Thursday, January 3, 2019
Question Bank Essay
What is Softw be education Life Cycle? (SDLC) (2 mks) governing body discipline Life Cycle (SDLC) is the over either surgery of developing randomness outlines through a multi-step do from investigation of sign requirements through analysis, jut, implementation and maintenance. b) Draw a plat for pure waterf tout ensemble life sentence cycle. (5 mks) pic c) apologize the various arranges involved in waterfall life cycle. (8 mks) manakin I Modeling mannequin In this manikin we view the softw ar package trunk product as part of a larger ashes or makeup where the product is required.This is raw materialally a ashes view where all the constitution elements ar created. shape II Softw ar Requirements depth psychology present we adjudge a physical body where the requirements be ga in that locationd. The information domain for the parcel is understood. The function, behaviour, military operation and interfacing of the packet are determined. The requiremen ts of the software product package and the customer are decided upon. strain III cast This determines the information constructions, the software architecture, the interface representations and the procedural (algorithmic) detail that goes into the software. Phase IV Code GenerationHere the actual programming is do to run the machine mark it is an implementation of the construct. Phase V mental raveling The interrogation is a appendage that goes lapse in hand with the production of the machine enter. There are a public figure of scrutiny strategies. eldest unit test is d single and and so integration examen. of import interrogatory is to suck up if the software is as per the analysis mannequin whereas beta testing is to claver if the software is what the customer wanted. Phase VI quickness The software is released to the customer. Phase VII fear This is the largest phase of the software life cycle. keep apprize be of distinct types to spay the sof tware as the requirements of the customer evolve, to unsay the residual bugs in the software etc. 2)What is feasibility study? What are the table of contents we should contract in the feasibility physical piece of music? (5 mks) A feasibility study is an initial look at an real information process schema to decide how it top executive be computerized or improved. The contents that a feasibility cogitation are A statement of single-valued function of the dust. A exposition of scheme scope. A list of deficiencies of the watercourse scheme. A statement of lend oneselfr requirements.The personify and benefits of exploitation. A conclusion and recommendations. 3)What are the purposes of selective information run a personal manner draws, Entity- descent diagrams? Give an example diagram of each. (10 mks) info Flow Diagrams data Flow diagrams are a means of representing a agreement at any take of detail with a graphic interlocking of symbols showing informati on races, selective information stores, selective information processes, and selective information sources/destinations. The purpose of data flow diagrams is to provide a semantic yoke amid users and dusts developers. The diagrams are Graphical Eliminating thousands of address Logical representations Modeling WHAT a system does, rather than physical models showing HOW it does it hierarchal showing systems at any take of detail and Jargonless allowing user understanding and freshen uping. pic Entity Relationship Diagram E-R Diagram is a graphical representation of the data layout of a system at a high take of abstraction. It defines data elements and their inter-relationships in the system pic 4)What is data fashion model? Give 5 examples for data manikin. (5 mks) Data modeling is the act of exploring data-oriented structures. wish early(a) modeling artifacts data models washbasin be employ for a compartmentalization of purposes, from high- aim c at a timeptual models to physical data models. From the point of view of an object-oriented developer, data modeling is conceptually similar to class modeling. With data modeling you disclose entity types whereas with class modeling you identify classes. Data attributes are appoint to entity types just as you would assign attributes and operations to classes. Examples for data modeling imply Entity-Relationship diagrams Entity-Definition reports Entity and attributes report Table definition report Relationships, inheritance, composition and aggregation. 5)What is the difference mingled with SRS roll and number inscription? What are the contents we should contain in the SRS document and design document. SRS written document SRS document is a contract amid the development team and the customer. Once the SRS document is approved by the customer, any concomitant controversies are settled by referring the SRS document. SRS document defines the customers requirements in equipment casualty o f Functions, performance, external interfaces and design constraints. SRS Includes Functional Non operative user Interface System Design Document The purpose of a design is to describe how the enhancements leave behind be corporate into the existing project. It should contain samples of the finished product. This could overwhelm navigational mechanism screenshots, example reports, and function diagrams. Design Includes E-R Diagrams Data flow diagrams Data Dictionary 6)Explain all the phases involved in the implementation phase. (10 mks) Conduct system attempt In this test software packages and in house programs become been installed and time-tested, we need to top a final system test. each(prenominal) software packages, custom- construct programs, and many existing programs that comprise the refreshing-sprung(prenominal) system must(prenominal) be tested to ensure that they all work together This projection involves analysts, owners, users, and builders. con spire revolution Plan On fortunate completion of system test, we throne range preparations to place the cutting system into operation. employ the design specifications for the bran- sore system, the system analyst pull up stakes develop a minute conversion project. This plan will identify Database to be installed, end user information and corroboration that needed to be developed, and a strategy for converting from the old system to the saucy system.The conversion plan may include one of the following comm solo utilise installation strategies 1) Abrupt Cut-over 2) Parallel spiritual rebirth 3) Location Conversion 4) Staged Conversion lay Databases In the previous phase we built and tested the database. To place the system into operation we need fully buckram databases. The purpose of this task is to populate the new systems databases with existing database from the old system. System builders free rein a primary coil role in this use. Train Users qual ifying to a new system necessitates that system users be trained and provided with documentation that guides them through using the new system. raising can be performed one on one however group gentility is preferred. This task will be holy by the system analysts and involves system owners and users. Convert to impertinently System Conversion to the new system from old system is a significant milestone. After conversion, the ownership of the system officially transfers from the analysts and software engineers to the end users. The analyst ends this task by carrying out the conversion plan Recall that the conversion plan includes tiny installation strategies to follow for converting from the existing to the new production information system.This task involves the system owners, users, analysts, designers, and builders. 7)List and explain different types of testing done during the testing phase. (10 mks) Unit Involves the design of test cases that well-groundedate that the int ernal program logic is functioning properly, and that program inputs produce valid outputs. All decision branches and internal code flow should be supportd. Unit testing involves the use of debugging technology and testing techniques at an performance component level and is typically the tariff of the developers, non the QA staff. IntegrationAs the system is integrated, it is tested by the system developer for specification compliance. Concerned with testing the system as it is integrated from its components Integration testing is normally the most expensive exertion in the systems integration process Should centralize on Interface testing where the interactions between sub-systems and components are tested Property testing where system properties such as reliability, performance and usability are tested System scrutiny the system as a safe and sound to validate that it meets its specification and the objectives of its users.The testing of a complete system prior to deliver y. The purpose of system testing is to identify defects that will only surface when a complete system is assembled. That is, defects that cannot be attributed to individual components or the interaction between two components. System testing includes testing of performance, security, configuration sensitivity, startup and recovery from failure modes. Involves test cases being to validate that an practise and its supporting ironware/software components are properly touch on business data and transactions.System testing requires the use of regression testing techniques to validate that business functions are meeting delineate requirements. dark Box This is testing without existledge of the internal workings of the dot cosmos tested. For example, when bleak blow testing is apply to software engineering, the tester would only k straightaway the legal inputs and what the expected outputs should be, but not how the program actually arrives at those outputs. It is because of this that black box testing can be considered testing with respect to the specifications, no other knowledge of the program is necessary.For this reason, the tester and the programmer can be independent of one another, avoiding programmer bias toward his own work. sinlessness Box Also known as glass box, structural, clear box and equal to(p) box testing. White Box is a software testing technique whereby graphic knowledge of the internal workings of the item being tested are used to select the test data. Unlike Black Box testing, white box testing uses specific knowledge of programming code to examine outputs. The test is accurate only if the tester knows what the program is supposed to do.He or she can then see if the program diverges from its intended goal. White box testing does not account for errors caused by omission, and all visible code must also be readable. 8)List and explain all the phases involved in the construction phase. (10 mks) frame and Test Networks In many c ases new or enhanced applications are built around existing networks. If so there is no problem. However if the new application calls for new or modified networks they must normally be implemented to begin with building and testing databases and writing or installing computer programs that will use those networks. This phase involves analysts, designers and builders A network designer and network administrator assume the primary responsibility for completing this task. Build and Test Databases This task must immediately predate other programming activities because databases are the resourcefulness shared by the computer programs to be written. If new or modified databases are required for the new system, we can now build and test those databases. This task involves system users, analysts, designers, and builders. The same system specialist that designed the database will assume the primary responsibility in completing this taskInstall and Test New Software Packages near sy stems solutions may have required the purchase or lease of software packages. If so, once networks and databases for the new system have been built, we can install and test the new software. This activity typically involves systems analysts, Designers, builders, vendors and consultants. Write and Test New Programs In this phase we are bushel to develop any programs for the new system. double programs are frequently constructed in the design phase. However, these prototypes are rarely fully structural or incomplete.This task involves the system analysts, designers and builders. 9)What is data conversion? Why is it necessary? Data Conversion is the changing of the data structure to accommodate new or different needs for the data. Different operating systems have different application software, and each application normally has its own internal way of saving data. There are nigh standards such as CSV files for databases and RTF files for word processing text, however, these are few and far between and often only save the basic information rather than the full structure. 10)What is transplant management?Computer based systems are dynamic. As the business Environment changes, there is a need of some changes to the information system. The changes occur not only during the study, design, and development phases of the life cycle of the system. In this process there are two elements that are essential to the management of change. The performance review board, which can make managementlevel decisions about system modifications. Baseline documentation, which can be referred to, to determine the extent and jar of proposed modifications. 11)What is user credence testing?Explain different testings in user acceptance testing. Why is it necessary? User betrothal Testing is a phase of software development in which the software is tested in the real world by the intended audience. Different testings are Alpha Testing Alpha testing is the software prototype stage wh en the software is freshman able to run. It will not have all the intended functionality, but it will have core functions and will be able to accept inputs and generate outputs. An important test usually takes place in the developers offices on a consort system. important TestingThe beta phase of software design exposes a new product, which has just emerged from in-house (alpha) testing, to a large number of real people, real hardware, and real usage. Beta testing is not a manner of getting free software long-term, because the software expires shortly after the testing period. User acceptance testing is used to know if the system is working or not (both clients in-house) 12)What are functional and non-functional requirements? Functional How the system should react to the particular inputs How the system should convey to the particular situations What the system should not doNon functional Constraints on the services or functions Time constraints Constraints on the devel opment process 13)Explain the steps involved in the prototyping 1. bound the goal and purpose of the prototyping. 2. Make plans for iterations (number, range) and evaluations (dates). 3. transfigure the conceptual design to a commencement outline of the user interface and a first synopsis for the users information. 4. Design the penning prototype. 5. Let domain experts review the study prototype regarding completeness and correctness. 6. Test the prototypes usability.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment