SlideShare a Scribd company logo
z
Name : Ayan Das
Subject : Software Engineering
Paper Code : ESC-501
Department : Computer Science and
Engineering
University Roll No: 25300121057
Year : 3rd Year
Supreme Knowledge Foundation
Group of Institutions
z
 Exploratory program development style refers to an informal
development style or builds and fix the style in which the programmer
uses his own intuition to develop a program rather than making use of the
systematic body of knowledge which is categorized under the software
engineering discipline.
 This style of development gives complete freedom to programmers to
choose activities which they like to develop software. This dirty program is
quickly developed and bugs are fixed whenever it arises.
Topic : Exploratory Programmming
Style
z
Block Diagram
z
Usage
 This style of software development is only used for the
development of small programs. Nowadays, this style is only
used by students in their labs to complete their assignments
only. This style is not really used in industries nowadays.
z
The shortcoming of this model
 Using this model, there is the exponential growth of development time effort
and cost with problem size and large-sized software becomes almost
impossible using this style of development.
 This style of development results in unmaintainable code because
programming without planning always results in unstructured and poor-quality
code.
 Also, it is difficult to use this style when there is a proper developing team
because in this style every developer uses his own intuition to develop
software.
z

More Related Content

Similar to software engineering.pptx

Top 10 custom software development methodologies
Top 10 custom software development methodologiesTop 10 custom software development methodologies
Top 10 custom software development methodologies
Chapter247 Infotech
 
Assignment
AssignmentAssignment
Assignment
Delowar hossain
 
SOFTWARE DEVELOPMENT AND PROCESS MODELS.pptx
SOFTWARE DEVELOPMENT AND PROCESS MODELS.pptxSOFTWARE DEVELOPMENT AND PROCESS MODELS.pptx
SOFTWARE DEVELOPMENT AND PROCESS MODELS.pptx
SanthanalakshmiSelva2
 
Form5 cd2
Form5 cd2Form5 cd2
Form5 cd2
smktsj2
 
Conventional and Object Oriented Software Engineering
Conventional and Object Oriented Software EngineeringConventional and Object Oriented Software Engineering
Conventional and Object Oriented Software Engineering
ssrkai2020
 
7 5-94-101
7 5-94-1017 5-94-101
7 5-94-101
Naveen J Setty
 
Software model
Software modelSoftware model
Software model
Delowar hossain
 
se.pdf
se.pdfse.pdf
e-Physical
e-Physicale-Physical
e-Physical
QaizzatNaim
 
Nota program development
Nota program developmentNota program development
Nota program development
Azmiah Mahmud
 
M256 Unit 1 - Software Development with Java
M256 Unit 1 - Software Development with JavaM256 Unit 1 - Software Development with Java
M256 Unit 1 - Software Development with Java
Yaseen
 
Software Engineering Thesis Topics In Oxford.pptx
Software Engineering Thesis Topics In Oxford.pptxSoftware Engineering Thesis Topics In Oxford.pptx
Software Engineering Thesis Topics In Oxford.pptx
Daisy Jones
 
software project management Waterfall model
software project management Waterfall modelsoftware project management Waterfall model
software project management Waterfall model
REHMAT ULLAH
 
Difference Between Agile And Waterfall Model
Difference Between Agile And Waterfall ModelDifference Between Agile And Waterfall Model
Difference Between Agile And Waterfall Model
Tammy Moncrief
 
Adv & disadv of oo ps
Adv & disadv of oo psAdv & disadv of oo ps
Adv & disadv of oo ps
vijay gupta
 
Software Life Cycle Modelsrerfgrgreg.pptx
Software Life Cycle Modelsrerfgrgreg.pptxSoftware Life Cycle Modelsrerfgrgreg.pptx
Software Life Cycle Modelsrerfgrgreg.pptx
aryanchauhan040301
 
c++ INTRODUCTION SOFTWARE CROISIS TYPES OF PRO
c++ INTRODUCTION SOFTWARE CROISIS TYPES OF PROc++ INTRODUCTION SOFTWARE CROISIS TYPES OF PRO
c++ INTRODUCTION SOFTWARE CROISIS TYPES OF PRO
Rajes Wari
 
c++ INTRODUCTION SOFTWARE CROISIS TYPES OF PRO
c++ INTRODUCTION SOFTWARE CROISIS TYPES OF PROc++ INTRODUCTION SOFTWARE CROISIS TYPES OF PRO
c++ INTRODUCTION SOFTWARE CROISIS TYPES OF PRO
Rajes Wari
 
Extreme Programming (XP).pptx
Extreme Programming (XP).pptxExtreme Programming (XP).pptx
Extreme Programming (XP).pptx
AnkitKumar891632
 
Top 12 Software Development Methodologies.pdf
Top 12 Software Development Methodologies.pdfTop 12 Software Development Methodologies.pdf
Top 12 Software Development Methodologies.pdf
SatawareTechnologies6
 

Similar to software engineering.pptx (20)

Top 10 custom software development methodologies
Top 10 custom software development methodologiesTop 10 custom software development methodologies
Top 10 custom software development methodologies
 
Assignment
AssignmentAssignment
Assignment
 
SOFTWARE DEVELOPMENT AND PROCESS MODELS.pptx
SOFTWARE DEVELOPMENT AND PROCESS MODELS.pptxSOFTWARE DEVELOPMENT AND PROCESS MODELS.pptx
SOFTWARE DEVELOPMENT AND PROCESS MODELS.pptx
 
Form5 cd2
Form5 cd2Form5 cd2
Form5 cd2
 
Conventional and Object Oriented Software Engineering
Conventional and Object Oriented Software EngineeringConventional and Object Oriented Software Engineering
Conventional and Object Oriented Software Engineering
 
7 5-94-101
7 5-94-1017 5-94-101
7 5-94-101
 
Software model
Software modelSoftware model
Software model
 
se.pdf
se.pdfse.pdf
se.pdf
 
e-Physical
e-Physicale-Physical
e-Physical
 
Nota program development
Nota program developmentNota program development
Nota program development
 
M256 Unit 1 - Software Development with Java
M256 Unit 1 - Software Development with JavaM256 Unit 1 - Software Development with Java
M256 Unit 1 - Software Development with Java
 
Software Engineering Thesis Topics In Oxford.pptx
Software Engineering Thesis Topics In Oxford.pptxSoftware Engineering Thesis Topics In Oxford.pptx
Software Engineering Thesis Topics In Oxford.pptx
 
software project management Waterfall model
software project management Waterfall modelsoftware project management Waterfall model
software project management Waterfall model
 
Difference Between Agile And Waterfall Model
Difference Between Agile And Waterfall ModelDifference Between Agile And Waterfall Model
Difference Between Agile And Waterfall Model
 
Adv & disadv of oo ps
Adv & disadv of oo psAdv & disadv of oo ps
Adv & disadv of oo ps
 
Software Life Cycle Modelsrerfgrgreg.pptx
Software Life Cycle Modelsrerfgrgreg.pptxSoftware Life Cycle Modelsrerfgrgreg.pptx
Software Life Cycle Modelsrerfgrgreg.pptx
 
c++ INTRODUCTION SOFTWARE CROISIS TYPES OF PRO
c++ INTRODUCTION SOFTWARE CROISIS TYPES OF PROc++ INTRODUCTION SOFTWARE CROISIS TYPES OF PRO
c++ INTRODUCTION SOFTWARE CROISIS TYPES OF PRO
 
c++ INTRODUCTION SOFTWARE CROISIS TYPES OF PRO
c++ INTRODUCTION SOFTWARE CROISIS TYPES OF PROc++ INTRODUCTION SOFTWARE CROISIS TYPES OF PRO
c++ INTRODUCTION SOFTWARE CROISIS TYPES OF PRO
 
Extreme Programming (XP).pptx
Extreme Programming (XP).pptxExtreme Programming (XP).pptx
Extreme Programming (XP).pptx
 
Top 12 Software Development Methodologies.pdf
Top 12 Software Development Methodologies.pdfTop 12 Software Development Methodologies.pdf
Top 12 Software Development Methodologies.pdf
 

More from Ayan974999

States of a Process in Operating Systems
States of a Process in Operating SystemsStates of a Process in Operating Systems
States of a Process in Operating Systems
Ayan974999
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for security
Ayan974999
 
The International Space Station (ISS) is the largest space station to have ev...
The International Space Station (ISS) is the largest space station to have ev...The International Space Station (ISS) is the largest space station to have ev...
The International Space Station (ISS) is the largest space station to have ev...
Ayan974999
 
Name.pptx
Name.pptxName.pptx
Name.pptx
Ayan974999
 
AYAN DAS_57_SOFT COMPUTING.pptx
AYAN DAS_57_SOFT COMPUTING.pptxAYAN DAS_57_SOFT COMPUTING.pptx
AYAN DAS_57_SOFT COMPUTING.pptx
Ayan974999
 
Computer Network.pptx
Computer Network.pptxComputer Network.pptx
Computer Network.pptx
Ayan974999
 
Numerical Methods.pptx
Numerical Methods.pptxNumerical Methods.pptx
Numerical Methods.pptx
Ayan974999
 
Gantt Chart.pptx
Gantt Chart.pptxGantt Chart.pptx
Gantt Chart.pptx
Ayan974999
 
Ayan Das_25300121057.pptx
Ayan Das_25300121057.pptxAyan Das_25300121057.pptx
Ayan Das_25300121057.pptx
Ayan974999
 
Ayan Das_25300121057.pptx
Ayan Das_25300121057.pptxAyan Das_25300121057.pptx
Ayan Das_25300121057.pptx
Ayan974999
 
Ayan Das_25300121057.pptx
Ayan Das_25300121057.pptxAyan Das_25300121057.pptx
Ayan Das_25300121057.pptx
Ayan974999
 

More from Ayan974999 (11)

States of a Process in Operating Systems
States of a Process in Operating SystemsStates of a Process in Operating Systems
States of a Process in Operating Systems
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for security
 
The International Space Station (ISS) is the largest space station to have ev...
The International Space Station (ISS) is the largest space station to have ev...The International Space Station (ISS) is the largest space station to have ev...
The International Space Station (ISS) is the largest space station to have ev...
 
Name.pptx
Name.pptxName.pptx
Name.pptx
 
AYAN DAS_57_SOFT COMPUTING.pptx
AYAN DAS_57_SOFT COMPUTING.pptxAYAN DAS_57_SOFT COMPUTING.pptx
AYAN DAS_57_SOFT COMPUTING.pptx
 
Computer Network.pptx
Computer Network.pptxComputer Network.pptx
Computer Network.pptx
 
Numerical Methods.pptx
Numerical Methods.pptxNumerical Methods.pptx
Numerical Methods.pptx
 
Gantt Chart.pptx
Gantt Chart.pptxGantt Chart.pptx
Gantt Chart.pptx
 
Ayan Das_25300121057.pptx
Ayan Das_25300121057.pptxAyan Das_25300121057.pptx
Ayan Das_25300121057.pptx
 
Ayan Das_25300121057.pptx
Ayan Das_25300121057.pptxAyan Das_25300121057.pptx
Ayan Das_25300121057.pptx
 
Ayan Das_25300121057.pptx
Ayan Das_25300121057.pptxAyan Das_25300121057.pptx
Ayan Das_25300121057.pptx
 

Recently uploaded

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 

Recently uploaded (20)

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 

software engineering.pptx

  • 1. z Name : Ayan Das Subject : Software Engineering Paper Code : ESC-501 Department : Computer Science and Engineering University Roll No: 25300121057 Year : 3rd Year Supreme Knowledge Foundation Group of Institutions
  • 2. z  Exploratory program development style refers to an informal development style or builds and fix the style in which the programmer uses his own intuition to develop a program rather than making use of the systematic body of knowledge which is categorized under the software engineering discipline.  This style of development gives complete freedom to programmers to choose activities which they like to develop software. This dirty program is quickly developed and bugs are fixed whenever it arises. Topic : Exploratory Programmming Style
  • 4. z Usage  This style of software development is only used for the development of small programs. Nowadays, this style is only used by students in their labs to complete their assignments only. This style is not really used in industries nowadays.
  • 5. z The shortcoming of this model  Using this model, there is the exponential growth of development time effort and cost with problem size and large-sized software becomes almost impossible using this style of development.  This style of development results in unmaintainable code because programming without planning always results in unstructured and poor-quality code.  Also, it is difficult to use this style when there is a proper developing team because in this style every developer uses his own intuition to develop software.
  • 6. z