assignments 3

10

Click here to load reader

Upload: kiwanuka45

Post on 17-Nov-2014

1.544 views

Category:

Documents


1 download

DESCRIPTION

pgdit

TRANSCRIPT

Page 1: Assignments 3

F-2,Block, Amity CampusSec-125, Nodia (UP)

India 201303ASSIGNMENTS

PROGRAM:SEMESTER-ISubject Name :Study COUNTRY :Permanent Enrollment Number (PEN) :Roll Number :Student Name :

INSTRUCTIONSa) Students are required to submit all three assignment sets.

ASSIGNMENT DETAILS MARKSAssignment A Subjective Questions 10Assignment B Subjective Questions + Case Study 10Assignment C Objective Questions 10

b) Total weightage given to these assignments is 30%. OR 30 Marksc) All assignments are to be completed as typed in word/pdf.d) All questions are required to be attempted.e) All the three assignments are to be completed by due dates (specified

from time to time) and need to be submitted for evaluation by Amity University.

f) The evaluated assignment marks will be made available within six weeks. Thereafter, these will be destroyed at the end of each semester.

g) The students have to attached a scan signature in the form.

Signature : _________________________________Date : _________________________________

( √ ) Tick mark in front of the assignments submittedAssignment ‘A’ Assignment ‘B’ Assignment ‘C’

Page 2: Assignments 3

SOFTWARE ENGINEERING

Assignment A1. How does Software Engineering differ from Programming? 2. What knowledge of Project Maintenance is needed for efficient Software

Engineering? 3. What does a case of tools (CASE tools) have to do with software engineering? 4. What is analysis modeling? 5. Define data dictionary giving an example of what one may contain?

Assignment B

1. How could the use of these tools minimize the duration of the software development process?

2. Give two advantages and two disadvantages of the following specification techniques:

i) Questionnaires ii) Client Documents iii) Observations

3. The source of the problem lies in the fact that ESS is using the Build-And-Fix approach. This approach should never be used to produce software as its adhoc development approach has no clearly defined phases. Moreover with the lack of project management (incl. Risk management) and quality assessment monitoring this approach is doomed to fail. In essence, the product is built and modified as many times as possible until it satisfies the client. The cost of using this approach is greater than if specifications are drawn up and a design is carefully developed.

Any model can be taken from the online notes. The models done in class include:

1) Waterfall Model 2) Prototyping Model (versions 1 and 2) 3) Incremental Model

The solution should describe the model and its phases as well as the inherent advantages and disadvantages. The use of diagrams is permitted.

Page 3: Assignments 3

Assignment C

1. In the most general sense a component is a modular building block for computer software.

A) TrueB) False

2. In the context of object-oriented software engineering a component containsA) attributes and operationsB) instances of each classC) roles for each actor (device or user)D) a set of collaborating classes

3. In traditional software engineering, modules must serve in which of the following roles?

A) Control componentB) Infrastructure componentC) Problem domain componentD) All of the above

4. Software engineers always need to create components from scratch in order to meet customer expectations fully.

A) TrueB) False

5. Which of the following is not one of the four principles used to guide component-level design?

A) Dependency Inversion PrincipleB) Interface Segregation PrincipleC) Open-Closed PrincipleD) Parsimonious Complexity Principle

6. During component-level design it is customary to ignore organization issues like subsystem membership or packaging.

A) TrueB) False

7. The use of stereotypes can help identify the nature of components at the detailed design level.

A) TrueB) False

8. Classes and components that exhibit functional, layer, or communicational cohesion are relatively easy to implement, test, and maintain.

A) TrueB) False

9. Software coupling is a sign of poor architectural design and can always be avoided in every system.

A) TrueB) False

Page 4: Assignments 3

10. In component design, elaboration requires which of the following elements to be described in detail?

A) Source codeB) AttributesC) InterfacesD) OperationsE) b, c and d

11. In component-level design "persistent data sources" refer toA) Component librariesB) DatabasesC) FilesD) All of the aboveE) both b and c

12. The object constraint language (OCL) complements UML by allowing a software engineer to use a formal grammar to construct unambiguous statements about design model elements.

A) TrueB) False

13. OCL is not strong enough to be used to describe pre- or post conditions for design actions.

A) TrueB) False

14. Which of these constructs is used in structured programming?A) branchingB) conditionC) repetitionD) sequenceE) b, c, and d

15. Which of these is a graphical notation for depicting procedural detail?A) process diagramB) decision tableC) ER diagramD) flowchart

16. A decision table should be usedA) to document all conditional statementsB) to guide the development of the project management planC) only when building an expert systemD) when a complex set of conditions and actions appears in a

component17. A program design language (PDL) is often a

A) combination of programming constructs and narrative textB) legitimate programming language in its own rightC) machine readable software development languageD) useful way to represent software architecture

Page 5: Assignments 3

18. Which of these criteria are useful in assessing the effectiveness of a particular design notation?

A) maintainabilityB) modularityC) simplicityD) sizeE) a, b, and c

19. Which of the following activities is part in the cleanroom process?A) increment planningB) requirements gatheringC) statistical use testingD) all of the above

20. The cleanroom strategy is based on the ________ software process model.A) evolutionaryB) incrementalC) revolutionaryD) spiral

21. The cleanroom strategy relies onA) exhaustive testingB) extensive unit testing of all modulesC) tests that exercise the software as it is really usedD) white box testing strategies

22. Use of formal program correctness proofs as part of the cleanroom process eliminates the need to do any testing for software defects.

A) TrueB) False

23. Which of the following characteristics distinguish cleanroom software engineering from conventional software engineering?

A) explicit use of statistical quality controlB) relies heavily on statistical use testingC) use of formal proof methods for design verificationD) all of the above

24. In cleanroom software engineering a "box" encapsulates some system aspect at a particular level of detail.

A) TrueB) False

25. This box specification describes an abstraction, stimuli, and response.A) black boxB) clear boxC) state boxD) white box

26. This box specification describes the architectural design for some system component.

A) black box

Page 6: Assignments 3

B) clear boxC) state boxD) white box

27. This box specification is closely aligned with procedural design and structured programming.

A) black boxB) clear boxC) state boxD) white box

28. In clean room software engineering the structured programming approach is used to

A) refine data designB) refine function designC) refine usage test casesD) both a and b

29. To prove a design correct you must identify all conditions and then prove a random statistical sample of these conditions is correct.

A) TrueB) False

30. By using only structured programming constructs as you create a procedural design, you make the work of proving design correctness much easier.

A) TrueB) False

31. Which of the following is not an advantage of using rigorous correctness verification of each refinement of the clear box design?

A) improves performance of codeB) produces better code than unit testingC) reduces verification effortD) results in near zero defect levels

32. Statistical use testing relies on probability distributions based onA) mixture of control structures used in the programB) order in which the module executeC) the way software will actually be usedD) user interface design standards

33. Certification of an increment is complete once it has passed the formal verification process.

A) TrueB) False

34. Which of the following models is part of the cleanroom certification process?A) component modelB) sampling modelC) both a and bD) none of the above

35. In HTTP communications, what role does the web browser play?

Page 7: Assignments 3

a. As a clientb. As a serverc. As both as a client and serverd. None of the above

36. Which of the following is not found in a URL?a. Pathb. Postc. Protocold. Port

37. Which of the following character combinations are used to separate name/value pairs in a HTTP query string?

a. $ and &b. = and &c. / and =d. $ and /

38. Which statement is false?a. Not all internet servers are part of the World Wide Web.b. The default port number for HTTP is 80.c. HTTP responses always return HTML.d. None of the above.

39. Which of the following is not normally used as a server-side scripting language?

a. PHPb. Java Appletsc. PERLd. ASP

40. Client-side scripting programs are executed by:a. the web browser before making a HTTP request.b. the web server after receiving a HTTP request, but before HTML is

generated.c. the web browser after receiving a HTTP response containing HTML.d. the web server after generating HTML but before sending a HTTP

response.