All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
AI Study Help
New
Search
Search
Sign In
Register
study help
business
software testing and quality assurance
Questions and Answers of
Software Testing And Quality Assurance
=+e. An activity specified by your instructor.
=+8.10. What do use case "exceptions" represent?
=+8.11. Write a user story for one of the activities listed in question 8.9.
=+8.12. Consider the use case you created in question 8.9, write a nonfunctional requirement for the application.
=+8.13. Describe what an analysis pattern is in your own words.
=+8.14. Using the template presented in Section 8.5.2, suggest one or more analysis pattern for the following application domains:a. Accounting software.b. E-mail software.c. Internet browsers
=+d. Word-processing software.e. Website creation software.
=+1. An application domain specified by your instructor.
=+8.15. What does win-win mean in the context of negotiation during the requirements engi-neering activity?
=+8.16. What do you think happens when requirement validation uncovers an error? Who is involved in correcting the error?
=+8.17. What five tasks make up a comprehensive requirements monitoring program?
=+Can the actor take some other action at this point?
=+Is it possible that the actor will encounter some error condition at this.
=+point? If so, what might it be?
=+Is it possible that the actor will encounter some other behavior at this point(e.g ., behavior that is invoked by some event outside the actor's control)? If so, what might it be?
=+. Are there cases in which some "validation function" occurs during this use case?
=+ This implies that validation function is invoked and a potential error condition might occur.
=+. Are there cases in which a supporting function (or actor) will fail to re-spond appropriately? For example, a user action awaits a response but the function that is to respond times out..
=+Can poor system performance result in unexpected or improper user ac-tions? For example, a Web-based interface responds too slowly, resulting in a user making multiple selects on a processing
=+1.What mechanisms protect unauthorized use of this capability by employees of SafeHome Products?
=+2.Is security sufficient? Hacking into this feature would represent a major invasion of privacy.
=+3. Will system response via the Internet be accept-able given the bandwidth required for camera views?
=+4. Will we develop a capability to provide video at a higher frames-per-second rate when high-
=+bandwidth connections are available?
=+9.1. Is it possible to begin coding immediately after a requirements modelhas been created?
=+Explain your answer and then argue the counterpoint.
=+9.2. An analysis rule of thumb is that the model "should focus on requirements that are
=+visible within the problem or business domain. "What types of requirements are not visible in these domains? Provide a few examples
=+9.3. What is the purpose of domain analysis? How is it related to the concept of require-ments patterns?
=+9.4. Is it possible to develop an effective analysis model without developing all four ele-ments shown in Figure 9.3? Explain.
=+9.5. The department of public works for a large city has decided to develop a Web-based pothole tracking and repair system (PHTRS). A description follows:Citizens can log onto a website and report
=+potholes are reported they are logged within a "public works department repair system" and are assigned an identifying number, stored by street address, size (on a scale of 1 to 10), location
=+dress), and repair priority (determined from the size of the pothole). Work order data are associated with each pothole and include pothole location and size, repair crew identifying number, number
=+amount of filler material used, and cost of repair (computed from hours applied, number of people, material and equipment used). Finally, a damage file is created to hold information about reported
=+Draw a UML use case diagram PHTRS system. You'llhave to make a number of assumptions about the manner in which a user interacts with this system.
=+9.6. Write two or three use cases that describe the roles of various actors in the PHTRS described in Problem 9.5.
=+9.7. Develop an activity diagram for one aspect of PHTRS.
=+9.8. Develop a swimlane diagram for one or more aspects of PHTRS.
=+10.1. You have been asked to build one of the following systems:
=+a. A network-based course registration system for your university.
=+b. A Web-based order-processing system for a computer store.
=+c. A simple invoicing system for a small business.
=+d. An Internet-based cookbook that is built into an electric range or microwave
=+Select the system that is ofinterest to you and develop a processing narrative. Then use the grammatical parsing technique to identify candidate objects and classes.
=+10.2. Develop a set of operations that are used within the classes identified in Problem 10.1.
=+10.3. Develop a class model for the PHTRS system present in Problem 9.5.
=+10.4. Write a template-based use case for the SafeHome home management system
=+described informally in the sidebar following Section 10.4.
=+10.5. Develop a complete set of CRC model index cards on the product or system you chose as part of Problem 10.1.
=+10.6. Conduct a review of the CRC index cards with your colleagues. How many additional classes, responsibilities, and collaborators were added as a consequence of the review?
=+10.7. What is an analysis package and how might it be used?
=+Q1:What output video resolution is provided by SafeHome cameras?
=+What occurs if an alarm condition is encountered while the cam-Q2:era is being monitored?
=+How does the system handle cameras that can be panned and Q3 zoomed?
=+What information should be provided along with the camera view?Q4:
=+(For example, location? time/date? last previous access?)
=+Should certain elements be easier to reach (require fewer navigation
=+steps) than others? What is the priority for presentation?
=+Should certain elements be emphasized to force users to navigate in their direction?
=+How should navigation errors be handled?
=+Should navigation to related groups of elements be given priority over navigation to a specific element?
=+Should navigation be accomplished via links, via search-based access, or by some other means?
=+Should certain elements be presented to users based on the context of previous navigation actions?
=+Should a navigation log be maintained for users?
=+Should a full navigation map or menu (as opposed to a single "back" link
=+or directed pointer) be available at every point in a user's interaction?
=+Should navigation design be driven by the most commonly expected
=+user behaviors or by the perceived importance of the defined WebApp elements?
=+Can a user "store" his previous navigation through the WebApp to expe-dite future usage?
=+For which user category should optimal navigation be designed?
=+How should links external to the WebApp be handled? Overlaying the
=+existing browser window? As a new browser window? As a separate frame?
=+11.1. There are two different types of "states" that behavioral models can represent. What are they?
=+11.2. How does a sequence diagram differ from a state diagram?
=+ How are they similar?
=+11.3. Suggest three requirements patterns for a modern mobile phone and write a brief description of each. Could these patterns be used for other devices? Provide an example.
=+11.4. Select one of the patterns you developed in Problem 11.3 and develop a reason-
=+ably complete pattern description similar in content and style to the one presented in Section 11.4.2.
=+11.5. How much analysis modeling do you think would be required for www.safehomeassured.com?
=+Would each of the model types described in Section 11.5.3 be required?
=+11.6. What is the purpose of the interaction model for a WebApp?
=+11.7. It could be argued that a WebApp functional model should be delayed until design.Present pros and cons for this argument.
=+11.8. What is the purpose of a configuration model?
=+11.9. How does the navigation model differ from the interaction model?
=+1. Examine the information domain Evaluate and select design patterns for a design model and design appropriate data
=+class or a subsystem.structures for data objects and their Review design classes and revise as required.attributes.
=+5. Design any interface required with external systems
=+2. Using the andysis model, select an architectural or devices.style (pattern) that is appropriate for the software.
=+6. Design the user interface:
=+3. Partition the analysis model into design subsystems Review results of task analysis.and allocate these subsystems within the architecture:
=+Specify action sequence based on user scenarios.Be certain that each subsystem is functionally
=+Create behavioral model of the interface.cohesive.
=+Define interface objects, control mechanisms.
=+Design subsystem interfaces.
=+Review the interface design and revise as
=+Allocate analysis classes or functions to each required.subsystem.7. Conduct component-level design.
=+4.Create a set of design classes or components:
=+Specify all algorithms at a relatively low level of Translate analysis class description into a design abstraction.class.
=+Refine the interface of each component.Check each design class against design criteria;
=+Define component-level data structures.consider inheritance issues.
Showing 1700 - 1800
of 3313
First
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Last