0% found this document useful (0 votes)
45 views25 pages

Project 2

The document describes a student's class 12 project on developing a Tic-Tac-Toe game. It includes sections on objectives, proposed system, system development life cycle (SDLC) phases, flow chart, source code, output, testing requirements, and bibliography. The project aims to apply programming skills and object oriented principles to develop a small game. It outlines the SDLC phases used such as initiation, planning, design, development, testing and implementation. The document provides details on the various components and development of the Tic-Tac-Toe game project.

Uploaded by

rakeshkr24742836
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views25 pages

Project 2

The document describes a student's class 12 project on developing a Tic-Tac-Toe game. It includes sections on objectives, proposed system, system development life cycle (SDLC) phases, flow chart, source code, output, testing requirements, and bibliography. The project aims to apply programming skills and object oriented principles to develop a small game. It outlines the SDLC phases used such as initiation, planning, design, development, testing and implementation. The document provides details on the various components and development of the Tic-Tac-Toe game project.

Uploaded by

rakeshkr24742836
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

SESSION 2021-22 TERM -2

IP PROJECT FILE CLASS 12

GBSSS KHAJOORI KHAS

ACADEMIC YEAR: 2021-2022

PROJECT REPORT ON

“TIC-TAC-TOE GAME”

ROLL NO. : 14702003


NAME : HARSH MANDAL
CLASS : 12TH (A)
SUBJECT : INFORMATICS PRACTICES
SUB. CODE: 0 6 5
PROJECT GUIDE : PGT (SACHIN SIR)
1 HARSH MANDAL GBSSS KHAJOORI KHAS
SESSION 2021-22 TERM -2
IP PROJECT FILE CLASS 12

GBSSS KHAJURI, KHAS

CERTIFICATE
This is to certify that Cadet Roll
No. has successfully completed the
project Work entitled "TIC-TAC-TOE GAME." in the
subject INFORMATICS PRACTICES (065) laid down in
the regulations of CBSE for the purpose of Practical
Examination

EXAMINER: SACHIN SIR


NAME: PGT CS/IP
Signature: MASTER IC

2 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

TABLE OF CONTENTS [ T O C]
TABN

SER DESCRIPTION PAGE NO

01 ACKNOWLEDGEMENT 04

02 INTRODUCTION 05

03 OBJECTIVES OF THE PRODUCT 05

04 PROPOSED SYSTEM 06

05 SYSTEM DEVELOPED LIFE CYCLE (SDLC) 06

06 PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE 07

07 FLOW CHART 09

08 SOURCE CODE 15

09 OUTPUT 20

10 TESTING 21

11 HARDWARE AND SOFTWARE REQUIREMENTS 23


3 ANURAG GBSSS KHAJOORI KHAS
12 BIBLIOGRAPHY 24
IP PRACTICAL FILE SESSION TERM -2 CLASS 12

ACKNOWLEDGEMENT

Apart from the efforts of me, the success of any project depends largely
on the encouragement and guidelines of many others. I take this opportunity
to express my gratitude to the people who have been instrumental in the
successful completion of this project.

I express deep sense of gratitude to almighty God for giving me strength


for the successful completion of the project.

I express my heartfelt gratitude to my parents for constant encouragement


while carrying out this project

I gratefully acknowledge the contribution of the individuals who contributed


in bringing this project up to this level, who continues to look afterme despite
my flaws.

I express my deep sense of gratitude to the luminary The Principal,


Who has been continuously motivating and extending their
helping hand to us?

My sincere thanks to , Master in-charge. A guide, Mentor


all the above a friend, who critically reviewed my project and helped in solving
each and every problem, occurred during implementation of the project.

The guidance and support received from all the members who contributed
and who are contributing to this project, was vital for the success of the project.
I am grateful for their Constant support and help.

4 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

PROJECT ON TIC-TAC-TOE GAME

INTRODUCTION

Tic-Tac-Toe (American English), noughts and crosses (British


English), or Xs and Os is a paper-and-pencil game for two players, X
and 0, who take turns marking the spaces in a 3x3 gnd. The player
who succeeds in placing three of their marks in a horizontal, vertical,
or diagonal row wins the game.

OBJECTIVES OF THE PROJECT

The objective of this project is to let the students apply the


programming knowledge into a real world situation problem and
exposed the students how programming skills helps in developing a
good software.

1. Write programs utilizing modem software tools

2. Apply object oriented programming principles effectively when


developing small to medium sized projects

3. Write effective procedural code to solve small to medium sized


problems.

4. Students will demonstrate a breadth of knowledge in computer


science as exemplified inthe areas of systems, theory and software
development.

5. Students will demonstrate ability to conduct a research or applied


Computer Science project, requiring writing and presentation skills
which exemplify scholarly style in computer science.

5 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

PROPOSED SYSTEM
Today one afford to rely on the fallible human beings of be
really wants to stand against today's merciless competition where
not to wise saying "to err is human" no longer valid, it's outdated to
rationalize your mistake So, to keep pace with time, to bring about
the best result without malfunctioning and greater efficiency so to
replace the unending heaps of ties with a much sophisticated hard
disk of the computer.

One has to use the data management software. Software has


been an ascent in atomization various organisations. Many software
products working are now in markets, which have helped in making
the organizations work easier and efficiently. Data management
initially had to maintain a lot of ledgers and a lot of paper work has to
be done but now software product on this organization has made
their work faster and easier. Now only this software has to be loaded
on the computer and work can be done.

This prevents a lot of time and money. The work becomes fully
automated and any information regarding the organization can be
obtained by clicking the button. Moreover, now it's an age of
computers of and automating such an organization gives the better
look

SYSTEM DEVELOPMENT LIFE CYCLE(SDLC)

6 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

The systems development life cycle is a project management


technique that divides complex projects into smaller, more easily
managed segments or phases. Segmenting projects allows managers
to verify the successful completion of project phases before allocating
resources to subsequent phases:

Software development projects typically include initiation,


planning, design, development, testing, implementation, and
maintenance phases However, the phases may be divided differently
depending on the organization involved.

For example, initial project activities might be designated as


request, requirements definition, and planning phases, or initiation,
concept-development, and planning phases. End users of the system
under development should be involved in reviewing the output of
each phase to ensure the system is being built to deliver the needed
functionality.

PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE

INITIATION PHASE

 Identify and validate an opportunity to improve business


accomplishments of the organization or a deficiency related to
a business need.

 Identity significant assumptions and constraints on solutions to


that need. Recommend the exploration of alternative concepts
and methods to satisfy the need including questioning the need
for technology, Le, will a change in the business process offer a
solution?

 Assure executive business and executive technical sponsorship


The Sponsor designates a Project Manager and the business
need is documented in a Concept Proposal. The Concept

7 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

Proposal includes information about the business process and


the relationship to the Agency/Organization.

 Infrastructure and the Strategic Plan. A successful Concept


Proposal results in a Project Management Charter which
outlines the authority of the project manager to begin the
project.

Careful oversight is required to ensure projects support


strategic business objectives and resources are effectively
implemented into an organization's enterprise architecture. The
initiation phase begins when an opportunity to add, improve, or
correct a system is identified and formally requested through the
presentation of a business case. The business case should, at a
minimum, describe a proposal's purpose. Identify expected benefits
and explain how the proposed system supports one of the
organization's business strategies. The business case should also
identify alternative solutions and detail as many informational,
functional and network requirements as possible.

SYSTEM CONCEPT DEVELOPMENT PHASE

The System Concept Development Phase begins after a business


need or opportunity is validated by the Agency/Organization
Program Leadership and the Agency/Organization CIO

The purpose of the System Concept Development Phase is to

 Determine the feasibility and appropriateness of the


alternatives.
 Identity system interfaces.
 Identity basic functional and data requirements to satisfy the
business need
 Establish system boundaries; identify goals, objectives, critical
success factors, and performance measures.

8 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

 Evaluate costs and benefits of alternative approaches to satisfy


the basic functional requirements
 Assess project risks
 Identify and initiate risk mitigation actions, and Develop high-
level technical architecture, process models, data models, and a
concept of operations. This phase explores potential technical
solutions within the context of the business need
 It may include several trade-off decisions such as the decision
to use COTS software products as opposed to developing
custom software or reusing software components, or the
decision to use an incremental delivery versus a complete,
onetime deployment.
 Construction of executable prototypes is encouraged to
evaluate technology to support the business process. The
System Boundary Document serves as an important reference
document to support the Information Technology Project
Request (TPR) process
 The ITPR must be approved by the State CIO before the project
can move forward.

PICTORIAL REPRESENTATION OF SDLC:

9 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

PLANNING PHASE

The planning phase is the most critical step in completing


development, acquisition, and maintenance projects. Careful
planning, particularly in the early stages of a project, is necessary to
coordinate activities and manage project risks effectively. The depth
and formality of project plans should be commensurate with the
characteristics and risks of a given project. Project plans refine the
information gathered during the initiation phase by further
identifying the specific activities and resources required to complete
a project.

A critical part of a project manager job is to coordinate


discussions between user, audit, security, design, development, and
network personnel to identify and document as many functional,
security, and network requirements as possible. During this phase, a
plan is developed that documents the approach to be used and
includes a discussion of methods, tools, tasks, resources, project
schedules, and user input. Personnel assignments, costs, project
schedule, and target dates are established.

A Project Management Plan is created with components related


to acquisition planning, configuration management planning, quality
assurance planning, concept of operations, system security,
verification and validation, and systems engineering management
planning.

REQUIREMENTS ANALYSIS PHASE

This phase formally defines the detailed functional user


requirements using high-level requirements identified in the
Initiation, System Concept, and Planning phases. It also delineates
the requirements, in terms of data, system performance, security,
and maintainability requirements for the system. The requirements
are defined in this phase to a level of detail sufficient for systems

10 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

design to proceed. They need to be measurable, testable, and relate


to the business need or opportunity identified in the Initiation Phase.
The requirements that will be used to determine acceptance of the
system are captured in the Test and Evaluation Master Plan.

The purposes of this phase are to:

 Further define and refine the functional and data requirements


and document them in the Requirements Document,

 Complete business process reengineering of the functions to be


supported (i.e., verify what information drives the business
process, what information is generated, who generates it,
where does the information go, and who processes it),

 Develop detailed data and process models (system inputs,


outputs, and the process.

 Develop the test and evaluation requirements that will be used


to determine acceptable system performance.
DESIGN PHASE

The design phase involves converting the informational,


functional, and network requirements identified during the initiation
and planning phases into unified design specifications that developers
use to script programs during the development phase.
Program designs are constructed in various ways. Using a top-down
approach, designers first identify and link major program components
and interfaces, then expand design layouts as they identify and link
smaller subsystems and connections. Using a bottom-up approach,
designers first identity and link minor program components and
interfaces, then expand design layouts as they identify and link larger
systems and connections. Contemporary design techniques often use
prototyping tools that build mock-up designs of items such as
application screens, database layouts, and system architectures. End

11 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

users, designers, developers, database managers, and network


administrators should review and refine the prototyped designs in an
iterative process until they agree on an acceptable design Audit,
security, and quality assurance personnel should be involved in the
review and approval process. During this phase, the system to satisfy
the functional requirements identified in the previous phase. Since
problems in the design phase could be very expensive to solve in the later
stage of the software development, a variety of elements are
considered in the design to mitigate risk These include:

 Identifying potential risks and defining mitigating design


features.
 Performing a security risk assessment
 Developing a conversion plan to migrate current data to the
new system.
 Determining the operating environment.
 Defining major subsystems and their inputs and outputs.
 Allocating processes to resources.
 Preparing detailed logic specifications for each software
module. The result is a draft System Design Document which
captures the preliminary design for the system.
 Everything requiring user input or approval is documented and
reviewed by the user. Once these documents have been
approved by the Agency CIO and Business Sponsor, the final
System Design Document is created to serve as the
Critical/Detailed Design for the system.
 This document receives a rigorous review by Agency technical
and functional representatives to ensure that it satisfies the
business requirements. Concurrent with the development of
the system design, the Agency Project Manager begins
development of the implementation Plan. Operations and
Maintenance Manual, and the Training Plan.

DEVELOPMENT PHASE

12 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

The development phase involves converting design


specifications into executable programs Effective development
standards include requirements that programmers and other
project participants discuss design specifications before
programming begins. The procedures help ensure programmers
clearly understand program designs and functional requirements.
Programmers use various techniques to develop computer
programs. The large transaction oriented programs associated with
financial institutions have traditionally been developed using
procedural programming techniques Procedural programming
involves the line-by-line scripting of logical instructions that are
combined to form a program. Effective completion of the previous
stages is a key factor in the success of the Development phase.
The Development phase consists of:
 Translating the detailed requirements and design into
system components.
 Testing individual elements (units) for usability.
 Preparing for integration and testing of the IT system.

INTEGRATION AND TEST PHASE

 Subsystem integration system, security, and user acceptance


testing is conducted during the integration and test phase. The
user, with those responsible for quality assurance, validates
that the functional requirements as defined in the functional
requirements document, are satisfied by the developed or
modified system. OIT Security staff assess the system security
and issue a security installation/implementation.

Multiple levels of testing are performed, including


 Testing at the development facility by the contractor and
possibly supported by end users
 Testing as a deployed system with end users working together
with contract personnel

13 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

 Operational testing by the end user alone performing all


functions. Requirements are traced throughout testing, a final
Independent Verification & Validation evaluation is performed
and all documentation is reviewed and accepted prior to
acceptance of the system.

IMPLEMENTATION PHASE

This phase is initiated after the system has been tested and
accepted by the user. In this phase, the system is installed to support
the intended business functions. System performance is compared to
performance objectives established during the planning phase
Implementation includes user notification, user training, installation
of hardware, installation of software onto production computers, and
integration of the system into daily work processes. This phase
continues until the system is operating in production in accordance
with the defined user requirements.

OPERATIONS AND MAINTENANCE PHASE

The system operation is ongoing. The system is monitored for


continued performance in accordance with user requirements and
needed system modifications are incorporated. Operations continue
as long as the system can be effectively adapted to respond to the
organization's needs. When modifications or changes are identified,
the system may reenter the planning phase.

The purpose of this phase is to:


 Operate, maintain, and enhance the system.
 Certify that the system can process sensitive information
 Conduct periodic assessments of the system to ensure the
functional requirements continue to be satisfied.
 Determine when the system needs to be modernized, replaced,
or retired

14 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

SOURCE CODE

CRATE A PYTHON PROJECT OF TIC-TAC-TOE GAME

import pygame as pg,sys


from pygame.locals import *
import time
XO = 'x'
winner = None
draw = False
width = 400
height = 400
white = (255, 255, 255)
line_color = (10,10,10)
TTT = [[None]*3,[None]*3,[None]*3]
pg.init()
fps = 30
15 HARSH MANDAL GBSSS KHAJOORI KHAS
IP PRACTICAL FILE SESSION TERM -2 CLASS 12

CLOCK = pg.time.Clock()
screen = pg.display.set_mode((width, height+100),0,32)
pg.display.set_caption("Tic Tac Toe by sachin kumar")
opening = pg.image.load('imgs\\tic tac opening.png')
x_img = pg.image.load('imgs\m_x.png')
o_img = pg.image.load('imgs\m_o.png')
x_img = pg.transform.scale(x_img, (80,80))
o_img = pg.transform.scale(o_img, (80,80))
opening = pg.transform.scale(opening, (width, height+100))
def game_opening():
screen.blit(opening,(0,0))
pg.display.update()
time.sleep(1)
screen.fill(white)
# Drawing vertical lines
pg.draw.line(screen,line_color,(width/3,0),(width/3, height),7)
pg.draw.line(screen,line_color,(width/3*2,0),(width/3*2,
height),7)
# Drawing horizontal lines
pg.draw.line(screen,line_color,(0,height/3),(width, height/3),7)
pg.draw.line(screen,line_color,(0,height/3*2),(width,
height/3*2),7)
draw_status()
def draw_status():
global draw
if winner is None:
message = XO.upper() + "'s Turn"
else:
message = winner.upper() + " won!"
if draw:
message = 'Game Draw!'
font = pg.font.Font(None, 30)
text = font.render(message, 1, (255, 255, 255))
# copy the rendered message onto the board
screen.fill ((0, 0, 0), (0, 400, 500, 100))

16 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

text_rect = text.get_rect(center=(width/2, 500-50))


screen.blit(text, text_rect)
pg.display.update()
def check_win():
global TTT, winner,draw
# check for winning rows
for row in range (0,3):
if ((TTT [row][0] == TTT[row][1] == TTT[row][2]) and(TTT [row][0]
is not None)):
# this row won
winner = TTT[row][0]
pg.draw.line(screen, (250,0,0), (0, (row + 1)*height/3 -
height/6),\
(width, (row + 1)*height/3 - height/6 ), 4)
break
# check for winning columns
for col in range (0, 3):
if (TTT[0][col] == TTT[1][col] == TTT[2][col]) and (TTT[0][col] is
not None):
# this column won
winner = TTT[0][col]
#draw winning line
pg.draw.line (screen, (250,0,0),((col + 1)* width/3 - width/6,
0),\
((col + 1)* width/3 - width/6, height), 4)
break

# check for diagonal winners


if (TTT[0][0] == TTT[1][1] == TTT[2][2]) and (TTT[0][0] is not None):
# game won diagonally left to right
winner = TTT[0][0]
pg.draw.line (screen, (250,70,70), (50, 50), (350, 350), 4)
if (TTT[0][2] == TTT[1][1] == TTT[2][0]) and (TTT[0][2] is not None):
# game won diagonally right to left
winner = TTT[0][2]

17 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

pg.draw.line (screen, (250,70,70), (350, 50), (50, 350), 4)

18 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

if(all([all(row) for row in TTT]) and winner is None ):


draw = True
draw_status()
def drawXO(row,col):
global TTT,XO
if row==1:
posx = 30
if row==2:
posx = width/3 + 30
if row==3:
posx = width/3*2 + 30
if col==1:
posy = 30
if col==2:
posy = height/3 + 30
if col==3:
posy = height/3*2 + 30
TTT[row-1][col-1] = XO
if(XO == 'x'):
screen.blit(x_img,(posy,posx))
XO= 'o'
else:
screen.blit(o_img,(posy,posx))
XO= 'x'
pg.display.update()
#print(posx,posy)
#print(TTT)
def userClick():
#get coordinates of mouse click
x,y = pg.mouse.get_pos()
#get column of mouse click (1-3)
if(x<width/3):
col = 1
elif (x<width/3*2):
col = 2

19 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

elif(x<width):
col = 3
else:
col = None
#get row of mouse click (1-3)
if(y<height/3):
row = 1
elif (y<height/3*2):
row = 2
elif(y<height):
row = 3
else:
row = None
#print(row,col)
if(row and col and TTT[row-1][col-1] is None):
global XO
#draw the x or o on screen
drawXO(row,col)
check_win()
def reset_game():
global TTT, winner,XO, draw
time.sleep(3)
XO = 'x'
draw = False
game_opening()
winner=None
TTT = [[None]*3,[None]*3,[None]*3]
game_opening()
# run the game loop forever
while(True):
for event in pg.event.get():
if event.type == QUIT:
pg.quit()
sys.exit()
elif event.type == MOUSEBUTTONDOWN:

20 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

# the user clicked; place an X or O


userClick()
if(winner or draw):
reset_game()
pg.display.update()
CLOCK.tick(fps)

OUTPUT

TESTING

Software Testing is an empirical investigation conducted to


provide With Information about the quality of the product or service
under test stakeholders a with respect to the context which it is
intended to operate. Software Testing also provides an objective,

21 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

independent view of the software to allow the business to appreciate


and understand the risks at implementation of the software. Test
techniques include, but are not limited to, the processof executing a
program or application with the intent of finding software bugs.

It can also be stated as the process of validating and verifying


that a software program/application/product meets the business and
technical requirements that guided its design and development, so
that it works as expected and can be implemented with the same
characteristics. Software Testing, depending on the testing method
employed, can be implemented at any time in the development
process, however the most test effort is employed after the
requirements have been defined and coding process has been
completed

TESTING METHODS
Software testing methods are traditionally divided into black
box testing and white box testing. These two approaches are used to
describe the point of view that a test engineer takes when designing
test cases.

BLACK BOX TESTING


Black box testing treats the software as a "black box, without
any knowledge of internal implementation. Black box testing
methods include: equivalence partitioning, boundary value analysis,
all-pairs testing, fuzz testing, model-based testing, traceability
matrix, exploratory testing and specification-based testing.

SPECIFICATION-BASED TESTING

Specification-based testing aims to test the functionality of


software according to the applicable requirements. Thus, the tester
inputs data into, and only sees the output from the test object.This
level of testing usually requires thorough test cases to be

22 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

provided to the tester, who they set that for a given input. The output
value (or behaviour), either RUUPE value specified in the test case.
Specification-based testing is necessary, but it is insufficient toguard
against certain risks

ADVANTAGES AND DISADVANTAGES


The black box tester has no "bonds" with the code, and a
tester's perception is very simple: a code must have bugs. Using the
principle. "Ask and you shall receive." black box testers find bugs
where programmers don't. But, on the other hand, black box testing
has been said to be like a walk in a dark labyrinth without a flashlight,
because the tester doesn't know how the software being tested was
actually constructed.

That's why there are situations when (1) a black box tester writes
many test cases to check something that can be tested by onlyone test
case, and/or (2) some parts of the back end are not tested at all.
Therefore, black box testing has the advantage of "an unaffiliated
opinion," on the one hand, and the disadvantage of "blind exploring,"
on the other.

WHITE BOX TESTING

White box testing, by contrast to black box testing, is when the


tester has access to the internal data structures and algorithms (and
the code that implement these)

Types of white box testing:-

The following types of white box testing exist:-


 API testing - Testing of the application using Public and Private
APIs
 Code coverage creating tests to satisfy some criteria of code
Coverage.

23 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

For example, the test designer can create tests to cause all
statements in the program to be executed at least once
 fault injection methods
 Mutation testing methods.
 Static testing - White box testing includes all static testing.

CODE COMPLETENESS EVALUATION

White box testing methods can also be used to evaluate the


completeness of a test suite that was created with black box testing
methods. This allows the software team to examine parts of a system
that are rarely tested and ensures that the most important function
points have been tested.

Two common forms of code coverage are:


 Function Coverage: Which reports on functions executed and
 Statement Coverage: Which reports on the number of lines
executed to complete the test?

They both return coverage metric, measured as a percentage.

HARDWARE AND SOFTWARE REQUIREMENTS

1. OPERATING SYSTEM: WINDOWS 7 AND ABOVE


2. PROCESSOR : Intel(R) Core(TM) i3,i5 or i7-8700 CPU @ 3.20GHz
3.19 GHz

3. MOTHERBOARD : 1.845 OR 915,995 FOR Core OR MSI .


. K9MM-V VIA K8M800+8237R PLUS
CHIPSET FOR AMD ATHALON
4. RAM : 2 GB+
5. Hard disk : SATA 512 GB OR ABOVE
6. CD/DVD r/w multi drive combo: (if back up required)

24 HARSH MANDAL GBSSS KHAJOORI KHAS


IP PRACTICAL FILE SESSION TERM -2 CLASS 12

7. FLOPPY DRIVE 1.44 MB: (if Backup required)


8. MONITOR 14.1 or 15-17 inch

9. Key board and mouse


10. Printer : (if print is required - [Hard copy])

SOFTWARE REQUIREMENTS:-

1. Windows OS

2. Python

BIBLIOGRAPHY

1. Computer science With Python Class XI and XII By: Sumita Arora
2. Computer science With Python Class XI and XII By: Preeti Arora
3. Website: https://www.gbsss.in/ , http://tgtpgtcs.com/
4. PROJECT GUIDE: SACHIN SIR LECTURER COMPUTER SCIENCE

25 HARSH MANDAL GBSSS KHAJOORI KHAS

You might also like