Sy Comp Sem IV Sen 22413 QP Model Answers
Sy Comp Sem IV Sen 22413 QP Model Answers
Marks
P.T.O.
22413 [2]
Marks
2. Attempt any THREE of the following: 12
a) Explain Software Engineering as layered technology approach.
b) Explain with example Decision table.
c) Explain following elements of management spectrum:
(i) People
(ii) Process
(iii) Product
(iv) Project
d) List and explain basic principles of project scheduling.
SUMMER – 19 EXAMINATION
Subject Name: Software Engineering Model Answer Subject Code: 22413
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in
the model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner
may try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components
indicated in the figure. The figures drawn by candidate and model answer may vary.
The examiner may give credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
constant values may vary and there may be some difference in the candidate’s
answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of
relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based
on equivalent concept.
It is a Low-Level It is a High-Level
Activity, it can identify an Activity, it can identify an
error and mistakes which error that QA cannot
QC cannot
1. A Quality Focus:
2. Process Layer:
3.Methods:
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
4.Tools:
Decision Table
Legend:
T – Correct username/password
F – Wrong username/password
Interpretation:
Case 1 – Username and password both were wrong. The
user is shown an error message.
Case 2 – Username was correct, but the password was
wrong. The user is shown an error message.
Case 3 – Username was wrong, but the password was
correct. The user is shown an error message.
Case 4 – Username and password both were correct, and
the user navigated to homepage.
c Explain following elements of management spectrum: 4M
i. People
ii. Process
iii. Product
iv. Project
Ans The management Spectrum: 4p’s Explanation
each element
Effective software project management focuses on the four P’s: of
people, product, process, and project. management
spectrum –
The People: 1M
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
The Product:
The Process:
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
The Project:
Principle 9
move on.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
LOC is the simplest among all metrics available to estimate project size.
Using this metric, the project size is estimated by counting the number of
source instructions in the developed program. Obviously,
The conceptual idea behind the function point metric is that the size of a
features would certainly be of larger size than a product with less number
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
of features. Each function when invoked reads some input data and
transforms it to the corresponding output data. For example, the issue book
name of the book as input and displays its location and the number of copies
available. Thus, a computation of the number of input and the output data
Communication
Simplicity
Feedback
Courage
Respect
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Writing unit tests before programming and keeping all of the tests
running at all times. The unit tests are automated and eliminates
defects early, thus reducing the costs.
Starting with a simple design just enough to code the features at hand
and redesigning when required.
Keeping the customer involved all the time and obtaining constant
feedback. Iterating facilitates the accommodating changes as the
software evolves with the changing requirements.
Extreme Programming
Code reviews are effective as the code is reviewed all the time.
Ans The First Principle: The Reason It All Exists 1 M for one
principle and
explanation
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
The RMMM plan documents all work executed as a part of risk analysis
and used by the project manager as a part of the overall project plan.
The risk mitigation and monitoring starts after the project is started and
the documentation of RMMM is completed.
Mitigation :
Monitoring :
Management :
(ii) Analytical
Example:
Let us consider the following C program:
main( )
{
int a, b, c, avg;
Therefore,
n1 = 12, n2 = 11
Volume = Length*log(23)
= 81*4.52
= 366
Design
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Coding
Testing
Deployme
nt
Maintena
nce
1. Functional requirements
The functional requirements are the requirements that will enable
solving the real world problem. The web based project must be able
to register the candidates for contest.
2. Non-functional requirements
These requirements aim at providing support, security and facilitate
user interaction segment of the website.
Age>18 Allowed
Application
Generators and
End User Infrastructure
composition aids
Programming
Application
Composition
System
Integration
COCOMO II uses the reuse model for maintenance when the amount of
added or changed base source code is less than or equal to 20% or the new
code being developed. Base code is source code that already exists and is
being changed for use in the current project. For maintenance projects that
involve more than 20% change in the existing base code (relative to new
code being developed) COCOMO II uses maintenance size.
c. Maintenance Change Factor MCF
MAF=1+ (SU.01*UNFM)
The data design transforms the information domain model created during
analysis into the data structures that will be required to implement the
software. The data objects and relationships defined in the entity
relationship diagram and the detailed data content depicted in the data
dictionary provide
the basis for the data design activity. Part of data design may occur in
conjunction with the design of software architecture. More detailed data
design occurs as each software component is designed. The architectural
design defines the relationship between major structural elements of the
software, the design pattern that can be used to achieve the requirements
that have been defined for the system, and the constraints that affect the
way in which architectural design patterns can be applied.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
i. Employee details
a. Getting information about the customer
b. Updation of employee details (department, change of address,
emp_code etc)
c. Assignment of tasks , duties and responsibilities.
d. Recording of employee attendance.
iii. Performance
a. Recording annual performance
b. Details about parameters for performance appraisal
c. Analysis performance and determining hike in payment.
22413
11920
3 Hours / 70 Marks Seat No.
Marks
P.T.O.
22413 [2]
Marks
3. Attempt any THREE of the following: 12
a) Explain process framework with a suitable diagram.
b) Describe four principles of good planning.
c) Draw and explain Level 1 DFD for railway reservation system.
d) With an example, explain Line of Code (LOC) based estimation.
Winter – 19 EXAMINATION
Subject Name: Software Engineering Model Answer Subject Code: 22413
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in
the model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner
may try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components
indicated in the figure. The figures drawn by candidate and model answer may vary.
The examiner may give credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
constant values may vary and there may be some difference in the candidate’s
answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of
relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based
on equivalent concept.
1|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
2|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
3|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
4|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Data Store: A set of parallel lines shows a place for the collection of data
items. A data store indicates that the data is stored which can be used at a
later stage or by the other processes in a different order. The data store
can have an element or group of elements.
Source or Sink: Source or Sink is an external entity and acts as a source
of system inputs or sink of system outputs.
5|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
6|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
7|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
8|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
9|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
10 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
11 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
12 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
13 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
14 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
b Explain the concept of black box testing and white box testing. 6M
Ans Black Box Testing: Black box
testing
It is a way of software testing in which the internal structure explanation -3M
or the program or the code is hidden and nothing is known and white box
about it. testing
It also known as data-driven, box testing, data-, and functional explanation- 3M
testing.
This type of testing is ideal for higher levels of testing like
System Testing, Acceptance testing.
It is mostly done by software testers.
No knowledge of implementation is needed.
It is functional test of the software.
Testing can start after preparing requirement specification
document.
15 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Techniques used:
o Equivalence partitioning: Equivalence partitioning
divides input values into valid and invalid partitions
and selecting corresponding values from each partition
of the test data.
o Boundary value analysis:
checks boundaries for input values.
Advantages of Black Box Testing
Efficient when used on large systems.
Since the tester and developer are independent of each
other, testing is balanced and unprejudiced.
Tester can be non-technical.
There is no need for the tester to have detailed functional
knowledge of system.
Tests will be done from an end user's point of view,
because the end user should accept the system. (This
testing technique is sometimes also called Acceptance
testing.)
Testing helps to identify vagueness and contradictions in
functional specifications.
Test cases can be designed as soon as the functional
specifications are complete.
Disadvantages of Black Box Testing
Test cases are challenging to design without having clear
functional specifications.
It is difficult to identify tricky inputs if the test cases are
not developed based on specifications.
It is difficult to identify all possible inputs in limited
testing time. As a result, writing test cases may be slow
and difficult.
There are chances of having unidentified paths during the
testing process.
There is a high probability of repeating tests already
performed by the programmer.
White Box Testing:
It is a way of testing the software in which the tester has
knowledge about the internal structure r the code or the
program of the software.
It is also called structural testing, clear box testing, code-based
testing, or glass box testing.
16 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
17 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
2. Project duration:
TDEV= c (E) d
E = effort
= 29 months
SS = 626/29 = 22 staffs
18 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
19 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Cardinality:
In the case of Data Modeling, Cardinality defines the number of
attributes in one entity set, which can be associated with the number of
attributes of other set via relationship set.
Example: One-to-one, One-to-many, Many-to-one, Many-to-many.
b Compare CMMI and ISO for software w.r.to 6M
i)scope
ii)Approach
Iii) Implementation.
Ans Difference between CMMI and ISO based on Difference
based on Scope-
SCOPE: CMMI is rigid and extends only to businesses developing 2M
software intensive systems. ISO is flexible and applicable to all
Approach-2M
manufacturing industries. CMMI focuses on engineering and project
and
management processes whereas ISO’s focus is generic in nature. Implementation
2M
CMMI mandates generic and specific practices and businesses have a
choice of selecting the model relevant to their business needs from 22
developed process areas. ISO requirements are same for all companies,
industries, and disciplines.
20 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
IMPLEMENTATION:
Inception: The question why you want to do this will be answered and
analyses to identify business need, a potential new market with breadth
and depth and services to be provided. The above points establish a basic
understanding of the problem, the people who want a solution, the nature
of the solution that is desired to understand the scope of the project.
Elicitation: This answers for what are things need to do by asking the
customer, the users, and others what the objectives for the system or
product are, what is to be accomplished, how the system or product fits
into the needs of the business, and finally, how the system or product is
to be used on a day-to-day basis
21 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Describe how the end user (and other actors) will interact
with the system.
Business domain entities that is visible to the end user.
The attributes of each analysis class are defined, and the
services that are required by each class are identified.
The relationships and collaboration between classes are
identified, and a variety of supplementary diagrams are
produced.
Negotiation: It answers for is it actually required? Through which
Customers, users, and other stakeholders are asked to rank requirements
and prioritized the same. Using an iterative approach that prioritizes
requirements, assesses their cost and risk, and addresses internal conflicts,
requirements are eliminated, combined, and/or modified so that each
party achieves some measure of satisfaction.
22 | 2 2