SE - Mid - Answers
SE - Mid - Answers
6. *Security Risks:*
- Risks related to cybersecurity threats, data breaches, unauthorized access,
and vulnerabilities in the software system.
2. *Information Gathering*
- *Review Project Documentation*: Examine project plans, requirements,
design documents, and other relevant materials.
- *Conduct Interviews and Surveys*: Talk to stakeholders, team members,
and experts to gather insights on potential risks.
- *Use Checklists*: Employ standardized checklists of common risks to
ensure nothing is overlooked.
3. *Identify Risks*
- *Brainstorming Sessions*: Conduct brainstorming sessions with the team
to identify as many risks as possible.
- *SWOT Analysis*: Evaluate the project’s Strengths, Weaknesses,
Opportunities, and Threats to identify risks.
- *Risk Breakdown Structure (RBS)*: Develop an RBS to categorize risks
systematically into different levels (e.g., technical, organizational, external).
5. *Risk Analysis*
- *Qualitative Risk Analysis*: Assess the likelihood and impact of each risk
using qualitative methods (e.g., High/Medium/Low scales).
- *Quantitative Risk Analysis*: Where applicable, use quantitative methods
(e.g., statistical models) to estimate the probability and impact of risks more
precisely.
6. *Risk Categorization*
- *Group Similar Risks*: Categorize risks into groups based on their nature
or source (e.g., technical risks, project management risks, external risks).
- *Prioritize Risks*: Rank risks based on their potential impact and
likelihood to focus on the most critical ones.
8. *Regular Updates*
- *Continuous Monitoring*: Regularly review and update the risk register as
the project progresses and new risks emerge.
- *Periodic Reassessment*: Conduct periodic reassessments of risks to
ensure all potential risks are identified and managed.
1. *Risk Mitigation*
Risk mitigation involves developing strategies and actions to reduce the
likelihood or impact of identified risks. This step includes:
2. *Risk Monitoring*
Risk monitoring involves continuously tracking identified risks and new risks
as they emerge. This step includes:
- *Risk Indicators*: Defining and tracking key risk indicators (KRIs) that
signal potential issues.
- *Regular Reviews*: Conducting periodic risk review meetings to assess the
status of risks and the effectiveness of mitigation strategies.
- *Documentation*: Keeping detailed records of risk status, changes, and
outcomes in a risk register.
- *Alert Mechanisms*: Establishing systems for early warning signs of risk
events, enabling prompt action.
3. *Risk Management*
Risk management involves making decisions and taking actions to address
risks as they arise. This step includes:
- *Risk Identification*: Listing all potential risks along with their sources and
descriptions.
- *Risk Analysis*: Assessing the likelihood and impact of each risk using
qualitative and quantitative methods.
- *Risk Prioritization*: Ranking risks based on their severity to focus on the
most critical ones.
- *Monitoring Plan*: Outlining how risks will be tracked, including metrics,
frequency, and responsible parties.
- *Management Plan*: Describing the process for managing risks as they
occur, including roles and responsibilities.
Q15)Explain about the ISO 9000 Certification.
(i) Draw the context diagram: The context diagram is a simple model that
defines the boundaries and interfaces of the proposed systems with the
external world. It identifies the entities outside the proposed system that
interact with the system. The context diagram of student result management
system is given below:
(ii) Development of a Prototype (optional): One effective way to find out what
the customer wants is to construct a prototype, something that looks and
preferably acts as part of the system they say they want.
We can use their feedback to modify the prototype until the customer is
satisfied continuously. Hence, the prototype helps the client to visualize the
proposed system and increase the understanding of the requirements. When
developers and users are not sure about some of the elements, a prototype
may help both the parties to take a final decision.
Some projects are developed for the general market. In such cases, the
prototype should be shown to some representative sample of the population
of potential purchasers. Even though a person who tries out a prototype may
not buy the final system, but their feedback may allow us to make the product
more attractive to others.
The prototype should be built quickly and at a relatively low cost. Hence it
will always have limitations and would not be acceptable in the final system.
This is an optional activity.
Q20)Distinguish between the Black box testing and White box testing.
Q21)Explain about the RISK Components.
In software engineering, risk management is a critical aspect of project
management. Understanding and managing risks ensures that projects are
delivered on time, within budget, and with the desired quality. The key
components of risk in software engineering include:
1. Risk Identification
Definition: The process of determining what risks might affect the project and
documenting their characteristics.
Examples: Identifying potential risks like changing requirements, technology
challenges, resource availability, and stakeholder conflicts.
2. Risk Analysis
Qualitative Analysis: Evaluating the impact and likelihood of identified risks
using subjective judgment.
Tools: Risk matrices, risk probability and impact assessment.
Quantitative Analysis: Numerically analyzing the effect of risks on project
objectives.
Tools: Monte Carlo simulation, decision tree analysis, and sensitivity analysis.
3. Risk Prioritization
Definition: Ranking risks based on their potential impact and likelihood to
determine which risks require immediate attention.
Tools: Risk assessment matrices, prioritization charts.
4. Risk Response Planning
Avoidance: Changing project plans to eliminate the risk or its impact.
Example: Using a well-known technology instead of a new, untested one.
Mitigation: Reducing the probability or impact of the risk.
Example: Adding extra time to the schedule to account for potential delays.
Acceptance: Acknowledging the risk without taking any action unless it occurs.
Example: Deciding to accept the risk of occasional network outages.
Transfer: Shifting the impact of the risk to a third party.
Example: Outsourcing certain project activities to a vendor.
5. Risk Monitoring and Control
Definition: Tracking identified risks, monitoring residual risks, identifying new
risks, and evaluating risk process effectiveness throughout the project.
Activities: Regular risk reviews, status meetings, and risk audits.
Tools: Risk registers, risk dashboards, and performance metrics.
6. Risk Documentation
Definition: Keeping records of identified risks, analysis results, and response
plans.
Documents: Risk register, risk management plan, risk assessment reports.
Project Metrics:
Focus on tracking the progress and performance of a specific project.
Examples:
Velocity: Measures the amount of work completed in a specific timeframe
(e.g., sprint).
Cost: Measures the total financial expenditure of the project.
Schedule variance: Measures the difference between planned and actual
completion date.
Defect density: Measures the number of defects found per unit of code.
Benefits of using metrics:
Improved decision-making:
Data-driven insights help make informed decisions about resource allocation,
process improvement, and project management.
Increased productivity:
Identifying bottlenecks and inefficiencies allows for process optimization and
improved team performance.
Enhanced quality:
Tracking defect rates and other quality metrics helps ensure the delivery of
high-quality software.
Better communication:
Metrics provide a common language for stakeholders to discuss progress and
challenges.
Risk Mitigation:
Meet the current staff to determine causes for turnover (e.g., poor working
conditions, low pay, competitive job market).
Mitigate those causes that are under our control before the project starts.
Once the project commences, assume turnover will occur and develop
techniques to ensure continuity when people leave.
Organize project teams so that information about each development activity
is widely dispersed.
Define documentation standards and establish mechanisms to ensure that
documents are developed in a timely manner.
Assign a backup staff member for every critical technologist.
Risk Monitoring:
1. **Requirements Management**
- Ensures traceability and alignment between the project deliverables and user expectations.
- Manages changes to requirements over the project lifecycle.
2. **Project Planning**
- Includes activities like work breakdown structure creation, resource allocation, and budget
estimation.
- Sets the foundation for project execution and control.
7. **Configuration Management**
- Controls changes to software artifacts such as code, documents, and data.
- Maintains version history and ensures consistent project documentation.
**ISO 9000:2015** covers the basic concepts and language used in quality
management systems. It provides fundamental principles and vocabulary that
form the foundation for understanding and applying the other standards in
the ISO 9000 family. Key topics include:
- Principles of auditing
- Managing an audit program
- Conducting an audit
- Competence and evaluation of auditors