All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
software testing and quality assurance
Questions and Answers of
Software Testing And Quality Assurance
Explain why you should not use the title of a document to identify the document in a configuration management system. Suggest a standard for a document identification scheme that may be used for all
Using an object-oriented approach (see Chapter 8), design a model of a configuration database that records information about system components, versions, releases and changes.Some requirements for
Using a data-flow diagram, describe a change management procedure that might be used in a large organisation concerned with developing software for external clients. Changes may be suggested either
How does the use of a project-based configuration management system such as CVS simplify the version management process?
Explain why an attribute-based version identification system makes it easier to discover all of the components making up a specific version of a system.
Describe the difficulties that may arise when building a system from its components. What particular problems might occur when a system is built on a host computer for some target machine?
With reference to system building, explain why you may sometimes have to maintain obsolete computers on which large software systems were developed.
A common problem with system building occurs when physical file names are incorporated in system code and the file structure implied in these names differs from that of the target machine. Write a
Describe five factors that should be taken into account by engineers during the process of building a release of a large software system.
Describe two ways in which system-building tools can optimise the process of building a version of a system from its components.
Explain the important differences between application security engineering and infrastructure security engineering.
LIBSYS is a system for document distribution that has been discussed in earlier chapters.For the LIBSYS system, suggest an example of an asset, exposure, vulnerability, attack, threat and control.
What are the advantages and disadvantages of using a goal-based rather than a practicebased maturity model?
What is the difference between generic and specific goals in the CMMI?
Explain why it is difficult to validate the relationships between internal product attributes such as cyclomatic complexity and external attributes such as maintainability.
Suggest how automated software measurement could be used to support extreme programming (discussed in Chapter 17).
Do software standards stifle technological innovation?
A colleague who is a very good programmer produces software with a low number of defects but she consistently ignores organisational quality standards. How should the managers in the organisation
Suggest process models for the following processes:■ Lighting a wood fire■ Cooking a three-course meal (you chose the menu)■ Writing a small (50-line) program.
Under what circumstances is product quality likely to be determined by the quality of the development team? Give examples of the types of software product that are particularly dependent on
Explain why a methodical process is not necessarily a managed process as defined in Section 28.2.
Suggest three specialised software tools that might be developed to support a process improvement programme in an organisation.
Assume that the goal of process improvement in an organisation is to increase the number of reusable components that are produced during development. Suggest three questions in the GQM paradigm that
Describe three types of software process metric that may be collected as part of a process improvement process. Give one example of each type of metric.
Design a process for assessing and prioritising process change proposals. Document this process as a process model showing the roles involved in this process.
Give two advantages and two disadvantages of the approach to process assessment and improvement that is embodied in the process improvement frameworks such as the CMMI.
Under what circumstances would you recommend the use of the staged representation of the CMMI?
Explain why there is a need for both preliminary risk assessment and life cycle risk assessment during the development of a system.
Using your answers to question 2 about the LIBSYS system, assess the risks associated with that system and propose 2 system requirements that might reduce these risks.
Explain, using an analogy drawn from outside of software engineering, why a layered approach to asset protection should be used.
In section 31.2.1, I introduced an example of a company that has developed a catalogue service that is used by the web-based procurement systems used by customers. Using BPMN, design a workflow that
Explain what is meant by a ‘compensation action’ and, using an example, show why these actions may have to be included in workflows.
For the example of the vacation package reservation service, design a workflow that will book ground transportation for a group of passengers arriving at an airport. They should be given the option
Using an example, explain in detail why the thorough testing of services that include compensation actions is difficult.
What are the different types of stakeholder concern that may arise in a large system? How can aspects support the implementation of each of these types of concern?
Summarise what is meant by tangling and scattering. Using examples, explain why tangling and scattering can cause problems when system requirements change.
What is the difference between a join point and a pointcut? Explain how these facilitate the weaving of code into a program to handle cross-cutting concerns.
Using the LIBSYS system, which has been discussed extensively elsewhere in the book, show how a design for this could be organised as a core system plus extensions. What functionality would be
What viewpoints should be considered when developing a requirements specification for a patient records system for mental health patients, as discussed in Chapter 30? What are likely to be the most
Using the outline functionality for each viewpoint shown in Figure 32.9, identify six further use cases for the equipment inventory system, in addition to those shown in Figure 32.11.Where
Using the aspect stereotype organisation illustrated in Figure 32.15, develop in more detail the Ordering and Monitor aspects, shown in Figure 32.14.
Explain how aspect interference can arise and suggest what should be done during the system design process to reduce the problems of aspect interference.
Explain why expressing pointcut specifications as patterns, increases the problems of testing and debugging aspect-oriented programs. To answer this, think about how program testing normally involves
Giving reasons for your answer, suggest two important types of application that are unlikely to make use of a service-oriented approach.
Design possible input and output messages for the services shown in Figure 31.12. You may specify these in the UML or in XML.
Explain why it is important to use diverse technologies to support distributed systems in situations where system availability is critical.
What is social engineering? Why is it difficult to protect against it in large organisations?
For any off-the-shelf software system that you use (e.g. Microsoft Word), analyse the configuration facilities included and discuss any problems that you find.
Explain how the complementary strategies of resistance, recognition and recovery may be used to enhance the survivability of a system.
For the equity trading system discussed in section
and illustrated in Figure 30.9, suggest two further plausible attacks on the system and propose possible strategies to counter these attacks.
What are the important distinctions between services and software components?
Explain why service-oriented architectures should be based on standards.
Why is it important to minimise the number of messages exchanged by services?
Explain why services should always include an exception interface which is used to report faults and exceptions to service clients.
Using the same notation, extend Figure
to include definitions for MaxMinType and InDataFault. The temperatures should be represented as integers with an additional field indicating whether the temperature is in degrees Fahrenheit or
Define an interface specification for the Currency Converter and Check credit rating services shown in Figure 31.8.
Suggest how you could use aspects to simplify the debugging of programs.
Explain why it is not necessary for a program to be completely free of defects before it is delivered to its customers. To what extent can testing be used to validate that the program is fit for its
Using the approach discussed here for object testing, design test cases to test the states of the microwave oven whose state model is defined in Figure 8.5.
You have been asked to test a method called catWhiteSpace in a Paragraph object that, within the paragraph, replaces sequences of blank characters with a single blank character. Identify testing
Give three situations where the testing of all independent paths through a program may not detect program errors.
Describe how you would go about validating the reliability specification for a supermarket system that you specified in Exercise 9.8. Your answer should include a description of any validation tools
Explain why it is practically impossible to validate reliability specifications when these are expressed in terms of a very small number of failures over the total lifetime of a system.
Using the literature as background information, write a report for management (who have no previous experience in this area) on the use of reliability growth models.
Is it ethical for an engineer to agree to deliver a software system with known faults to a customer? Does it make any difference if the customer is told of the existence of these faults in advance?
Explain why ensuring system reliability is not a guarantee of system safety.
The door lock control mechanism in a nuclear waste storage facility is designed for safe operation. It ensures that entry to the storeroom is only permitted when radiation shields are in place or
controls the door-locking mechanism. Note that the safe state is that entry should not be permitted. Develop a safety argument that shows that this code is potentially unsafe. Modify the code to make
Using the specification for the dosage computation given in Chapter 10 (Figure 10.11), write the Java method computeInsulin as used in Figure 24.6. Construct an informal safety argument that this
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.
Why is it necessary to include details of system changes in a software safety case?
Explain why interface testing is necessary even when individual components have been extensively validated through component testing and program inspections.
What are the problems in developing performance tests for a distributed database system such as the LIBSYS system?
The test plan in Figure 22.4 has been designed for custom systems that have a separate requirements document. Suggest how the test plan structure might be modified for testing shrink-wrapped software
Explain why program inspections are an effective technique for discovering errors in a program. What types of error are unlikely to be discovered through inspections?
Suggest why an organisation with a competitive, elitist culture would probably find it difficult to introduce program inspections as a V & V technique.
Using your knowledge of Java, C++, C or some other programming language, derive a checklist of common errors (not syntax errors) that could not be detected by a compiler but that might be detected in
Produce a list of conditions that could be detected by a static analyser for Java, C++ or another programming language that you use. Comment on this list compared to the list given in Figure 22.7.
Explain why it may be cost-effective to use formal methods in the development of safetycritical software systems. Why do you think that some developers of this type of system are against the use of
A manager decides to use the reports of program inspections as an input to the staff appraisal process. These reports show who made and who discovered program errors. Is this ethical managerial
One approach that is commonly adopted to system testing is to test the system until the testing budget is exhausted and then deliver the system to customers. Discuss the ethics of this approach.
Explain why testing can only detect the presence of errors, not their absence.
Compare top-down and bottom-up integration and testing by discussing their advantages and disadvantages for architectural testing, demonstrating a version of the system to users and for the practical
What is regression testing? Explain how the use of automated tests and a testing framework such as JUnit simplifies regression testing.
Write a scenario that could be used as the basis for deriving tests for the weather station system that was used as an example in Chapter 14.
Using the sequence diagram in Figure 8.14 as a scenario, propose tests for the issue of electronic items in the LIBSYS system.
List four types of systems that would require system software safety cases.
Assume you were part of a team that developed software for a chemical plant, which failed in some way, causing a serious pollution incident. Your boss is interviewed on television and states that the
What are the arguments for and against the licensing of software engineers?
Why should several estimation techniques be used to produce a cost estimate for a large, complex software system?
A software manager is in charge of the development of a safety-critical software system that is designed to control a radiotherapy machine to treat patients suffering from cancer. This system is
Give three reasons why algorithmic cost estimates prepared in different organisations are not directly comparable
Explain how the algorithmic approach to cost estimation may be used by project managers for option analysis. Suggest a situation where managers may choose an approach that is not based on the lowest
Some very large software projects involve writing millions of lines of code. Suggest how useful the cost estimation models are likely to be for such systems. Why might the assumptions on which they
Is it ethical for a company to quote a low price for a software contract knowing that the requirements are ambiguous and that they can charge a high price for subsequent changes requested by the
Should measured productivity be used by managers during the staff appraisal process? What safeguards are necessary to ensure that quality is not affected by this?
Explain why a high-quality software process should lead to high-quality software products.Discuss possible problems with this system of quality management.
Explain how standards may be used to capture organisational wisdom about effective methods of software development. Suggest four types of knowledge that might be captured in organisational standards.
Showing 2000 - 2100
of 3991
First
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Last