All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
AI Study Help
New
Search
Search
Sign In
Register
study help
business
software testing and quality assurance
Questions and Answers of
Software Testing And Quality Assurance
Suggest situations where it is unwise or impossible to provide a consistent user interface.
What factors have to be taken into account in the design of a menu-based interface for ‘walkup’systems such as bank ATMs? Write a critical commentary on the interface of an ATM that you use.
Suggest ways in which the user interface to an e-commerce system such as an online bookstore or music retailer might be adapted for users who have a visual impairment or problems with muscular
Design a process architecture for an environmental monitoring system that collects data from a set of air quality sensors situated around a city. There are 5000 sensors organised into 100
Using the real-time system design techniques discussed in this chapter, redesign the weather station data collection system covered in Chapter 14 as a stimulus-response system.
Explain why adopting an approach to design that is based on loosely coupled objects that hide information about their representation should lead to a design that may be readily modified.
Using examples, explain the difference between an object and an object class.
Under what circumstances might you develop a design where objects execute concurrently?
Using the UML graphical notation for object classes, design the following object classes identifying attributes and operations. Use your own experience to decide on the attributes and operations that
Develop the design of the weather station in detail by proposing interface descriptions of the objects shown in Figure 14.11. These may be expressed in Java, in C++ or in the UML.
Develop the design of the weather station to show the interaction between the data collection sub-system and the instruments that collect weather data. Use sequence charts to show this interaction.
Identify possible objects in the following systems and develop an object-oriented design for them. You may make any reasonable assumptions about the systems when deriving the design.■ A group diary
Write precise interface definitions in Java or C++ for the objects you have defined in Exercise 14.7.
Draw a sequence diagram showing the interactions of objects in a group diary system when a group of people arrange a meeting.
Draw a statechart showing the possible state changes in one or more of the objects that you have defined in Exercise 14.7.
Using examples, explain why real-time systems usually have to be implemented using concurrent processes.
Explain why an object-oriented approach to software development may not be suitable for real-time systems.
Draw state machine models of the control software for the following systems:■ An automatic washing machine that has different programs for different types of clothes.■ The software for a compact
Discuss the advantages of graphical information display and suggest four applications where it would be more appropriate to use graphical rather than digital displays of numeric information.
Discuss the differences between verification and validation, and explain why validation is a particularly difficult process.
Consult the literature and find other design quality metrics that have been suggested apart from those discussed here. Consider these metrics in detail and assess whether they are likely to be of
Are process improvement programmes, which involve measuring the work of people in the process and changing the process, inherently dehumanising? What resistance to a process improvement programme
Explain why you should not use the title of a document to identify the document in a configuration management system. Suggest a standard for a document identification scheme that may be used for all
Using an object-oriented approach (see Chapter 8), design a model of a configuration database that records information about system components, versions, releases and changes.Some requirements for
Using a data-flow diagram, describe a change management procedure that might be used in a large organisation concerned with developing software for external clients. Changes may be suggested either
How does the use of a project-based configuration management system such as CVS simplify the version management process?
Explain why an attribute-based version identification system makes it easier to discover all of the components making up a specific version of a system.
Describe the difficulties that may arise when building a system from its components. What particular problems might occur when a system is built on a host computer for some target machine?
With reference to system building, explain why you may sometimes have to maintain obsolete computers on which large software systems were developed.
A common problem with system building occurs when physical file names are incorporated in system code and the file structure implied in these names differs from that of the target machine. Write a
Describe five factors that should be taken into account by engineers during the process of building a release of a large software system.
Describe two ways in which system-building tools can optimise the process of building a version of a system from its components.
Explain the important differences between application security engineering and infrastructure security engineering.
LIBSYS is a system for document distribution that has been discussed in earlier chapters.For the LIBSYS system, suggest an example of an asset, exposure, vulnerability, attack, threat and control.
What are the advantages and disadvantages of using a goal-based rather than a practicebased maturity model?
What is the difference between generic and specific goals in the CMMI?
Explain why it is difficult to validate the relationships between internal product attributes such as cyclomatic complexity and external attributes such as maintainability.
Suggest how automated software measurement could be used to support extreme programming (discussed in Chapter 17).
Do software standards stifle technological innovation?
A colleague who is a very good programmer produces software with a low number of defects but she consistently ignores organisational quality standards. How should the managers in the organisation
Suggest process models for the following processes:■ Lighting a wood fire■ Cooking a three-course meal (you chose the menu)■ Writing a small (50-line) program.
Under what circumstances is product quality likely to be determined by the quality of the development team? Give examples of the types of software product that are particularly dependent on
Explain why a methodical process is not necessarily a managed process as defined in Section 28.2.
Suggest three specialised software tools that might be developed to support a process improvement programme in an organisation.
Assume that the goal of process improvement in an organisation is to increase the number of reusable components that are produced during development. Suggest three questions in the GQM paradigm that
Describe three types of software process metric that may be collected as part of a process improvement process. Give one example of each type of metric.
Design a process for assessing and prioritising process change proposals. Document this process as a process model showing the roles involved in this process.
Give two advantages and two disadvantages of the approach to process assessment and improvement that is embodied in the process improvement frameworks such as the CMMI.
Under what circumstances would you recommend the use of the staged representation of the CMMI?
Explain why there is a need for both preliminary risk assessment and life cycle risk assessment during the development of a system.
Using your answers to question 2 about the LIBSYS system, assess the risks associated with that system and propose 2 system requirements that might reduce these risks.
Explain, using an analogy drawn from outside of software engineering, why a layered approach to asset protection should be used.
In section 31.2.1, I introduced an example of a company that has developed a catalogue service that is used by the web-based procurement systems used by customers. Using BPMN, design a workflow that
Explain what is meant by a ‘compensation action’ and, using an example, show why these actions may have to be included in workflows.
For the example of the vacation package reservation service, design a workflow that will book ground transportation for a group of passengers arriving at an airport. They should be given the option
Using an example, explain in detail why the thorough testing of services that include compensation actions is difficult.
What are the different types of stakeholder concern that may arise in a large system? How can aspects support the implementation of each of these types of concern?
Summarise what is meant by tangling and scattering. Using examples, explain why tangling and scattering can cause problems when system requirements change.
What is the difference between a join point and a pointcut? Explain how these facilitate the weaving of code into a program to handle cross-cutting concerns.
Using the LIBSYS system, which has been discussed extensively elsewhere in the book, show how a design for this could be organised as a core system plus extensions. What functionality would be
What viewpoints should be considered when developing a requirements specification for a patient records system for mental health patients, as discussed in Chapter 30? What are likely to be the most
Using the outline functionality for each viewpoint shown in Figure 32.9, identify six further use cases for the equipment inventory system, in addition to those shown in Figure 32.11.Where
Using the aspect stereotype organisation illustrated in Figure 32.15, develop in more detail the Ordering and Monitor aspects, shown in Figure 32.14.
Explain how aspect interference can arise and suggest what should be done during the system design process to reduce the problems of aspect interference.
Explain why expressing pointcut specifications as patterns, increases the problems of testing and debugging aspect-oriented programs. To answer this, think about how program testing normally involves
Giving reasons for your answer, suggest two important types of application that are unlikely to make use of a service-oriented approach.
Design possible input and output messages for the services shown in Figure 31.12. You may specify these in the UML or in XML.
Explain why it is important to use diverse technologies to support distributed systems in situations where system availability is critical.
What is social engineering? Why is it difficult to protect against it in large organisations?
For any off-the-shelf software system that you use (e.g. Microsoft Word), analyse the configuration facilities included and discuss any problems that you find.
Explain how the complementary strategies of resistance, recognition and recovery may be used to enhance the survivability of a system.
For the equity trading system discussed in section
and illustrated in Figure 30.9, suggest two further plausible attacks on the system and propose possible strategies to counter these attacks.
What are the important distinctions between services and software components?
Explain why service-oriented architectures should be based on standards.
Why is it important to minimise the number of messages exchanged by services?
Explain why services should always include an exception interface which is used to report faults and exceptions to service clients.
Using the same notation, extend Figure
to include definitions for MaxMinType and InDataFault. The temperatures should be represented as integers with an additional field indicating whether the temperature is in degrees Fahrenheit or
Define an interface specification for the Currency Converter and Check credit rating services shown in Figure 31.8.
Suggest how you could use aspects to simplify the debugging of programs.
Explain why it is not necessary for a program to be completely free of defects before it is delivered to its customers. To what extent can testing be used to validate that the program is fit for its
Using the approach discussed here for object testing, design test cases to test the states of the microwave oven whose state model is defined in Figure 8.5.
You have been asked to test a method called catWhiteSpace in a Paragraph object that, within the paragraph, replaces sequences of blank characters with a single blank character. Identify testing
Give three situations where the testing of all independent paths through a program may not detect program errors.
Describe how you would go about validating the reliability specification for a supermarket system that you specified in Exercise 9.8. Your answer should include a description of any validation tools
Explain why it is practically impossible to validate reliability specifications when these are expressed in terms of a very small number of failures over the total lifetime of a system.
Using the literature as background information, write a report for management (who have no previous experience in this area) on the use of reliability growth models.
Is it ethical for an engineer to agree to deliver a software system with known faults to a customer? Does it make any difference if the customer is told of the existence of these faults in advance?
Explain why ensuring system reliability is not a guarantee of system safety.
The door lock control mechanism in a nuclear waste storage facility is designed for safe operation. It ensures that entry to the storeroom is only permitted when radiation shields are in place or
controls the door-locking mechanism. Note that the safe state is that entry should not be permitted. Develop a safety argument that shows that this code is potentially unsafe. Modify the code to make
Using the specification for the dosage computation given in Chapter 10 (Figure 10.11), write the Java method computeInsulin as used in Figure 24.6. Construct an informal safety argument that this
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.
Why is it necessary to include details of system changes in a software safety case?
Explain why interface testing is necessary even when individual components have been extensively validated through component testing and program inspections.
What are the problems in developing performance tests for a distributed database system such as the LIBSYS system?
The test plan in Figure 22.4 has been designed for custom systems that have a separate requirements document. Suggest how the test plan structure might be modified for testing shrink-wrapped software
Explain why program inspections are an effective technique for discovering errors in a program. What types of error are unlikely to be discovered through inspections?
Suggest why an organisation with a competitive, elitist culture would probably find it difficult to introduce program inspections as a V & V technique.
Showing 1300 - 1400
of 3313
First
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Last