SOFTWARE BUGS: DETECTION, ANALYSIS AND FIXING

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1726
  • Access Fee: ₦5,000 ($14)
  • Pages: 109 Pages
  • Format: Microsoft Word
  • Views: 304
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

ABSTRACT 

This research work is concerned with the detection, analysis and fixing of software bugs. The objective of this work was to identify software development process with a focus of identifying cost effective methods of developing and managing software systems by introducing a post-deployment debugging approach which helps track software’s stability and at same time serve as a software bug-data repository. To achieve this objective, a web-based application –BugTracker was developed to manage software testing and post deployment activities and at the same time serve as a bug-data repository. The proposed approach allowstesters and end-users of the system to report bugs which the developer analyses to resolve issues and thereafter update the program files with newly updated version. UML and Overview model were used in the analysis and design of the BugTracker while PHP, HTML, JavaScript and MySQL database were used as the technology for the implementation of the system. Evaluation and testing of BugTracker revealed an increase in developer’s productivity, reduction in production cost and an increase in software’s stability. This research work reveals that it is possible to increase a software’s stability and reduce development cost if post-deployment activities are well managed.



TABLE OF CONTENTS

TITLE PAGE......................................................................................................i

CERTIFICATION .............................................................................................ii

APPROVAL.................................................................................................... iii

DEDICATION..................................................................................................iv

ACKNOWLEDGEMENT .................................................................................v

ABSTRACT ....................................................................................................vii

TABLE OF CONTENTS................................................................................viii

LIST OF FIGURES ...........................................................................................x

LIST OF TABLES............................................................................................xi

CHAPTER ONE: INTRODUCTION

1.1 BACKGROUND OF STUDY..................................................................1

1.2 STATEMENT OF PROBLEM.................................................................2

1.3 OBJECTIVES ..........................................................................................3

1.4 SIGNIFICANCE ......................................................................................3

1.5 SCOPE .....................................................................................................4

1.6 LIMITATIONS............................................................................................4

1.7 DEFINITION OF TERMS .......................................................................4

CHAPTER TWO: LITERATURE REVIEW

2.1 THEORETICAL BACKGROUND ..........................................................6

CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN

3.1 EXISTING SYSTEM.............................................................................17

3.2 ANALYSIS OF THE PROPOSED SYSTEM ........................................18

3.3 DEPLOYMENT AND SYSTEM SPECIFICATION..............................24

3.4 DATA BASE DESIGN ..........................................................................24

CHAPTER FOUR: SYSTEM IMPLEMENTATION

4.1 CHOICE OF PROGRAMMING LANGUAGE......................................29

4.2 SOFTWARE PRODUCT RELIABILITY ..............................................31

4.3 SAMPLE RUNS.....................................................................................34

4.4 SYSTEM TESTING...............................................................................40

4.5 SYSTEM DOCUMENTATION.............................................................42

CHAPTER FIVE: SUMMARY AND CONCLUSION

5.1 REVIEW OF ACHIEVEMENTS...........................................................44

5.2 AREAS OF APPLICATION OF WORK ...............................................44

5.3 SUGGESTIONS FOR FURTHER WORK.............................................45

5.4 RECOMMENDATIONS........................................................................45

5.5 CONCLUSION ......................................................................................46

REFERENCES ................................................................................................47

APPENDIX I: DOCUMENTATION...............................................................48

APPENDIX II: SYSTEM DESIGN .................................................................57

APPENDIX III: SAMPLE OUTPUT...............................................................65

APPENDIX IV: PROGRAM LISTING...........................................................69

SOFTWARE BUGS: DETECTION, ANALYSIS AND FIXING
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1726
  • Access Fee: ₦5,000 ($14)
  • Pages: 109 Pages
  • Format: Microsoft Word
  • Views: 304
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1726
    Fee ₦5,000 ($14)
    No of Pages 109 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT  This research work is concerned with the detection, analysis and fixing of software bugs. The objective of this work was to identify software development process with a focus of identifying cost effective methods of developing and managing software systems by introducing a post-deployment debugging approach which helps track... Continue Reading
    ABSTRACT The Cash Book Sales Analysis is used for recording the receipts of income and personal or trade Payment of money either in cash, cheque, bank draft or postal order, basically Cash book is one of the original entry in making cost or quality of materials. For Instance add new transaction to your cash book if they are missing, then produce A... Continue Reading
    ABSTRACT The Cash Book Sales Analysis is used for recording the receipts of income and personal or trade Payment of money either in cash, cheque, bank draft or postal order, basically Cash book is one of the original entry in making cost or quality of materials. For Instance add new transaction to your cash book if they are missing, then produce A... Continue Reading
    TABLE OF CONTENTS~ DECLARATION .11 Dedication III Acknowledgement iv Table of Contents V List of Figures ix List of Table Xi Abbreviation and Acronyms xii Abstract XIII CHAPTER ONE GENERAL INTRODUCTION 1.1 Introduction i 1.2 Background to the Study 2 1.3 Research Questions 3 1.3 Statement of the Problem 3 1,4 Main Objectives 4 1.5 Specific... Continue Reading
    ABSTRACT   This research was carried out based on how to reduce fraud activities in mobile telecommunication companies. Focusing on subscribers use of internet and mobile telecommunications, which is the main concern of this research, telecommunication fraud occurs whenever a perpetrator uses deception to receive telephony services free of charge... Continue Reading
    ABSTRACT The study software piracy in Nigeria aimed to examine the causes of software piracy in Nigeria, to determine the effect of software piracy on the economy of Nigeria, to examine the role of ICT in the growth of software piracy in Nigeria, to examine the relationship between software piracy and the social well... Continue Reading
    ABSTRACT As the world increasingly progresses towards a technology driven environment, the legal sector is not to be left behind. In the past years, clients got to know about lawyers through recommendation and at the same time lawyers had a challenge reaching out to their clients. Work was slow and tedious as research was conducted on dusty and... Continue Reading
    CHAPTER ONE INTRODUCTION 1.0 Introduction This chapter introduces the decision support system for software evaluation. It is the first chapter in this research work and is specifically focused on the theoretical background as well as the statement of the problem, aim and objectives of the study, significance of the study, scope of the study,... Continue Reading
    ABSTRACT  This project work which is conducted to meet the stipulation of the National Board for Technical Education (NBTE) for the award of National Diploma in computer science deals with the application of computer in Mortgage Banking operations. It addresses using a sophisticated computer software in handling the existing manual record system... Continue Reading
    ABSTRACT This research project deals with the design and development of a malicious software removal application (antivirus) that will be able to identify and eliminate unwanted malicious software from the personal computer (pc). Examples of these malicious software are Virus, Worms, Trojan, Spyware etc. These unwanted programs replicates by... Continue Reading
    Call Us
    whatsappWhatsApp Us