,/' I Ffivnticl: I - C R: R O R C In:P,:Rta'T - Tirc Pro 1 ' PRRRT (,S: . (6) What Do - You Under:Iiancl BF S.$R"GG - F.:Egs - $3!Ult.V ? Librv Is Ihc Process Mil"Uriiill-An

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

This question paper contarns .

tr printed pagesj

Ycur Roll i'{o

i?79

B.Sc_ iFii Coruputer Science B


fV- $ernestenT{$

Paper- 402-SOF f WARE ENGIIIEBIilNT;

(l,ierv Corrrse)

(Arhnission ol.200i ared onwards)

Time : 3 /Jor.i.s lvfa.xinrtirrrlrfaris : j5

(1\'ritt t'tstrrigo/lira. {x /i{ trri, itu.tttit,t!,.!! ()ti r"rri!iier. !Ais cut:rro.l /rrJ1r,-.,:

l.'ilrt*; of a <luesiio:r rnu:ii. i.rc c.rrs;werctl kigethcr.


ldarlie lrea.,,y usc cf iliust,rati,:ns rvhercvcr. possi[:le.
,/'
I ffiVnticl: i.c r:rorc in:p,:rta't--tirc Pro<lrrr:t
rir the
\>1 '
Prrrt(,s: .;

{6) What do -you under:iiancl bf S.$r"gg_f.:egS;

f -$3!ult.v
? librv is ihc process mil"uriiill-an
organization deterniiled ?
-
'q

havr: t'lren appoiute,J as a projecl Manager


,k'l oW
\ -4'
\-Y/ for a inajor: ssft",var* rrioduct coff]piilt..l. yorl: jcrt,
,/,
t Lq to ma&sgd'the d*vel:prn,-::lt"ilf the next grjnr]-
i rati*n version uf its *.idciy Hscd w+t-d pt.o,.:*ssingl
s o ft,w a re- $eccr- ci ::mpeti ti orr l s i ni ci i se, i .i ght
deadlines ha.vs bg*r.l e.siialrlishqrd*nri arir:.q:u.ni:etl.

I P.T.().

ffi i

\
t
,4r

't

. ..":,:.;.
.:,: .;'- --.':.i'!'
, ,-"-:.
-1 1 . ;
j:";; I
1".,-.r{ . - -i
|. t. .,'; . t,, - I
".
'.'i i .a . -:ll1.
-,,:.-;,-, I
, i,iir?: "::-:5'-.t'
ritr,':
t
/-
ffi

L'z---'

(5) :778
f

avoici-
'/-
y'Ynat are the di{Ierences betrr teen Deadlock
^kl
\-/ ? 2
ance and Deadlock prevention approaches

scheduling
7. (c) ls-lisk scheduling other than FCFS
b '/
Y ? E xP l ai n Y our
useful in a single user envlroi nment
a
answer.
t-

translation
x(b) Drarv and explain intel 80386'address

47("n"*"' detects
is the cause of Thrashing ? Once it
1 .(c) X"t
to elirninatt:
\---t Thrashing, what can the system do
I
i. r
ttris Problem ?
l
1, (d)
(-/
v
Xhat is consistency semantics ? Explain about'
i.tXn(* session and immutabie shared file seman-
3
tics ?

(e) What are the differences bet*'een Virus and


-L-/
-4
ZV Worm?

.* O What is the need-to-know principle ? Whf is it

z important for a protection system to adhere to t'his


principle ?
l

?00
LT78

t- . ., a ,4

+ -rPye "rf

'j

I i
f,..;i.
.
l .j
r #,
\- Wtrt

r;fig
Cq
.<
$..
(r' 2 )

2. (a)

Internal data structures


_\ :6 .1

Exderoal data structures


:3
Number of user
'1t

Number of user outputs


: 60
Number of user inquiries
: 9 {
Nr,trber of External
.interfaces:.3

Sl,cgmptexity 10, 7,'4,


jta;: ro,1101,3

6,
I
'::

,t
a'
. \^*;__
2"
\i i
\ H,H
td

I
,i
i:
iilii i
ti
(c) Use the CCICOMO Model to esi.ir:iai.c r i r ',
r'r
elirr;"i
(rn PM) required to liuild
.// the s+ii.,.a,ar,:
u i r.1;1.{.tf-
= 33,209,ip = 12,00tr,andB =
ti i).Zii. :
"'
3. Differentiate between the following :
'.- : !.
./
(s*/ni"X Components ys. Risk Drivers;

7s. Black Bnx 'Iesting; g

Predictable Risks; {
t:i_ty Mappingv". t ar,p9&nJ$3llli*g; 3 z
Ly-
Jl

Llfr-'Coupling iz's. Cohcsion_.


4
are CASE tools? Discussthc brrikiinrl
,, I@',,--}4tr.at hl:,r:J..s
for CASE. I
\L--
4
.t

,f, rtat <lo yorr understand by Scftware


euaiit;. ?
L?' Di.scussSoftwarc euality.Faclors.
'"'- =.:'---- {

! You have been asked io build a Admissir:n pracessinil


System for a college :

)rY_evetop an EAR that describes data objects,


' Attributes and
; relationship. 4
Develop a level I-DFD for the System..

a data diltiona-r_r,for t.he $ystem


{Develop

P.T.O.
l
a

.nff:
I

:"-
.i

You might also like