The object oriented approach makes the process modeling quite simpler in nature by constructing the objects which represents real life features. It also brings forth data abstraction and encapsulation techniques. The security and reusability is also enhanced with the use of other object oriented features such as inheritance and polymorphism (Booch, 2003).
Case Tools: Computer Aided Software Engineering (CASE) uses a set of tools like code generators, UML, data modeling techniques, configuration tools for the construction of the system (Hoffer, 2002).They facilitate the development stages of the product at every stage to frame the particular scenario and design the requirements. Evaluation of application of case: The application of case makes sure that the following are taken care: • Increasing quality: The use of CASE makes sure that all the various requirements are taken care to its fullest extent and nothing is left out. It reduces errors and omission
...s at large scale.
The very inclusion of various requirements reduces system maintenance. • Better documentation: The CASE by default assists maintenance and enhances documentation standards and ad-hoc reporting. Conclusion The importance of the methods can be traced for any organization that rests on determining the best possible case for getting the information and the business process on paper so that they are able to have a productive method for getting the resources utilized.References/BibliographyBooch, Grady (2003). Object-Oriented Analysis and Design with Applications, 2nd Edition, Addison-Wesley Professional.
Hoffer A. Jeffery (2002). Modern Systems Analysis and Design, Pearson Education. Navathe, Elmasri (2003). Fundamentals of Database systems (pp 49-70). Singapore: Pearson Education.
Pressman, Roger (2005). Software Engineering, 3rd Edition. Sommerville, I (2005). Software Engineering, Fifth Edition, Addison-Wesley, Reading, MA.
- Android essays
- Application Software essays
- Benchmark essays
- Computer Network essays
- Computer Programming essays
- Computer Security essays
- Computer Software essays
- Cryptography essays
- Data collection essays
- Data Mining essays
- Graphic Design essays
- Information Systems essays
- Internet essays
- Network Security essays
- Website essays
- World Wide Web essays
- Data Modeling essays
- Data Warehouse essays
- Operator essays
- Relation essays
- Sql essays
- John Locke essays
- 9/11 essays
- A Good Teacher essays
- A Healthy Diet essays
- A Modest Proposal essays
- A&P essays
- Academic Achievement essays
- Achievement essays
- Achieving goals essays
- Admission essays
- Advantages And Disadvantages Of Internet essays
- Alcoholic drinks essays
- Ammonia essays
- Analytical essays
- Ancient Olympic Games essays
- APA essays
- Arabian Peninsula essays
- Argument essays
- Argumentative essays
- Art essays
- Atlantic Ocean essays
- Auto-ethnography essays
- Autobiography essays
- Ballad essays
- Batman essays
- Binge Eating essays
- Black Power Movement essays
- Blogger essays
- Body Mass Index essays