Software Engineering 1
Software Engineering 1
QUESTION BANK
(Common to Information Technology)
III SEMESTER
1908503 – SOFTWARE ENGINEERING
Regulation – 2019
Academic Year 2022 – 2023 ODD
Prepared by
15. Describe the functional and behavioral models for software requirement
(13) Understand BTL-2
process.
16. Draw use case & data flow diagrams for a “restaurant system”. The
(13)
activities of the Restaurant system are listed below. Receive the Evaluate BTL-5
customer food orders, Produce the customer ordered foods, Serve the
customer with their ordered foods, collect payment from customers,
store customer payment details, order raw materials for food products,
pay for raw materials & pay for labor.
17. Identify the difference between SRS document and design document.
(13)
Examine the contents that should be present in the SRS document and
Remember BTL-1
design document.
16. Explain the steps involved in conducting component level design (13) Apply BTL-3
When it is applied for object oriented system
PART-C(15 -MARKS)
Model a Dataflow diagram for a "Library Management System". State
1. (15)
and explain the functional requirements you are considering. Evaluate BTL-5
What is the purpose of DFD ?what are the components of DFD? Design
DFD for the following system:
An on-line shopping system for XYZ provides many services and
2. (15) Create BTL-6
benefits to its members and staffs. Currently ,XYZ staffs manually handle
the purchasing information with the use of basic office software,
such ass Microsoft office word and excel.it may results in having
mistakes easily and the process is very inconvenient .XYZ needs an
online shopping system at their intranet based on the requirement of
users. XYZ online shopping system has 5 key features:
i) to provide the user friendly online shopping cart function to members
to replace hardcopy ordering form.
ii)o store inventory and sales information in data base to reduce the
human mistakes, increase accuracy and enhance the flexibility of
information processing.
iii) to provide an efficient inventory system which can help the XYZ
staffs to gain enough information to update the inventory.
iv) to able to print invoice to members and print a set of summary
reports for XYZ internal usage.
Summarize on the Hierarchical concept of user interface design and
3. (15)
Draw the swim lane diagram for prescription refill function. Evaluate BTL-5
4. For any problem of your choice (say for example stock monitoring (15)
Evaluate BTL-5
system or key word frequency vector or key word in context that is used
in Information Retrieval system).Design at least four different
architectural design solutions using four different architectural styles.
Compare these solutions based on at least three quality attributes. Note
that the problem can be of your choice , the example given need not be
considered
Tamil Nadu Electricity Board(TNEB) would like to automate its billing
5. process. Customers apply for a connection (domestic/commercial).EB
staff take readings and update the system. Each customer is required to
pay charges by-monthly according to the rates set for the type of
connection. Customers can choose to pay either by cash/card. A bill is
generated on payment. Monthly reports are provided to EB Manager.
Design the following
i. Give a name for the system (2)
ii. Draw the Level – 0 DFD(Context Flow (6) Create BTL-6
diagram)
iii. Draw the Level- 1 DFD (7)
UNIT IV- TESTING AND MAINTENANCE
Software testing fundamentals-Internal and external views of Testing-white box testing - basis path testing-
control structure testing-black box testing- Regression Testing – Unit Testing – Integration Testing –
Validation Testing – System Testing And Debugging –Software Implementation Techniques: Coding
practices-Refactoring-Maintenance and Reengineering-BPR model-Reengineering process model-Reverse
and Forward Engineering.
PART-A (2 -MARKS)
What is the difference between black box testing and white box testing? Analyze BTL-4
1.
What methods are used for breaking very long expression and statements? Remember BTL-1
2.
What is the need for regression testing and system testing? Remember BTL-1
3.
List the levels of testing. Remember BTL-1
4.
How do you measure cyclomatic complexity? Evaluate BTL-5
5.
6. What is a test case? Remember BTL-1
7. Determine about software maintenance problem. Applying BTL-3
8. Define boundary value analysis. Remember BTL-1
9. How can refactoring be made more effective? Analyze BTL-4
10. How are software testing related to reliability of software? Apply BTL-3
Define: Reverse Engineering. Remember BTL-1
11.
In Unit testing of a module, it is found a set of test data, at maximum 90% of Apply BTL-3
12.
the code alone were tested with the probability of success . What is the
reliability of the module?
13. Distinguish between alpha and beta testing. Understand BTL-2
List two testing strategies that address verification. Which types of Analyze BTL-4
14.
testing address validation?
15. Formulate the best practices for coding. Create BTL-6
16. Differentiate verification and validation. Which type of testing address Understand BTL-2
verification?
17. What happen if the software fails after it has passed from acceptance testing? Create BTL-6
Examine.
18. What is the difference between testing and debugging? Understand BTL-2
19. What is business process reengineering? Understand BTL-2
20. Who Should perform the validation test, software developer or the software Evaluate BTL-5
users? Justify your answer.
21. Describe the objectives of testing. What is “cyclomatic complexity”? Evaluate BTL-5
Point out its primary use.
22. Give the testing principles the software engineer must apply while Understand BTL-2
performing the software testing.
23. Between “statement coverage and Branch Coverage”, Examine which Apply BTL-3
is a stronger criteria? Why?
24. Analyze on what is a “good” test and List two principles of good Analyze BTL-4
design.
PART-B (13- MARKS )
1. Discuss on
i. Unit testing &Regression testing (7)
BTL-2
ii. Validation testing & Acceptance testing (6) Understand
2. What is Boundary value analysis? Explain the technique specifying rules Analyze
(13) BTL-4
and is usage with the help of an example.
What is Equivalence class partitioning? List rules used to define valid and (13)
3. invalid Equivalence class. Describe the technique using example. Remember BTL-1
4. Elaborate path testing and regression testing with an example. (13) Remember BTL-1
5. Discuss the various Black box and white Box testing techniques. Use (13) Understand
BTL-2
suitable example for your explanation.
Describe about the various Integration & Debugging (13) Remember
6. strategies followed in software development. BTL-1
(i)Examine the various technical metrics and measures for software? (7)
8.
(ii)Demonstrate Software cyclomatic complexity metric with an (6)
Apply BTL-3
example.
State the need for Risk Management &explain the activities under risk (13)
9. Analyze BTL-4
management.
Describe the following
(7)
10. (i) Project scheduling .
(ii) Project Time Line chart & Task network . (6) Remember BTL-1
11. List the features of LOC and FP based estimation models and Compare (13)
the two models and list the advantages of one over other. Understand BTL-2
(i) An application has the following: 10 low external inputs, 8 high (3)
12. external outputs, 13 low internal logical files, 17 high external interface
files, 11 average external inquires and complexity adjustment factor of
Create BTL-6
1.10.Formulate the unadjusted and adjusted function point counts?
(ii) Discuss Putnam resources allocation model. Develop the time and
effort equations. (10)
Explain in detail COCOMO model for software cost estimation. Use it (13)
13.
to estimate the effort required to build software for a simple ATM that
produces 12 screens,10 reports and has 80 software components.
Evaluate BTL-5
Assume average complexity and average developer maturity. Use
application composition model with object points.
Describe in detail about the following scheduling
14.
(i) Timeline charts. (7)
(6) Remember BTL-1
(ii) Tracking the schedule and Tracking progress for an OO project.
(i) Discuss about risk management in a software development life cycle. (7)
15.
(ii) Discuss on the concept of RMMM. Understand BTL-2
(6)
Demonstrate on the following list given below
16.
(i) Function Point estimation. (7)
(6) Apply BTL-3
(ii) LOC based estimation.
(i) Explain in detail about risk identification. (7)
17.
(ii) Analyze on the concept of risk Projection. (6) Analyze BTL-4
PART-C(15 MARKS)
(i) Design the effort and duration using the above details for basic
COCOMO model.
Given,
1. Number of user inputs = 15 (7)
Number of user outputs = 3
Number of external interfaces = 11 Create BTL-6
1 function point = 20 LOC (as fourth generation language is
used). Values of constant used in basic COCOMO model.
a=2.4, b = 1.05, c = 2.5, d = 0.38.
(ii)Prepare in detail about the
a. Scheduling (4)
b. Error tracking.
(4)
Explain in detail about on:
2. (5)
(i)SCM .
(ii)Software cyclomatic complexity metric. (5) Evaluate BTL-5
(iii)Software cost estimation. (5)
Prepare RIS Sheets for any two risk associated with “Automated (15)
Airline controller” software. Create BTL-6
3.
Explain in detail about COCOMO model for software cost estimation.
Use it to estimate the effort required to build software for a simple
ATM that produces 12 screens, 10 reports and has 80 software
4. (15) Evaluating BTL-5
components. Assume average complexity and average developer
maturity .Use application composition model with object points.