All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
AI Study Help
New
Search
Search
Sign In
Register
study help
business
software testing and quality assurance
Questions and Answers of
Software Testing And Quality Assurance
Suggest why the savings in cost from reusing existing software is not simply proportional to the size of the components that are reused.
Give four circumstances where you might recommend against software reuse.
Why are patterns an effective form of design reuse? What are the disadvantages to this approach to reuse?
Apart from the application domains discussed here, suggest two other domains where generator-based reuse could be successful. Explain why you think that this approach to reuse will be cost-effective
Explain why adaptors are usually needed when systems are constructed by integrating COTS products.
Identify six possible risks that can arise when systems are constructed using COTS. What steps can a company take to reduce these risks?
Using a general information system architecture (discussed in Chapter 13) as a starting point, design an application family of library information systems that could be used in book, film, music and
Using the example of the weather station system described in Chapter 14, suggest an architecture for a family of applications that are concerned with remote monitoring and data collection.
The reuse of software raises a number of copyright and intellectual property issues. If a customer pays a software contractor to develop a system, who has the right to reuse the developed code? Does
Why is it important that all component interactions are defined through requires and provides interfaces?
The principle of component independence means that it ought to be possible to replace one component with another that is implemented in a completely different way. Using an example, discuss how such
A charity has asked you to prototype a system that keeps track of all donations they have received. This system has to maintain the names and addresses of donors, their particular interests, the
A software manager is involved in the project development of a software design support system that supports the translation of software requirements to a formal software specification.Comment on the
Consider the error messages produced by MS-Windows, Linux, Mac OS or some other operating system. Suggest how these might be improved.
Write possible interaction scenarios for the following systems:■ Using a web-based theatre booking service to order theatre tickets and pay for them by credit card■ Ordering the same tickets
Under what circumstances could you use ‘Wizard of Oz’ prototyping? For what type of systems is this approach unsuitable?
Design a questionnaire to gather information about the user interface of some tool (such as a word processor) with which you are familiar. If possible, distribute this questionnaire to a number of
Discuss whether it is ethical to instrument software to monitor its use without telling endusers that their work is being monitored.
What ethical issues might user interface designers face when trying to reconcile the needs of end-users of a system with the needs of the organisation that is paying for the system to be developed.
Explain why the rapid delivery and deployment of new systems is often more important to businesses than the detailed functionality of these systems.
Explain how the principles underlying agile methods lead to the accelerated development and deployment of software.
When would you recommend against the use of an agile method for developing a software system?
Extreme programming expresses user requirements as stories, with each story written on a card. Discuss the advantages and disadvantages of this approach to requirements description.
Explain why test-first development helps the programmer develop a better understanding of the system requirements. What are the potential difficulties with test-first development?
Suggest four reasons why the productivity rate of programmers working as a pair is roughly the same as two programmers working individually.
You have been asked to investigate the feasibility of prototyping in the software development process in your organisation. Write a report for your manager discussing the classes of project for which
What are the fundamental differences between components and web services (see Chapter 12).
Why is it important that components should be based on a standard component model?
Using an example of a component that implements an abstract data type such as a stack or a list, show why it is usually necessary to extend and adapt components for reuse.
Give two reasons why all the system versions in an N-version system may fail in a similar way.
Using the techniques discussed here to produce safe software obviously involves considerable extra costs. What extra costs can be justified if 100 lives would be saved over the 15-year lifetime of a
Explain why a software system that is used in a real-world environment must change or become progressively less useful.
Explain the rationale underlying Lehman’s laws. Under what circumstances might the laws break down?
Briefly describe the three types of software maintenance. Why is it sometimes difficult to distinguish between them?
As a software project manager in a company that specialises in the development of software for the offshore oil industry, you have been given the task of discovering the factors that affect the
From Figure 21.7, you can see that impact analysis is an important sub-process in the software evolution process. Using a diagram, suggest what activities might be involved in change impact analysis.
What are the principal factors that affect the costs of system re-engineering?
What are the essential conditions for software re-engineering to be successful?
Under what circumstances might an organisation decide to scrap a system when the system assessment suggests that it is of high quality and high business value.
What are the strategic options for legacy system evolution? When would you normally replace all or part of a system rather than continue maintenance of the software (with or without reengineering)?
Explain why problems with support software might mean that an organisation has to replace its legacy systems.
Do software engineers have a professional responsibility to produce code that can be readily evolved even if this is not explicitly requested by their employer?
It has been suggested that the control software for a radiation therapy machine (used to treat patients with cancer) should be implemented using N-version programming. Comment on whether you think
Suggest circumstances where it is appropriate to use a fault-tolerant architecture when implementing a software-based control system and explain why this approach is required.
Explain why it is very difficult to validate a reusable component without the component source code. In what ways would a formal component specification simplify the problems of validation?
Design a reusable component that implements the search feature of the LIBSYS system discussed in previous chapters. This is not a simple keyword search of web pages. You have to be able to search the
Using examples, illustrate the different types of adaptors needed to support sequential composition, hierarchical composition and additive composition.
Design the interfaces of components that might be used in a system in an emergency control room. You should design interfaces for a call-logging component that records calls made, and a
It has been suggested that an independent certification authority should be established.Vendors would submit their components to this authority, which would validate that the component was
Give four reasons why it is hardly ever cost-effective for companies to ensure that their software is free of faults.
Give two examples of diverse, redundant activities that might be incorporated into dependable processes.
Explain why inheritance is a potentially error-prone construct and why its use should be minimised when developing critical systems in an object-oriented language.
Discuss the problems of developing and maintaining ‘nonstop’ systems such as telephone exchange software. How might exceptions be used in the development of such systems?
Explain why you should explicitly handle all exceptions in a fault-tolerant system.
Briefly describe forward and backward fault recovery strategies. Why is backward fault recovery used more often than forward error recovery? Give two examples of classes of systems where backward
What is essential for forward error recovery to be implemented in a fault-tolerant system? Is forward error recovery possible in interactive systems?
Design an abstract data type or object class called RobustList that implements forward error recovery in a linked list. You should include operations to check the list for corruption and to re-build
The management of an organisation has asked you to carry out a system assessment and suggested that they would like the results of that assessment to show that the system is obsolete and that it
Explain why it may be necessary to design the system architecture before the specifications are written.
How is the CORBA IDL used to support communications between objects that have been implemented in different programming languages? Explain why this approach may cause performance problems if there
Using a distributed object approach, propose an architecture for a national theatre booking system where users can check seat availability and book seats at a group of theatres. The system should
Give two advantages and two disadvantages of decentralised and semi-centralised peer-topeer architectures.
What are the advantages of dynamic binding in a service-oriented system?
For the in-car information system, explain why it is best that the in-car software communicates with an aggregation service rather than directly with the information services.You should consider
The development of service-oriented computing has been based on the early specification and adoption of standards. Discuss the general role of standardisation in supporting and restricting
Explain how the generic applications architectures described here can be used to help the designer make decisions about software reuse.
Using the four basic application types introduced in this chapter, classify the following systems and explain your classification:■ A point-of-sale system in a supermarket■ A system that sends
Based on an input-process-output model, expand the Compute salary function in Figure 13.2 and draw a data-flow diagram that shows the computations carried out in that function. You need the following
Explain why transaction management is necessary in systems where user inputs can result in database changes.
Using the basic model of an information system as presented in Figure 13.6, show the components of an information system that allows users to view information about flights arriving and departing
Using the layered architecture shown in Figure 13.8, show the components of a resource management system that could be used to handle hotel room bookings.
In an editing system, all user interface events can be translated into implicit or explicit commands. Explain why, in Figure 13.10, the Event object therefore communicates directly with the editor
Explain why the use of distributed objects with an object request broker simplifies the implementation of scalable client–server systems. Illustrate your answer with an example.
What are the basic facilities that must be provided by an object request broker?
Explain why design conflicts might arise when designing an architecture where availability and security requirements are the most important functional requirements.
Construct a table showing the advantages and disadvantages of the structural models discussed in this chapter.
Giving reasons for your answer, suggest an appropriate structural model for the following systems:■ An automated ticket-issuing system used by passengers at a railway station■ A
Design an architecture for the above systems based on your choice of model. Make reasonable assumptions about the system requirements.
Real-time systems usually use event-driven models of control. Under what circumstances would you recommend the use of a call–return control model for a real-time system?
Giving reasons for your answer, suggest an appropriate control model for the following systems:■ A batch processing system that takes information about hours worked and pay rates and prints salary
Discuss their advantages and disadvantages as far as distributability is concerned of the data-flow model and the object model. Assume that both single machine and distributed versions of an
You are given two integrated CASE toolsets and are asked to compare them. Explain how you could use a reference model for CASE (Brown, et al., 1992) to make this comparison.
Should there be a separate profession of ‘software architect’ whose role is to work independently with a customer to design a software system architecture? This system would then be implemented
Explain why distributed systems are inherently more scalable than centralised systems. What are the likely limits on the scalability of the system?
What is the fundamental difference between a fat-client and a thin-client approach to client–server systems development? Explain why the use of Java as an implementation language blurs the
Your customer wants to develop a system for stock information where dealers can access information about companies and can evaluate various investment scenarios using a simulation system. Each dealer
By making reference to the application model shown in Figure 12.4, discuss problems that might arise when converting a 1980s mainframe legacy system for insurance policy processing to a
Modify Figure 13.10 to show the generic architecture of a spreadsheet system. Base your design on the features of any spreadsheet system that you have used.
What is the function of the syntax tree component in a language-processing system?
Using the generic model of a language-processing system presented here, design the architecture of a system that accepts natural language commands and translates these into database queries in a
Discuss the strengths and weaknesses of Java as a programming language for real-time systems. To what extent will the problems of real-time programming on Java disappear when faster processors are
A train protection system automatically applies the brakes of a train if the speed limit for a segment of track is exceeded or if the train enters a track segment that is currently signalled with a
Suggest a possible process architecture for this system. Document this process architecture using the notation shown in Figure 15.8, clearly indicating if stimuli are periodic or aperiodic
Design a process architecture for an environmental monitoring system that collects data from a set of air quality sensors situated around a city. There are 5000 sensors organised into 100
Discuss the strengths and weaknesses of Java as a programming language for real-time systems. To what extent will the problems of real-time programming on Java disappear when faster processors are
A train protection system automatically applies the brakes of a train if the speed limit for a segment of track is exceeded or if the train enters a track segment that is currently signalled with a
Suggest a possible process architecture for this system. Document this process architecture using the notation shown in Figure 15.8, clearly indicating if stimuli are periodic or aperiodic.
If a periodic process in the on-board train protection system is used to collect data from the trackside transmitter, how often must it be scheduled to ensure that the system is guaranteed to collect
You are asked to work on a real-time development project for a military application but have no previous experience of projects in that domain. Discuss what you, as a professional software engineer,
I suggested in Section 16.1 that the objects manipulated by users should be drawn from their domain rather than from a computer domain. Suggest appropriate objects for the following users and
Showing 1200 - 1300
of 3313
First
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Last