All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
software testing and quality assurance
Questions and Answers of
Software Testing And Quality Assurance
=+16.5. Using an example of a component that implements an abstract data type such as a stack or a
=+16.4. Why is it important that components should be based on a standard component model?
=+16.3. In a reusable component, what are the critical characteristics that are emphasized when the component is viewed as a service?
=+explain how such component replacement could have undesired consequences and may lead to system failure.
=+16.2. The principle of component independence means that it ought to be possible to replace one component with another that is implemented in a completely different way. Using an example,
=+16.1. What are the design principles underlying the CBSE that support the construction of understandable and maintainable software?
=+Discuss these issues and other ethical issues associated with the reuse of software.
=+What payment mechanisms might be used to reimburse providers of reusable components?
=+Does the software contractor have the right to use that code as a basis for a generic component?
=+15.10. The reuse of software raises a number of copyright and intellectual property issues. If a customer pays a software contractor to develop a system, who has the right to reuse the developed
=+application systems. Suggest three practical problems that might arise in writing adaptor software to link two application systems.
=+15.9. Explain why adaptors are usually needed when systems are constructed by integrating
=+15.8. What are the significant benefits offered by the application system reuse approach when compared with the custom software development approach?
=+ What problems may arise when deploying a large-scale ERP system in an organization?
=+15.7. Why have many large companies chosen ERP systems as the basis for their organizational information system?
=+that software. Suggest difficulties that users might have in configuring the software. Microsoft Office (or one of its open-source alternatives) is a good example to use for this exercise.
=+15.6. Most desktop software, such as word processing software, can be configured in a number of different ways. Examine software that you regularly use and list the configuration options for
=+the components that might be included at each level.
=+15.5. Using the example of the weather station system described in Chapters 1 and 7, suggest a product-line architecture for a family of applications that are concerned with remote monitoring and
=+created using the same application framework.
=+15.4. Explain what is meant by “inversion of control” in application frameworks. Explain why this approach could cause problems if you integrated two separate systems that were originally
=+15.3. How does the base application’s design in the product line simplify reuse and reconfiguration?
=+15.2. List the benefits of software reuse and explain why the expected lifetime of the software should be considered when planning reuse.
=+Do you personally reuse much software and, if not, why not?
=+15.1. What major technical and nontechnical factors hinder software reuse?
=+How does a software project manager select the set of soft-
=+What techniques can be used to formally assess the risks
=+30.9. A legacy system has 940 modules. The latest release required that 90 of these modules be changed. In addition, 40 new modules were added and 12 old modules were removed.
=+30.8. Develop a small software tool that will perform a Halstead analysis on programming language source code of your choosing.
=+30.7. Develop a software tool that will compute cyclomatic complexity for a programming language module. You may choose the language.
=+30.6. A class X has 12 operations. Cyclomatic complexity has been computed for all oper-ations in the OO system, and the average value of module complexity is 4. For class X, the complexity for
=+30.5. A major information system has 1140 modules. There are 96 modules that perform control and coordination functions and 490 modules whose function depends on prior pro-cessing.
=+30.4. Software for System X has 24 individual functional requirements and 14 nonfunctional requirements. What is the specificity of the requirements? The completeness?
=+30.3. A system has 12 external inputs, 24 external outputs, fields 30 different external que-ries, manages 4 internal logical files, and interfaces with 6 different legacy systems (6 EIFs).
=+30.2. Why is it that a single, all-encompassing metric cannot be developed for program com-plexity or program quality? Try to come up with a measure or metric from everyday life that violates the
=+30.1. Measurement theory is an advanced topic that has a strong bearing on software met-rics. Using [Zus97], [Fen91], [Zus90] or Web-based sources, write a brief paper that outlines the main tenets
=+ity and enhances the correctness, reliability, and performance?
=+Q2: Is the complexity of each component within bounds that will facilitate modification and extension?
=+Q: Are architectural components characterized in a manner that compart-mentalizes function and related data?
=+29.12. What is content management?
=+29.11. Briefly describe the differences between SCM for conventional software and SCM for Web or Mobile Apps.
=+ Cantheir func-tion be folded into one review? What are the pros and cons?
=+29.10. What is the difference between an SCMaudit and a technical review?
=+29.9. Develop a checklist for use during configuration audits.
=+29.8. Research an existing SCM tool and describe how it implements the mechanics of ver-sion control. Alternatively, read two or three papers on SCM and describe the different data structures and
=+29.7. The relations and represent simple relationships between configuration objects. Describe five additional relationships that might be useful in the con-text of an SCM repository.
=+29.6. Research an existing SCM tool and describe how it implements control for versions, variants, and configuration objects in general.
=+figuration items. How would the database handle different versions of the same program?
=+29.5. Design a project database (repository) system that would enable a software engineer to store, cross-reference, trace, update, change, and so forth all important software con-
=+29.4. Assume that you're the manager of a small project. What baselines would you define for the project and how would you control them?
=+29.3. Discuss the reasons for baselines in your own words.
=+29.2. What are the four elements that exist when an effective SCM system is implemented?Discuss each briefly.
=+29.1. Why is the First Law of System Engineering true? Provide specific examples for each of the four fundamental reasons for change.
=+4.change author been specified? Do the attributes of the configuration ob-ject reflect the change?
=+How does an organization assess the impact of change and manage the impact effectively?
=+How does an organization manage the many existing versions of a pro-gram (and its documentation) in a manner that will enable change to be accommodated efficiently?
=+28.10. You have been assigned to a software team that is developing software called MemoryDoubler that provides greater apparent memory for a PC than physical memory.This is accomplished by
=+ables up to MaxNames people to be stored along with associated company names, fax num-bers, and other related information. Using natural language, detinea. The data invariant.b. The state.C. The
=+28.9. You have been assigned to a team that is developing software for a fax modem. Your job is to develop the "phone book" portion of the application. The phone book function en-
=+28.8. In your own words, describe the intent of certification in the cleanroom software en-gineering context.
=+28.7. For the program stimuli and probability distribution table developed in Problem 28.6, use a random-number generator to develop a set of test cases for use in statistical use testing.
=+bility of use for each scenario, and then develop a program stimuli and probability distribu-tion table similar to the one shown in Section 28.4.1.
=+28.6. Select a program that you use regularly (e.g ., an e-mail handler, a word processor, a spreadsheet program). Create a set of usage scenarios for the program. Define the proba-
=+28.5. Document a correctness verification proof for the bubble sort discussed in Problem 28.4.
=+28.4. A bubble-sort algorithm is defined in the following mamer:procedure bubblesort:var i. t. integer:begin repeat until t=a[1]t := a[1]:for j := 2 to n do if alj-11 > aljl then begin
=+28.3. Using box structure specification, develop "first-pass" analysis and design models for the SafeHome system.
=+28.2. How do an incremental process model and certification work together to produce high-quality software?
=+28.1. If you had to pick one aspect of cleanroom software engineering that makes it radi-cally different from conventional or object-oriented software engineering approaches, what would it be?
=+27.10. Compute the annual loss expectancy (ALE) for the loss of a data server whose re- placement value is $30,000, the occurrence of loss of data due to hacking is 5 percent annu- ally, and the
=+27.9. Use the Internet to find the details needed to create a phishing attack pattern.
=+27.8. Explain some of the problems that might be encountered if you try to address security risk after a system is completed.
=+27.7. Use the Internet to determine the annual average cost of single incidence of identity theft to an individual consumer.
=+27.6. What does the same origin policy have to do with trustworthy systems?
=+27.5. Describe the security requirements for a cloud-based photo repository.
=+27.4. Describe the trust model used on a bidding site such as eBay.
=+27.3. Identify five attack patterns that may be commonly used to attack web apps.
=+27.2. Describe a security migration strategy for one of the risks noted in Problem 27.1.
=+27.1. Consider a mobile phone app that you own First describe the app briefly and then list at least three to five security risks.
=+25.10. Explain why preparing and distributing a system release for mass-market products is an expensive process.
=+25.9. Describe six essential features that should be included in a tool to support change management processes.
=+25.8. What are the factors that influence the decision on whether or not a change should be implemented?
=+Write a set of programmer’s guidelines that helps avoid this and any other systembuilding problems that you can think of.
=+25.7. A common problem with system building occurs when physical filenames are incorporated in system code and the file structure implied in these names differs from that of the target machine.
=+25.6. With reference to system building, explain why you may sometimes have to maintain obsolete computers on which large software systems were developed.
=+25.5. Describe the difficulties that may arise when building a system from its components. What particular problems might occur when a system is built on a host computer for some target machine?
=+25.4. Software is now often developed by distributed teams, with team members working at different locations and in different time zones. Suggest features in a version control system that could be
=+25.3. Imagine a situation where two developers are simultaneously modifying three different software components. What difficulties might arise when they try to merge the changes they have made?
=+25.2. In version management, what do codeline and baseline terminologies stand for? List the features included in a version control system.
=+25.1. Suggest five possible problems that could arise if a company does not develop effective configuration management policies and processes.
=+24.10 A colleague who is a very good programmer produces software with a low number of defects but consistently ignores organizational quality standards. How should her managers react to this
=+and write a short report that summarizes work in software analytics and issues to be considered if analytics is introduced.
=+24.9. You work for a software product company and your manager has read an article on software analytics. She asks you to do some research in this area. Survey the literature on analytics
=+24.8. What is a software metric? Define different types of software metrics with examples.
=+24.7. What problems are likely to arise if formalized program inspections are introduced in a company where some software is developed using agile methods.
=+24.6. Briefly explain what happens during the software quality review process and the software quality inspection process.
=+Write a report suggesting appropriate metrics and suggest how these can be collected.
=+24.5. Assume you work for an organization that develops database products for individuals and small businesses. This organization is interested in quantifying its software development.
=+■ reports that might be submitted for a term project in a university;■ the process of making and approving program changes (web Chapter 26); and■ the process of purchasing and installing a
=+24.4. Briefly describe possible standards that might be used for:■ the use of control constructs in C, C#, or Java;
=+24.3. Discuss the assessment of software quality according to the quality attributes shown in Figure 24.2. You should consider each attribute in turn and explain how it might be assessed
Showing 600 - 700
of 3991
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last