0% found this document useful (0 votes)
64 views

CS605 Final Term Current Papers Solved by Masters

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views

CS605 Final Term Current Papers Solved by Masters

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

‫رِّب ِز ْد ِني ِع ْل مًا‬

CS605
(SOFTWARE ENGINEERING II)
FINAL TERM CURRENT PAPERS
2022-2023
SOLVED BY MASTERS

ALL PAID SERVICES AVAILABLE

Paid Assignments
Paid Quiz
Paid GBDs
(Only for job holders)
LMS handling is also available for
job holders + overseas

Contact with us at: 03164553852


Subscribe to our youtube Channel
https://www.youtube.com/@masters_.12
CS605 Final Term Current Papers 2023
Solved by Masters
Subjective Questions
More important questions shared by students
Q1: Many times we tag requirements with certain attributes, e.g.
Requirement ID, Requirement Status etc. list at least two (2)
advantages of such tags. (5 Marks)
We tag requirement with certain attributes in order to manage them in
orderly manner
They are use to established context and background for each requirement
and they can
Be used to filter, sort and query to view selected subset of the requirement

Q2: Being a software engineer, suppose you take a concept


development project, list some of the tasks that you will perform to
implement the project. ( 5 Mark)
• Concept scoping
• Preliminary concept planning
• Technology risk assessment
• Proof of concept
• Concept implementation
• Customer reaction to the concept

Note: just write the names of the tasks, no need to provide internal details
(textual description)
Q3: For a certain application
Suppose
P1 = current annual maintenance cost for an application = 200000
P2 = current annual operation cost for an application = 50000
P3 = current annual business value of an application = 400000
L = expected life of the system = 4 years
Calculate maintenance cost of the system. (5 Marks)
Cost of maintenance is calculated as:
C = [P3 - (P1 + P2) ] * L
[400000-(200000 + 50000)] * 4
-600000
Q4: For a certain application
MTTF = 48
MTTR = 4
Calculate the “availability” of the application. (5 Marks)
Availability formula is
Availability = (MTTF / MTBF) x 100
So first we will Find MTBF and it formula is
MTBF = MTTF + MTTR
= 48 + 4 = 52
Now add values in availability formula
= (48 / 52) x 100
= 92

Q5: Differentiate between predictable and unpredictable risks. (3


Mark)
Predictable risks can be uncovered after careful evaluation but
unpredictable risks cannot be identified
Q6: What is the Economics of Re-engineering? (3 Marks)
As re-engineering is costly and risky undertaking, a cost benefit analysis
for re-engendering must be carried out
Q7: What are the uses of "fault tree analysis" technique? (3 Marks)
Fault tree analysis can be used to predict the chain of events that can cause
hazards and the probability that each of these events occur to create the
chain
Q8 Name two types of "Reviews".(3 Marks)
There are two main types’ namely informal and Formal technical reviews
Q9: Do you think that a long parameter list of a function/method, can
be a “bad smell”? Give a reason for your answer.
Yes long method/Function can be a bad smell as they are difficult to
understand and can become inconsistent
Q l0: Calculate the value of cost variance for a software project if the
values of BCWP and ACWP are 10 and 8 respectively. (3 Marks)
CV = BCWP – ACWP
= 10 – 8
=2
Cs605 today paper 27 February 2023
20 to 25 mcqs come from past files
Q#11. 3 marks ka question casual and strict rigor
Casual:
All process framework activities are applied but only a minimum task set
is required.
It requires reduced umbrella tasks and reduced documentation.
Strict:
In this case full process is implemented and all umbrella activities are
applied

Q#12.
5 marks ka question communication channel 3 people. 5 marks ka
Total number of communication channel involving people
C = N(N-1)/2
N is people and it is given N=3
So C = 3(3-1)/2
=3
Q#13.
3 marks ka network task definition
Once the task is identified we need to develop a task network to determine
the sequence in the activities need to be performed
Q#14.
3 marks ka level 3 CMM
Level 3 – Defined
At this level there are set of defined and documented standard processes
established and subject to some degree of improvement over time. These
standard process are in place and used to establish consistency of process
preformed across the organization.
Q#15.
Requirements tracing 3 marks ka
Establishment and maintaining an agreement with the customer on the
requirement for the software involves tracing individual requirements to
their corresponding design, code and test cases
Q#16.
Five marks ka question SQA group activities tha or three mark ka
question bhi SQA sa related tha
Read the topic from handouts

Solved and verified by masters. Subscribe Masters for the solution of


current and past papers of virtual university.

For Paid Services Contact: 03164553852


CS605 Current Papers Solution:
March 2022
CS 605 Paper: 1
Mcqs totally from past papers prepare moaaz and waqar
Subjective: (Short)
1) types of failure cost
Ans: Failure cost has two components:
1. Internal failure cost
2. External failure cost
Internal failure cost requires rework, repair, and failure mode
analysis. On the other hand, external failure cost involves cost
for complaint resolution, product return and replacement, help-
line support, warranty work, and law suits. It is trivial to see that
cost increases as we go from prevention to detection to internal
failure to external failure.

2) application software 2 parameters assessing


Ans: The application software is assessed on the following
parameters:
1. Understandability: How difficult is it to understand the
software code of the current system? How complex are the
control structures that are used?
2. Documentation: What system documentation is available? Is
the documentation complete, consistent, and up-to-date?
3. Data: Is there an explicit data model for the system? To what
extent is data duplicated in different files?
4.Programming Language: Are modern compilers available
for the programming language? Is the language still used for
new system development?
5. Test Data: Does test data for the system exist? Is there a
record of regression tests carried out when new features have
been added to the system?
6. Personnel skills: Are there people available who have the
skills to maintain the system?
Long
Q: why prototyping is used in business process
(Lecture 41)
A redesigned business process must be prototyped before it is
fully integrated into the business. Based on the feedback the
business process is refined. With the business definition where
business goals are identified. The key drivers could be cost
reduction, time reduction, quality improvement, and personnel
development and empowerment. It may be defined at the
business level or for a specific component of the business.
Task's Of SCM (Lecture 33)
There are five tasks in the SCM process. These are
1. configuration identification
2. change control,
3. version control,
4. configuration auditing,
5.reporting.
Sep 2022 Cs605 today paper: 2
Some Mcq's from past papers remain from handouts
Q: Calculate SPI values r given.

Schedule performance index SPI = BCWP/BCWS


Schedule variance SV = BCWP – BCWS

Q:CMM level name


Level 1 – Initial:
Level 2 – Repeatable:
Level 3 – Defined:
Level 4 – Managed:
Level 5 – Optimizing:
Q: requirement status
The requirement status attribute is one of the most useful ones. It
can be used to keep track of different requirements going
through different phases. The possible status values are
proposed, approved, implemented, verified, and deleted.
Q: Software safety
Software Safety is a software SQA activity that focuses on
identification of potential hazards that may affect software
negatively and cause an entire system to fail. Modeling
and analysis process is conducted as part of software safety and
hazards are identified and categorized by criticality and risk.
Q: Software reliability
Reliability and safety are closely related. Software reliability
uses statistical techniques to determine the likelihood that a
software failure will occur. Occurrence of a software failure
does not necessarily result in a hazard or mishap. On the other
hand, software safety examines the ways in which failures result
in conditions that can lead to a mishap.
Q: Change control question ay thy.(page 121,123)
The Change Control process addresses the important question of
who has the responsibility for approving and ranking changes.
Too much or too little change control creates different types of
problems as uncontrolled change rapidly leads to chaos.
Sep 2022 Cs605 paper:3
Identify the "Staged" and "Continuous" CMM from the
following
Name
Structure (Staredor Continuous)
Software CMM
System Engineering CMM
Software Acquisition CMM
System Security Engineering CMN
SPICE Model
Q: Write the name of those tasks which are included
in Software Configuration Management? (page 121)
Identification
Version Control
Change Control
Configuration Auditing
Reporting

Q: The processes at CMM Level-1 are typically)


undocumented and in a state of dynamic, Change.
How they are dealt with? (page 172)
It is characteristic of processes at this level that they are
(typically) undocumented and in a state of dynamic change,
tending to be driven in an ad hoc, uncontrolled and reactive
manner by users or events. This provides a chaotic or unstable
Q: Write the name of the device which prevents potential
quality problem before it occurs or rapidly detects quality
problems if they are introduced?
Poka-yoke devices are mechanisms that lead to prevention of
potential quality problem before it occurs or the rapid detection
of quality problems if they are introduced.
Characteristic of a Poka-yoke device
• It is simple and cheap
• It is part of the process
• It is located near the process task where the mistake occurs
Q: Which type of failure cost involves cost for complaint
resolution, product retum and replacement, help-line
support, warranty work, and law suits?
A: External failure cost involves cost for complaint resolution,
product return and replacement, help-line support, warranty
work, and law suits.
Q: Normally what type of information is included in
Configuration Status Reporting (CSR)? (page 126)
Configuration Status Reporting (CSR) is also known as status
accounting. It reports on the following items:
– What happened?
– Who did it?
– When did it happen?
– What else will be affected?

Sep 2022 Cs605 paper:4


Short
1: types of scheduling?(page 92)
Software project scheduling is an activity that distributes
estimated effort across the planned project duration by allocating
the effort to specific software engineering tasks. It is important
to note that the schedule evolves over time. During early stages
of project planning, a macroscopic schedule is developed. This
type of schedule identifies all major SE activities and the
product functions to which they are applied
2: When legacy system is appropriate for scarp the
system completely?
Scrap the system completely This option should be
chosen when the system is not making an effective
contribution to business processes. This occurs when
business processes have changed since the system was
installed and they are no longer completely dependent on
the system.

3: Program restructuring?(page 139)


Program is restructured after the reverse engineering phase. In
this case we modify source code and data in order to make it
amenable to future changes. This includes code as well as data
restructuring.
Long
1Calculate availability Value was given
Availability = (MTTF/MTBF) x 100
2: CMMI model types? And one statement was given to
discuss
1. Level 1 – Initial: The software process is characterized as ad
hoc and occasionally even chaotic. Few processes are defined,
and success depends upon individual effort. By default every
organization would be at level 1.
2. Level 2 – Repeatable: Basic project management processes
are established to track cost, schedule, and functionality. The
necessary project discipline is in place to repeat earlier successes
on projects with similar applications.
3. Level 3 – Defined: The software process for both
management and engineering activities is documented,
standardized, and integrated into an organizational software
process. All projects use a documented and approved version of
the organization’s process for developing and supporting
software.
4. Level 4 – Managed: Detailed measures for software process
and product quality are controlled. Both the software process
and products are quantitatively understood and controlled using
detailed measures.
5. Level 5 – Optimizing: Continuous process improvement is
enabled by qualitative feedback from the process and from
testing innovative ideas and technologies
March 2022 Cs605 paper:5
mostly mcqs past se thy
5 number questions
2.major difference between software reliability and
software safety (repeat)
questions 3 number
1.What is Software refactoring?
Software refactoring is the process of changing a software
system such that the external behavior of the system does not
change while the internal structure of the system is improved.
2.What is lagacy system?(Repeat)
3.define task network
Once the tasks have been identified, we need to develop a task
network to determine the sequence in which these activities need
to be performed. This will ultimately lead to the time required to
complete the project.
4.MTBF calculated by
Ans. mtbf = mtbf+mttr
March 2022 CS605 paper: 6
MCQs are from past paper
Short Question
1. Name six requirements attribute
list of possible attributes is enumerated as below:
1. Requirement ID
2. Creation date
3. Created by
4. Last modified on
5. Last modified by
6. Version number
7. Status
8. Origin
9. Subsystem
10. Product Release
11. Priority
2. Name two type of Representation
A representation allows an organization to pursue different
improvement objectives. There are two types of representations
in the CMMI models: staged and continuous.
Q:BCWP and BCWS value given thi solve krna tha
(repeat)
Long Question
1.Large method cause ned smell in code explain(repeat)

2. Software engineer perform technical work should be


involved in SQA activities
Ans: SQA encompasses the entire software development
process, including requirements engineering, software
design, coding, code reviews, source code control,
software configuration management, testing, release
management and software integration.
MCQs ky lya mozz or wqar ki file
Sep 2022 Cs605 paper today: 7
all mcqs are from past papers
Subjective questions are also from moaaz and waqar past
papers
Q: Legacy system
A system is considered to be a legacy system if it has been in
operation for many years. A legacy system has many
components. These include business processes, business rules,
application software, application data, support software, and
system hardware.
Q: Bad smell
Bad Smells in Code
They have identified many different types of “bad smells”.
These are briefly described in the following paragraphs:
1. Duplicated Code
– bad because if you modify one instance of duplicated code but
not the others, you (may) have introduced a bug!
2. Long Method
– long methods are more difficult to understand; performance
concerns with respect to lots of short methods are largely
obsolete
3. Large Class
– Large classes try to do too much, which reduces
cohesion
4. Long Parameter List
– hard to understand, can become inconsistent
5. Divergent Change
– Deals with cohesion; symptom: one type of change
requires changing one subset of methods; another type of
change requires changing another subset
6.Shotgun Surgery
– a change requires lots of little changes in a lot of
different classes
7. Feature Envy
– A method requires lots of information from some other
class (move it closer!)
8. Data Clumps
– attributes that clump together but are not part of the same
class
9. Primitive Obsession
– characterized by a reluctance to use classes instead of
primitive data types
10. Switch Statements
– Switch statements are often duplicated in code; they can
typically be replaced by use of polymorphism (let OO do your
selection for you!)
11. Parallel Inheritance Hierarchies
– Similar to Shotgun Surgery; each time I add a subclass to
one hierarchy, I need to do it for all related hierarchies
12. Lazy Class
– A class that no longer “pays its way”. e.g. may be a class
that was downsized by refactoring, or represented planned
functionality that did not pan out
13. Speculative Generality
– “Oh I think we need the ability to do this kind of thing
someday”
14. Temporary Field
An attribute of an object is only set in certain circumstances; but
an object should need all of its attributes
15. Message Chains
– a client asks an object for another object and then asks that
object for another object etc. Bad because client depends on
the structure of the navigation
16. Middle Man
– If a class is delegating more than half of its responsibilities
to another class, do you really need it?
16. Inappropriate Intimacy
– Pairs of classes that know too much about each other’s
private details
18. Alternative Classes with Different Interfaces
Symptom: Two or more methods do the same thing but have
different
signature for what they do
19.Incomplete Library Class
– A framework class doesn’t do everything you need
20.Data Class
– These are classes that have fields, getting and setting
methods for the fields, and nothing else; they are data holders,
but objects should be about data AND behavior
21. Refused Bequest
– A subclass ignores most of the functionality provided by its
superclass
22. Comments (!)
– Comments are sometimes used to hide bad code
– “…comments often are used as a deodorant” (!)
Q: Software restructuring (repeat)
Q:SCM (repeat)
Objective:
1. The goal of software development is to develop _____
software on time and on budget, that meets customers’ real
needs.
o Standard
o None of the given
o Functional
o Quality
2. Which of the following is NOT an example of Software
Configuration Item (SCI)?
o Test Case
o Integration Plan
o Design specification
o None of the given options
3. Which of the following is not one of the responsibilities of
Configuration Audit team?
o To verify that a FTR has been conducted to assess
technical correctness.
o To verify that all related SCI’s been properly updated.
o To verify that SE standards have been properly applied.
o To verify that all the change requests are deleted
after implementation.
4. The implemented requirement has been ……through the
selected approach, such as testing or inspection.
o Verified
o Deleted
o Approved
o None of the given
5. Mean Time between Failure (MTBF) can be calculated
by
o MTBF=MTTF+MTTR
o MTBF= MTTF-MTTR
o MTBF=(MTTF/MTTR )* 100
MTBF=(MTTR/MTTF )* 100

6. Which of the following is NOT one of the possible values of


"Status" attribute of requirements?
o Proposed
o Received
o Approved
o Verified
7. The third digit (i.e. "Z") of the release version number format
is called:
o Major Release Number
o Feature Release Number
o Defect Repair Number
o None of the given options

8. _____ errors are most costly to fix.


Requirements
Design
Implementation
Testing
9. Configuration Status Reporting (CSR) reports on
What happened?
Who did it?
When did it happen?
All of the given options
10. __________ gives the Mean time for which system remained
available for use.
MTTF
MTBF
MTTR
MTTD

11. Which of the following is/are steps(s) involved in change


control process?
Evaluation performed by developer
Generation of change report
To recognize the need of change
All of the given options

12. The information items defined by Engineering Change Order


(ECO) include:
Criteria for review and audit
Work Breakdown structure
The project task network
The change control test case
13. Normally the compound number, used for release version
numbering, is of the format:
X.Y.Z
X,Y,Z
X-Y-Z
X/Y/Z
14. In software ________, we try to analyze that hazards caused
if software do not function properly.
Safety
Maintenance
Availability
Integrity
15. The basic idea behind Software configuration management
To manage and control the Change
To efficiently allocate the resources
To properly manage status reporting
None of the given options
17. Which of the following the NOT one of the attributes of
requirements?
Requirement ID
Creation Date
Created By

Received By

18. Which of the following is NOT one of the tasks included in


software Configuration Management?
Version control
Configuration Auditing

Test Case development


Change control

18. SCM can be used while the project is in the ____________


phase
Testing

Maintenance

Development
All of the given options are correct.
MTTF is the abbreviation of
Median time to failure

Mean time to failure


Mean time to forward

Moderate time to failure

20. The code that _______ the requirements has been designed,
written and unit tested
Deleted

Implements
None of the given
Approved

You might also like