Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

As you have learned in the text, the process of compiling code changes it into a machine-readable (rather than user-readable) language your computer can then execute. The compiling process ignores any comments entered by the user, as they have no effect on the operation of the program. However, comments within code are valuable to you and any users who will read your code, arguably as important as the code itself.

Always comment your source code fully. You may be tempted to skip this step in the midst of coding because the program and all of its component classes, methods, and objects are fresh in your mind. When you move on to other projects, or return to a half-finished program later, those comments will be invaluable guides. Comments help you avoid much time and anguish trying to understand the code. The importance of commenting is even further underscored when you work with other programmers or when that code will eventually be maintained by someone else. Without thorough commenting, you have already made the job harder for future administrators of the program-before they have laid eyes on the code or even inspected a single method. Clients that cannot make sense of the code they paid for will be far less likely to seek you out for future programming jobs.

Review the sections of the text that refer to comments, including the three different methods you can use to code comments in Java. Next, go to any open source repository, where software developers collaborate on the development of open source software, and download the code from one or more open source projects. Some potential repositories to explore are: SourceForge (sourceforge.net), JavaForge (javaforge.com), and Google Code (code.google.com).

You will notice that the quality of the programs and the quality of the programming varies greatly. Try to remember that these open source projects are posted by programmers of all different levels of experience, and the projects are in various stages of development. As such, they do not always embody sound programming practices.

Examine the source code for one or more open source projects and locate an example in which: (1) the documentation and commenting within the program leaves something to be desired and (2) more than one control flow statement is used. Inspect the code for the individual source files. If you are able to build the project, run the program a few times so you understand what the author of the program was trying to achieve and how the lines of code in the project work. Think about how the commenting could be improved.

By Day 3, post a response that summarizes your findings. The post should:

  • Include a link to the open source project you chose as an example of poor commenting, or attach an example source file to your posting.
  • Identify the methods within the example program you believe are not sufficiently documented.
  • Examine the control flow statements to determine what they do and if their purpose is clearly documented.
  • Explain why you feel the current commenting within the project needs improvement.

Copy the example code into your post, replacing or adding detail to the current comments in order to make the program easier for a user to understand.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92178244
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Engineering

1 what is the boolean expression for an and gate2 what is

1. What is the Boolean expression for an AND gate? 2. What is the Boolean expression for an OR gate? 3. What is the Boolean expression for a NOT gate?

Question some help me to answer this1 discuss the osi

Question: Some help me to answer this 1. Discuss the OSI reference model and TCP/IP model. discuss in details their features, advantages and disadvantages 2. Compare and contrast the two models. The response must be type ...

Question suppose user process application p1 of one

Question : Suppose user process (application) P1 of one computer wishes to transfer data (file) to process (application) P2 on another computer in the Internet. What addressing information about P2 is necessary for P1 to ...

Subject economicsa manager has a utility function u c 05

Subject: Economics A manager has a utility function U = C 0.5 if she doesn't work hard and U = C 0.5 - 3 if she does. Expected profit will increase from 1,000 to 1,500 if she works hard. The manager receives compensation ...

Question need two different postsresponses with 200 words

Question: need two different posts(responses) with 200 words each on the below topic. There are three levels of management hierarchy: strategic, managerial and operational. Part 1: Review at least 4 academically reviewed ...

Consider the following half-reactionsoxidation

Consider the following half-reactions: Oxidation: 2I - (aq)  --> I 2(aq)  +2e - Reduction: MnO 4 - (aq)  +8H + (aq)  + 5e -  -->Mn 2+ (aq)  + 4H 2 O (l) a) Write the overall reaction. b) A galvanic cell based on this rea ...

Of 144 single women 41 had breast cancer 209 who were

Of 144 single women 41% had breast cancer, 209 who were married 52.2% had breast cancer and of 89 life bing with family 59.6% had breast cancer. Find the p value for the relationship?

Inside the oncreate method fill in the code so that we set

Inside the onCreate method, fill in the code so that we set the layout and GUI defined in activity_main.xml? public void onCreate( Bundle savedInstanceState ){ super.onCreate(savedInstanceState); // Your code goes here }

A security system is used to monitor doors and windows of a

A security system is used to monitor doors and windows of a residence. This system uses several components, including photodiodes and contact switches to detect intruders. Circuits associated with contact switches provid ...

Assignment - dijkstra algorithmdijkstras algorithm finds

Assignment - Dijkstra Algorithm Dijkstra's algorithm finds the shortest path from a given node to all other nodes. 1) We observe that we can modify this algorithm to stop as soon as a particular node is reached; thus pro ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As