the analysis stages.

Implementation and evaluation: Installing and testing all aspects of the overall system, both the software and manual procedures involved, to ensure to works as expected and more importantly to discover any serious security holes or other unintended side effects in the system software and correct them. System documentation and staff training takes place An this stage.

Maintenance: When the system is fully operational its performance will be continually monitored to assess it's performance and ensure it continues to function correctly. Correcting bugs that may arise afer extensive use. At some level, needs that are no longer satisfied by the current system will be identified, and the system development process begins again.

I am the website administrator of the Wandle industrial museum (http://www.wandle.org). Established in 1983 by local people to ensure that the history of the valley was no longer neglected but enhanced awareness its heritage for the use and benefits of the community.

limousine Ackley .. Lockport Chicago limo O’Hare
In The News:

A virtual private network can help ensure your information remains security and your privacy remains intact. Kurt the CyberGuy explains.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Artificial intelligence-based cameras are giving air defense operators unprecedented capabilities in monitoring and protecting airspace.
Apple's iOS 18.1 Inactivity Reboot automatically reboots your iPhone if it hasn't been used or unlocked for more than three days, providing better data protection.
An inventor designed rooftop solar panels for a Tesla that draws solar energy while the car is parked, adding travel mileage without plugging in.
There are currently no laws governing what artificial intelligence can and cannot do with the information it gathers; here are 10 things to avoid telling AI chatbots to keep yourself safe.
A credit union with over 240,000 members recently revealed it was targeted by cybercriminals, resulting in a data breach that was part of a two-month attack by hackers.
Scammers have become skilled at creating convincing fake websites that can easily fool unsuspecting users. The CyberGuy offers tips to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
CAPTCHAs, which are used by websites to confirm whether users are people or bots, are harmless, but hackers are using them to infect PCs with malware.
Hackers recently leaked personal information of about 500,000 Americans and stole patient medical records that included lab results and insurance details.
The holiday season sees a rise in mobile shopping scams. Tech expert Kurt “CyberGuy" Knutsson helps you learn how to stay safe.
Tech expert Kurt “CyberGuy" Knutsson says a VPN enhances online banking security by encrypting data and protecting privacy.
Beware of these six sneaky holiday scams. Tech expert Kurt “CyberGuy" Knutsson gives you tips to avoid falling victim.
Tech expert Kurt “CyberGuy" Knutsson reveals how to securely back up and factory reset your Android to protect your privacy and data.
Artificial intelligence is making life easier for cybercriminals, allowing them to create elaborate scams to trick people. Kurt the Cyberguy explains how to protect yourself.
Cut through all the digital clutter and delete multiple emails from your Android simultaneously. Kurt the CyberGuy explains how it's done.
Tips to prevent your holiday decorations from being stolen
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson lays out the immediate steps you should take if your phone has been hacked and your personal information becomes vulnerable.
Fraudsters are sending people bogus invoices through PayPal as part of a sneaky scam that is going around; here's how to protect yourself from being fooled.
A former Colgate-Palmolive employee was shocked to discover $750,000 had been drained from her 401(k) account. "CyberGuy" offers tips on how to prevent identity theft.
Electric vehicle maker Harbinger recently showed its electric delivery truck can handle icy roads with agility and stability in winter.
To make the busiest time of year more manageable, here are some tricks for tracking your packages, taking quality family photos and curating the perfect Christmas playlist.
Kurt "CyberGuy" Knutsson explains how to keep your online Amazon gift purchases a secret from loved ones or friends this holiday season.

OLAP, An Alternative Technology Over Spreadsheets

Are Spreadsheets Robbing your Enterprise of Competitive Advantage?'90% of "average"... Read More

Great Plains Dexterity Development: FAQ

Microsoft Business Solutions Great Plains is Dexterity-written application and currently... Read More

Beware of Spyware

One day, you suddenly realize that your computer started to... Read More

Pros and Cons of Using FREE Software in Your Business

It???s easy to understand why you might be drawn to... Read More

Fast Car Knoppix

Small can be beautiful! Working with Knoppix for the past... Read More

How Do I Get Rid Of That Darn Spyware?

Ad-Aware and Spybot are probably the two most well known... Read More

Windows Screensavers Explained

In this article you will find some background information about... Read More

Lotus Domino: Application Integration ? A Programmer View

There are two approaches for application integration:? Programmer's approach ?... Read More

Exactly What Does FTP Stand for and What Can it do for Me?

FTP stands for "file transfer protocol". FTP is basically a... Read More

Linux ? Keyboard Or Mouse

Just stress testing one of the latest Linux distributions. Been... Read More

Troubleshoot Windows with Task Manager

Task Manager is a Windows system utility that displays thetasks... Read More

Microsoft Great Plains Distribution, Barcoding, Consignment ? overview for consultant

Microsoft Great Plains ? ERM from Microsoft Business Solutions and... Read More

Crystal Reports for Microsoft Great Plains

Microsoft Business Solutions ? Great Plains is designed to meet... Read More

Linux for Home Users

Hey Guys! Don't raise your eyebrows or fear by hearing... Read More

Free PDF Publishing Software

In a previous article, I wrote about OpenOffice... Read More

Linux Vs. Windows

This article will not attempt to advocate the use of... Read More

Rapid Application Development - Is it Really a Need of Today?

Rapid Application Development (RAD) is a software development methodology. In... Read More

Integrating Microsoft Great Plains Accounting/ERP: RMS, CRM, eCommerce, Lotus Domino ? overview

Microsoft Business Solutions Great Plains has substantial market share among... Read More

Dashboard Widgets for Windows

For a windows user like me, just can watch with... Read More

Microsoft CRM and No-Frills Cadillacs

In today's business world it's all but impossible to escape... Read More

Microsoft Business Solutions - Navision Customization: C/SIDE, C/ODBC, C/FRONT, XBRL

Microsoft bought Navision, Denmark based software development company, along with... Read More

Great Plains Customization Upgrade? Overview For CIO/IT Director

Around the same time Microsoft made its move with .Net... Read More

Programming Language Migration Path

While I was preparing some personal background information for a... Read More

Four Desktop Tools To Drastically Increase Your Productivity

Sticky Noteshttp://www.deprice.com/stickynote.htmWith StickyNote 9.0, you can create beautiful 3D notes... Read More

Fleet Maintenance Software Reviews

Innovative Maintenance Systems (IMS) is one company that offers solutions... Read More

shuttle from O'Hare Alexander ..