0% found this document useful (0 votes)
62 views

Software Engineering 1

Uploaded by

Suba Saravanan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views

Software Engineering 1

Uploaded by

Suba Saravanan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

SRM VALLIAMMAI ENGINEERING COLLEGE

SRM Nagar, Kattankulathur – 603 203

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

QUESTION BANK
(Common to Information Technology)

III SEMESTER
1908503 – SOFTWARE ENGINEERING
Regulation – 2019
Academic Year 2022 – 2023 ODD

Prepared by

Dr.B.Vanathi., Prof & Head /CSE


Dr.C.Pabitha., Asst.Prof /CSE
SRM VALLIAMMAI ENGNIEERING COLLEGE
SRM Nagar, Kattankulathur – 603203.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


QUESTION BANK

SUBJECT : 1908503- SOFTWARE ENGINEERING


SEM / YEAR : III / II
UNIT I - SOFTWARE PROCESS AND AGILE DEVELOPMENT
Introduction to Software Engineering, Software Process, Perspective and Specialized Process Models –
Introduction to Agility-Agile process-Extreme programming-XP Process - Quality management-SQA-SQA plan.
PART-A (2 - MARKS)
Q. No QUESTIONS Competence BT Level
1. Write the IEEE definition of software engineering. Remember BTL-1
Demonstrate your understanding of umbrella activities of a
2. Apply BTL-3
Software process.
If you have to develop a word processing software product, what
3. Apply BTL-3
process model will you choose? Justify your answer and examine.
4. Differentiate verification and validation. Give an example. Understand BTL-2
List the characteristics of software contrasting it with characteristics of
5. Remember BTL-1
hardware.
6. Explain How do we create a process that can manage unpredictability? Evaluate BTL-5
7. Summarize the human factors considered for an agile software development. Evaluate BTL-5
8. Is it possible to realize Win-Win spiral model for software. Analyze Analyze BTL-4
9. Summarize the pros and cons of iterative software development model. Evaluate BTL-5
10. Define agile process .Give any two agile principles. Remember BTL-1
List two deficiencies in waterfall model. Which process model do you
11. Remember BTL-1
suggest to overcome each deficiency
12. Compare perspective and specialized process model. Analyze BTL-4
13. Predict about XP story. Understand BTL-2
14. Discuss about the various drawbacks of spiral model Understand BTL-2
15. Generalize on any two characteristics of software as a product. Create BTL-6
Show what led to the transition from product oriented development to
16. Apply BTL-3
process oriented development.
17. Differentiate SDD and DDD. Analyze BTL-4
Create six new practices that are designed to help ensure that an XP project
18. works successfully for significant projects within a large Create BTL-6
organization.
19. Summarize on extreme programming. Understand BTL-2
20. Why system engineers must understand the environment of a Remember BTL-1
system? Give two reasons.
21. What are the potential advantages of adhering to life cycle models for software? Remember BTL-1
22. Compare and contrast the relative advantages of object oriented and function Understand BTL-2
oriented approaches to software design.
23. Illustrate the umbrella activities of a software process.
Apply BTL-3
24. Point out two deficiencies in waterfall model. Which process model do you Analyze BTL-4
suggest to overcome each deficiency?

PART-B (13- MARKS)


Define software life cycle. List all life cycle models and explain spiral
1. (13) Remember BTL-1
model with a neat diagram.
(i) Explain alteast one scenario where
a) RAD model would be applicable and not the waterfall model. (7)
2. b) waterfall model is preferable compare to all other models. Analyze BTL-4
(ii) What are the pros and cons of using mathematical approach for (6)
software development?
(i) Describe about agile modeling in detail. (7)
3. (ii) Explain the component based software development model with a Remember BTL-1
(6)
neat sketch
(i) Write short notes on aspect oriented software development.
(7)
4. (ii) Explain in detail about personal process models and team process Evaluate BTL-5
(6)
models.
(i) What is a process model? Describe the process model that you would (7)
5. choose to manufacture a car explain giving suitable reasons. Remember BTL-1
(ii) Describe the various Evolutionary Process Models with neat diagram. (6)
(i) Compare the life cycle models based on their distinguishing factors,
(7)
strengths and weaknesses.
6. Analyze BTL-4
(ii) Discuss the prototyping model .what is the effect of designing
(6)
prototype on the overall cost of the software project?
Explain in detail about iterative and waterfall model and also write short (13)
7. Apply BTL-3
notes on concurrent models.
(i) Discuss in detail about drawback of life cycle model.
(7)
8. (ii) What is the significance of the spiral model when compared with Understand BTL-2
(6)
other model?
Discuss the Extreme Programming process and What are some of the (13)
9. Understand BTL-2
issues that lead to an XP debate?
(i) Illustrate about agility and cost of change.
(7)
10. (ii) What key traits must exist among the people on an effective software Apply BTL-3
(6)
team?
What is agility in the context of software engineering work? And list the (13)
11. Understand BTL-2
principles of agile software development.
(i) Compose your view about agile software development. (7)
12. Create BTL-6
(ii) Generalize your view about extreme programming. (6)
Describe about pair programming and how unit tests used in XP? And list (13)
13. Remember BTL-1
the new practices appended to XP to create IXP.
(i) Explain software product engineering with its services and (7)
14. advantages. Apply BTL-3
(ii)Write a note on the unique characters of a software. (6)
15. Which process model is best suited for risk management? Discuss in (13)
detail with an example. Give the advantages and disadvantages of the Understand BTL-2
model.
16. Explain the XP concepts of refactoring and (13) Evaluate BTL-5
pair programming.
17. Analyze the concept of Agility. List the principles of agility and illustrate (13)
Analyze BTL-4
the process in detail.
PART-C (15- MARK )
Generalize about system engineering hierarchy with suitable diagram and
1. give an overview of the Business process Engineering with a (15) Create BTL-6
diagram.
Compare the following life cycle models based on their distinguishing
factors, strengths and weakness-waterfall model, AD model, Spiral Model,
2. (15) Evaluate BTL-5
and Formal Methods Model.(Present in the form of table only-
use diagrams wherever necessary).
3. Compose in detail about agile process development model with example (15) Create BTL-6
4. Explain about the umbrella activities which support software development
process and discuss about their necessity in maintaining the quality in both
(15) Evaluate BTL-5
software process and product that is being developed
for railway reservation system.
Assume that you are the technical manager of a software development
organization. A Client approached you for a software solution the
problems stated by the client have uncertainties which lead to loss if it not
5. (15) Evaluate BTL-5
planned and solved which software development model you will suggest
for this project –justify. Explain that model With its pros and
cons and neat sketch.
UNIT II- REQUIREMENTS ANALYSIS AND SPECIFICATION
Software Requirements: Functional and Non-Functional, User requirements, System requirements, Software
Requirements Document – Requirement Engineering Process: Feasibility Studies, Requirements elicitation and
analysis, requirements validation, requirements management-Classical analysis: Structured system Analysis, Petri
Nets- Data Dictionary.
PART-A (2 - MARKS)
Q.No QUESTIONS BT Level Competen
ce
Give a use case diagram for an online shopping which should provide provisions
1. for registering authenticating the customers and also online
Understand BTL-2
payment through any payment gateway like PayPal.
2. Summarize feasibility study. And list the types.
Evaluate BTL-5
Classify the following as functional /non-functional requirements for a
banking system
3. (a)Verifying bank balance (b) Withdrawing money from bank Apply BTL-3
(c) Completion of transactions in less than one second. (d)Extending
the system by providing more tellers for the customers
Draw and explain a simple semantic data model for a library
4.
Management system Analyze BTL-4
List the characteristics of a good system requirements
5. Remember BTL-1
specification(SRS)
6. Define Quality Function Development(QFD) Remember BTL-1
7. How requirements are classified? List them with an example for each. Apply BTL-3
8. Develop the spiral view of requirement engineering process. Create BTL-6
9. Differentiate between normal and exciting requirement. Understand BTL-2
Point out the problems faced when user requirements are written in
10. Analyze BTL-4
natural language.
Distinguish between the terms inception, elicitation and elaboration
11. Understand BTL-2
with reference to requirements.
List two advantages of using traceability tables in the requirements
12. Remember BTL-1
management phase.
13. Classify the metrics for specifing non-functional requirements. Analyze BTL-4
Express the different types of check list that should be carried out for requirement
14. Understand BTL-2
validation process.
Explain how to manage changing requirements during the requirements
15. Evaluate BTL-5
elicitation process?
16. What is meant by structural analysis and volatile requirement? Remember BTL-1
17. Classify the common data Dictionary notations Apply BTL-3
18. Define Petri Net and list types of traceability in a software process. Remember BTL-1
19. Explain, how the requirements are validated? Evaluate BTL-5
20. Generalize on the concept of data dictionary. Create BTL-6
21. What are the types of prototypes? Remember BTL-1
22. Interpret the usage of ERD. Understand BTL-2
Examine the advantage of using traceability tables in the requirement
23. Apply BTL-3
management phase.
24. Point out the linkages between data flow and E-R Diagram Analyze BTL-4

PART-B (13- MARK )


Differentiate functional and non-functional requirements and give the (13)
1. Understand BTL-2
steps involved in initiating requirements engineering.
(i) What are called as non-functional requirements? Explain in detail.
(7)
2. (ii) Summarize on user requirements and system requirements in Understand BTL-2
(6)
detail.
Classify and explain the Three aspects that SRS should clearly (13)
document also list the characteristics of good SRS document and their
3. Apply BTL-3
components.
(i) Demonstrate the structure of requirement document. (7)
4. Apply BTL-3
(ii) Show the possible users of requirement document. (6)
(i) Explain the different ways of writing a system requirement
(7)
5. specification. Remember BTL-1
(6)
(ii) Describe the spiral view of system requirement.
Analyze about the requirement engineering process and how the
6. (13) Analyze BTL-4
requirements are managed.
State the purpose, inputs and results of the feasibility study, list any four
(13)
issues addressed by a feasibility study and elaborate the phases involved
7. when carrying out a feasibility study. Remember BTL-1
What is requirement elicitation? Briefly describe the various activities
8. performed in requirements elicitation with an example of a watch (13) Evaluate BTL-5
system that facilitates to set time and alarm and assess.
i) What is feasibility study?how it helps in requirement engineering (5)
process.
ii) How will you classify the requirement types of a project, give example. (4)
9. Create BTL-6
iii) List the stake holders and all types of requirements for an online train
reservation system . (4)
Write short notes on the list given below
(i) Requirements discovery and Interviewing. (6)
10. Remember BTL-1
(ii) Scenarios and Use cases. (7)
(i) Classify the different types of checks carried out on the requirements (7)
in the requirements document during the validation process.
11. Apply BTL-3
(ii) Demonstrate on the requirement validation techniques. (6)
(i) Discuss about the requirement management planning. (7)
12. Understand BTL-2
(ii) Describe about the requirement change management. (6)
(i) Analyze briefly about the structural system analysis in detail. (7)
13. Analyze BTL-4
(ii) Explain about classical perti nets model. (6)
(i) What is the purpose of data flow diagrams? What are the notations (13)
used for the same? Explain by constructing a context flow diagram
14. Analyze BTL-4
level-0 DFD and Level-1 DFD for a library management system.

15. Describe the functional and behavioral models for software requirement
(13) Understand BTL-2
process.
16. Draw use case & data flow diagrams for a “restaurant system”. The
(13)
activities of the Restaurant system are listed below. Receive the Evaluate BTL-5
customer food orders, Produce the customer ordered foods, Serve the
customer with their ordered foods, collect payment from customers,
store customer payment details, order raw materials for food products,
pay for raw materials & pay for labor.
17. Identify the difference between SRS document and design document.
(13)
Examine the contents that should be present in the SRS document and
Remember BTL-1
design document.

PART-C (15 -MARKS)


Develop an online railway reservation system, which allows the user to
select route, book/cancel tickets using net banking/credit/debit cards. The
1. site also maintains the history of the passengers. For the above system, (15) Create BTL-6
list and draw the use case scenario and model the above
specification.
2. Assess on software requirement specification for banking system. (15) Evaluate BTL-5
Consider an online book stores. It accepts individual/bulk orders,
3.
process payments, triggers delivery of the books. Some of the
major features of the system include: (15) Create BTL-6
 Order books.
 Use friendly online shopping cart function.
 Create, view Modify and delete books to be sold.
 To store inventory and sales information in database.
 To provide an efficient inventory system’.
 Register for book payment options.
 Request book delivery.
 Add a wish list.
 Place request for books not available.
 To be able to print invoices to members and print a set of
summary reports.
 Internet access.
Analyze the system using the context diagram and level 1 DFD for the
system. Explain the components of DFD.(15)
Evaluate the process of ordering a pizza over the phone. Draw the use
case diagram and also sketch the activity diagram representing each step (15) Evaluate BTL-5
of the process, from the moment you pick up the phone to the point where
4. you start eating the pizza. Include activities that others need to perform.
Add exception handling to the activity diagram you developed. Consider
at least two exceptions (e.g. delivery person wrote down
wrong address, deliver person brings wrong pizza).
5. Prepare a software requirement specification document for a “Library
Management System” (15) Evaluate BTL-5
UNIT III- SOFTWARE DESIGN
Design process – Design Concepts-Design Model– Design Heuristic – Architectural Design -Architectural styles,
Architectural Design, Architectural Mapping using Data Flow- User Interface Design: Interface analysis,
Interface Design –Component level Design: Designing Class based components, traditional Components.
PART-A (2 - MARKS)
1. What do you interpret from design heuristics? Understand BTL-2
2. List two principles of good design. Remember BTL-1
3. What do you infer from the design quality attributes ‘FURPS’? Analyze BTL-4
4. Draw the context flow graph of an ATM automation system. Remember BTL-1
5. 'A system must be loosely coupled and highly cohesive’. Justify. Evaluate BTL-5
6. Define Modularity. Remember BTL-1
7. Give the various types of architectural styles with example. Understand BTL-2
8. What is coupling and list the various types of coupling? Remember BTL-1
How do you apply modularization criteria for monolithic software?
9. Understand BTL-2
Discuss.
10. Summarize mapping. Evaluate BTL-5
Analyze an UI design pattern are used for the following.
11. i) Page layout ii) Tables Analyze BTL-4
iii) Navigation through menus and webpages iv) Shopping cart.
12. Distinguish between transform flow and transaction flow. Understand BTL-2
13. List the basic design principles of class based component. Remember BTL-1
Point out the steps that are applied to develop a decision table in tabular
14. Analyze BTL-4
design notation.
Classify the four distinct frame work activity in the user interface
15. Apply BTL-3
analysis and design process.
16. Design the architectural context diagram. Create BTL-6
In case of user interface analysis, assess the steps that are taken for
17. Evaluate BTL-5
understanding the problems.
18. Classify the user interface design steps. Apply BTL-3
19. Show the facilities to be provided in a system to recover users from the Apply BTL-3
mistakes.
20. Generalize on the concept of user interface design pattern. Create BTL-6
21. Define data abstraction and inheritance. Remember BTL-1
22. Give the need for architectural mapping using data flow. Understand BTL-2
23. Differentiate the notion of software architecture and design patterns.
Analyze BTL-4
24. If a module has logical cohesion, what kind of coupling is this module likely to Apply BTL-3
have? Illustrate.

PART-B (13- MARKS )


Explain the following list of design concept
(i) Abstraction and Modularity (5) Evaluate BTL-5
1.
(ii) Patterns & Functional independence (8)
Explain about software architecture design, with emphasize as fan in, (13) Evaluate BTL-5
2. fan-out, coupling, cohesion and factoring.
Analyze your understanding on the following design models
(i) Data design elements and Architectural design elements. (6)
3. Analyze BTL-4
(ii) Interface design elements and Component-level design elements. (7)
Demonstrate in detail about architectural design and illustrate in detail (13)
4. Apply BTL-3
about any four architectural styles.
Give the steps involved in transform mapping and discuss transform (13)
5. Understand BTL-2
mapping with example.
List the steps involved in transaction mapping and describe transaction (13)
6. Remember BTL-1
mapping with example.
(i) Discuss the basic design principles of class based components. (7)
7. Remember BTL-2
(ii) Discuss the component-level design guidelines. (6)
Describe the various coupling and cohesion methods used in software
8. (13) Understand BTL-2
design.
Examine Architectural Styles.
(i) Data centered Architecture and Data Flow Architecture. (7)
9. Apply BTL-3
(ii) Call and Return Architecture and Object Oriented Architecture. (6)
(i) Analyze on the concept of graphical design notation. (7)
Analyze BTL-4
10. (ii) Explain Tabular Design Notation. (6)
i) Describe about user interface analysis in detail. (7)
11. Remember BTL-1
ii) Explain the general model of a real time system. (6)
Generalize on the concept of user interface design and list the (13)
12. characteristics of a good user interface design and Develop the Create BTL-6
design issues in interface design.
(i) Analyze about program design language in designing conventional (7)
13. components. Analyze BTL-4
(ii) Classify and explain the various architectural styles in detail. (6)
i) What are? Describe how UID may be developed for a data acquition (7)
14. system. Remember BTL-1
ii) Discuss the design heuristics for effective modularity design. (6)
What are the good characteristics of good design? Discuss how
15. (13) Understand BTL-2
structural partitioning can help to make software more maintainable.

16. Explain the steps involved in conducting component level design (13) Apply BTL-3
When it is applied for object oriented system

What is transform mapping? Describe the design steps of the (13)


17. Remember BTL-1
transform mapping and transaction mapping.

PART-C(15 -MARKS)
Model a Dataflow diagram for a "Library Management System". State
1. (15)
and explain the functional requirements you are considering. Evaluate BTL-5
What is the purpose of DFD ?what are the components of DFD? Design
DFD for the following system:
An on-line shopping system for XYZ provides many services and
2. (15) Create BTL-6
benefits to its members and staffs. Currently ,XYZ staffs manually handle
the purchasing information with the use of basic office software,
such ass Microsoft office word and excel.it may results in having
mistakes easily and the process is very inconvenient .XYZ needs an
online shopping system at their intranet based on the requirement of
users. XYZ online shopping system has 5 key features:
i) to provide the user friendly online shopping cart function to members
to replace hardcopy ordering form.
ii)o store inventory and sales information in data base to reduce the
human mistakes, increase accuracy and enhance the flexibility of
information processing.
iii) to provide an efficient inventory system which can help the XYZ
staffs to gain enough information to update the inventory.
iv) to able to print invoice to members and print a set of summary
reports for XYZ internal usage.
Summarize on the Hierarchical concept of user interface design and
3. (15)
Draw the swim lane diagram for prescription refill function. Evaluate BTL-5

4. For any problem of your choice (say for example stock monitoring (15)
Evaluate BTL-5
system or key word frequency vector or key word in context that is used
in Information Retrieval system).Design at least four different
architectural design solutions using four different architectural styles.
Compare these solutions based on at least three quality attributes. Note
that the problem can be of your choice , the example given need not be
considered
Tamil Nadu Electricity Board(TNEB) would like to automate its billing
5. process. Customers apply for a connection (domestic/commercial).EB
staff take readings and update the system. Each customer is required to
pay charges by-monthly according to the rates set for the type of
connection. Customers can choose to pay either by cash/card. A bill is
generated on payment. Monthly reports are provided to EB Manager.
Design the following
i. Give a name for the system (2)
ii. Draw the Level – 0 DFD(Context Flow (6) Create BTL-6
diagram)
iii. Draw the Level- 1 DFD (7)
UNIT IV- TESTING AND MAINTENANCE
Software testing fundamentals-Internal and external views of Testing-white box testing - basis path testing-
control structure testing-black box testing- Regression Testing – Unit Testing – Integration Testing –
Validation Testing – System Testing And Debugging –Software Implementation Techniques: Coding
practices-Refactoring-Maintenance and Reengineering-BPR model-Reengineering process model-Reverse
and Forward Engineering.
PART-A (2 -MARKS)
What is the difference between black box testing and white box testing? Analyze BTL-4
1.
What methods are used for breaking very long expression and statements? Remember BTL-1
2.
What is the need for regression testing and system testing? Remember BTL-1
3.
List the levels of testing. Remember BTL-1
4.
How do you measure cyclomatic complexity? Evaluate BTL-5
5.
6. What is a test case? Remember BTL-1
7. Determine about software maintenance problem. Applying BTL-3
8. Define boundary value analysis. Remember BTL-1
9. How can refactoring be made more effective? Analyze BTL-4
10. How are software testing related to reliability of software? Apply BTL-3
Define: Reverse Engineering. Remember BTL-1
11.
In Unit testing of a module, it is found a set of test data, at maximum 90% of Apply BTL-3
12.
the code alone were tested with the probability of success . What is the
reliability of the module?
13. Distinguish between alpha and beta testing. Understand BTL-2
List two testing strategies that address verification. Which types of Analyze BTL-4
14.
testing address validation?
15. Formulate the best practices for coding. Create BTL-6
16. Differentiate verification and validation. Which type of testing address Understand BTL-2
verification?
17. What happen if the software fails after it has passed from acceptance testing? Create BTL-6
Examine.
18. What is the difference between testing and debugging? Understand BTL-2
19. What is business process reengineering? Understand BTL-2
20. Who Should perform the validation test, software developer or the software Evaluate BTL-5
users? Justify your answer.
21. Describe the objectives of testing. What is “cyclomatic complexity”? Evaluate BTL-5
Point out its primary use.
22. Give the testing principles the software engineer must apply while Understand BTL-2
performing the software testing.
23. Between “statement coverage and Branch Coverage”, Examine which Apply BTL-3
is a stronger criteria? Why?
24. Analyze on what is a “good” test and List two principles of good Analyze BTL-4
design.
PART-B (13- MARKS )
1. Discuss on
i. Unit testing &Regression testing (7)
BTL-2
ii. Validation testing & Acceptance testing (6) Understand

2. What is Boundary value analysis? Explain the technique specifying rules Analyze
(13) BTL-4
and is usage with the help of an example.
What is Equivalence class partitioning? List rules used to define valid and (13)
3. invalid Equivalence class. Describe the technique using example. Remember BTL-1

4. Elaborate path testing and regression testing with an example. (13) Remember BTL-1
5. Discuss the various Black box and white Box testing techniques. Use (13) Understand
BTL-2
suitable example for your explanation.
Describe about the various Integration & Debugging (13) Remember
6. strategies followed in software development. BTL-1

(i) Explain software implementation techniques .What is the percentage in (7)


7. total cost of the project? How do you expedite the implementation stage
Evaluate BTL-5
(ii) What is meant by control flow testing? Is it always falling with data
flow in case of software? Justify? (6)
(i) Compare White box and black box testing. (4)
8. (ii) Write a procedure for the following: Given three sides of a triangle,
return the type of triangle i.e. equilateral, isosceles and scalene triangle.
Draw the Control Flow Graph and calculate the minimum number of (9) Apply BTL-3
paths. Enumerate the paths to be tested.
(i) Explain the categories of debugging approaches. Analyze BTL-4
(7)
(ii) Why is testing important? Relate the path testing procedure in detail
9. with sample code. (6)
10. Develop BPR model to increase the efficiency of business process. (13)
Create BTL-6
11. Define Refactoring and List the Phases in software Reengineering (13)
Understand BTL-2
process model and explain each phase.
12. What is black box testing? Explain the different types of black box
(13) Analyze BTL-4
testing strategies. Explain by considering suitable examples.
(i) Highlight Forward engineering process for different types of (7)
13.
architectures.
(ii) Outline how the reverse engineering process helps the software engineer (6) Remember BTL-1
to understand the internal design structure of complex problems.
Describe the type’s basic path testing given. (7)
14.
(i)Flow graph notation. Evaluate BTL-5
(ii) Independent program paths. (6)
Summarize on Top-down Integration testing and Bottom -up (13)
15. Understand BTL-2
integration testing .
(i) Illustrate in detail about Reverse engineering process. (7)
16. Apply BTL-3
(iii) Explain Forward Engineering for Client-Server Architectures. (6)
Apply and analyze the purpose of system testing with a high level
17. (13) Apply BTL-3
explanation on all its types.
PART-C (15-MARKS)
How Reverse Engineering is used for Data, Processing and User
1. (15) Evaluate BTL-5
Interface? Justify your answer.
2. (i) Enumerate the various types of software test. Which type of testing is (8)
suitable for boundary condition? Justify.
(7) Create
(ii) How do you relate software testing results with reliability of the BTL-6
product? Explain.
Given a set of numbers ‘n’; ,the function findprime(a[],n) prints a number (15)
3.
if it is a prime number. Draw a control flow graph, calculate the
cyclomatic complexity and enumerate all paths. State how many test
Create
cases are needed to adequately cover the code in terms of branches, BTL-6
decisions and statement? Develop the necessary test cases using sample
values for ‘a’ and ‘n’..
Write the program for sorting of n numbers. Draw the flow chart, flow
4. (15)
graph, and point out the cyclomatic complexity. Create BTL-6
Consider the pseudocode for simple subtraction given below:
5. (15)
Program ‘Simple Subtraction’
Input (x,y)
Output(y)
If x> y then DO
x-y=z
Evaluate BTL-5
else y-x=z
endif
output(z)
output ‘End Program’
perform the basic path testing and generate test cases .Explain black box
and white box testing.
UNIT V-PROJECT MANAGEMENT
Software Project Management: Estimation – LOC, FP Based Estimation, Make/Buy Decision COCOMO I
& II Model – Project Scheduling – Scheduling, Earned Value Analysis Planning – Project Plan, Planning
Process, RFP Risk Management – Identification, Projection - Risk Management-Risk Identification-
RMMM Plan-CASE TOOLS.
PART-A (2 -MARKS)
1. What are the Decomposition Techniques? Remember BTL-1
2. How do we compute the “Expected Value” for Software Size? Apply BTL-3
What are the different types of productivity estimation measures? Remember BTL-1
3.
4. What is Work Breakdown Structure? Remember BTL-1
5. List any two advantages of using COCOMO Model. Remember BTL-1
6. What is risk management? Remember BTL-1
7. Compare Project risk and Business Risk Analyze BTL-4
8. Will exhaustive testing guarantee that the program is 100% correct? Examine. Apply BTL-3
9. Classify the activities in project planning. Analyze BTL-4
10. What is the difference between direct and indirect measures? Understand BTL-2
11. How to measure the function point FP? Evaluate BTL-5
12. What is budgeted cost of work scheduled? Understand BTL-2
13. Why LOC is not treated as a standard metric? Justify. Evaluate BTL-6
14. Formulate the metrics computed during error tracking activity. Evaluate BTL-6
15. State the importance of scheduling activity in project management. Understand BTL-2
16. Write any two differences between “known risks” and “predictable risks”. Evaluate BTL-5
17. An Organic software occupies 15,000 LOC. How many programmers are
Apply BTL-3
needed to complete?
18. How is productivity and cost associated to Function points? Understand BTL-2
19. What do you infer about EVA? Analyze BTL-4
20. Summarize the CASE tools for the following phases of SDLC: Design,Testing. Evaluate BTL-5
21. Define risk. What are its type? Give an example. Remember BTL-1
22. Discuss is there a systematic way to sort through the options associated
Understand BTL-2
with the make/buy decision?
23. What do you infer from RMMM? Analyze BTL-4
24. Compare size oriented and function oriented metrics. Apply BTL-3
PART-B(13 MARKS )
Summarize the methods of decomposition for software cost (13)
1. estimation and describe the various estimation techniques. Evaluate BTL-5
(i)Describe about COCOMOI / II model cost estimation. BTL-1
(7)
2. (ii)Summarize the types of project plan. Remember
(6)
How the cost of a software is estimated using
3.
(i) Function Point metric Model & COCOMO
(by three Methods.) (10) BTL-3
Apply
(ii)What is the contribution of technology complexity factor in function (3)
point model.
(i) Define Risk & List the types of risk and give examples for each. (7)
4. Understand BTL-2
(ii) List and explain the phases in risk management. (6)
Discuss Decision tree to support Make/buy decision. (13)
Understand BTL-2
5.
(i)Describe the basic principles of software project scheduling. (7)
6. (ii)Describe the relationship between people and effort with diagram. (6) Remember BTL-1

(i) Pointout the challenges of risk management. (7)


7. (ii)How to track the schedule for the project? Explain in detail. (6) Analyze BTL-4

(i)Examine the various technical metrics and measures for software? (7)
8.
(ii)Demonstrate Software cyclomatic complexity metric with an (6)
Apply BTL-3
example.
State the need for Risk Management &explain the activities under risk (13)
9. Analyze BTL-4
management.
Describe the following
(7)
10. (i) Project scheduling .
(ii) Project Time Line chart & Task network . (6) Remember BTL-1
11. List the features of LOC and FP based estimation models and Compare (13)
the two models and list the advantages of one over other. Understand BTL-2

(i) An application has the following: 10 low external inputs, 8 high (3)
12. external outputs, 13 low internal logical files, 17 high external interface
files, 11 average external inquires and complexity adjustment factor of
Create BTL-6
1.10.Formulate the unadjusted and adjusted function point counts?
(ii) Discuss Putnam resources allocation model. Develop the time and
effort equations. (10)
Explain in detail COCOMO model for software cost estimation. Use it (13)
13.
to estimate the effort required to build software for a simple ATM that
produces 12 screens,10 reports and has 80 software components.
Evaluate BTL-5
Assume average complexity and average developer maturity. Use
application composition model with object points.
Describe in detail about the following scheduling
14.
(i) Timeline charts. (7)
(6) Remember BTL-1
(ii) Tracking the schedule and Tracking progress for an OO project.
(i) Discuss about risk management in a software development life cycle. (7)
15.
(ii) Discuss on the concept of RMMM. Understand BTL-2
(6)
Demonstrate on the following list given below
16.
(i) Function Point estimation. (7)
(6) Apply BTL-3
(ii) LOC based estimation.
(i) Explain in detail about risk identification. (7)
17.
(ii) Analyze on the concept of risk Projection. (6) Analyze BTL-4
PART-C(15 MARKS)

(i) Design the effort and duration using the above details for basic
COCOMO model.
Given,
1. Number of user inputs = 15 (7)
Number of user outputs = 3
Number of external interfaces = 11 Create BTL-6
1 function point = 20 LOC (as fourth generation language is
used). Values of constant used in basic COCOMO model.
a=2.4, b = 1.05, c = 2.5, d = 0.38.
(ii)Prepare in detail about the
a. Scheduling (4)
b. Error tracking.
(4)
Explain in detail about on:
2. (5)
(i)SCM .
(ii)Software cyclomatic complexity metric. (5) Evaluate BTL-5
(iii)Software cost estimation. (5)
Prepare RIS Sheets for any two risk associated with “Automated (15)
Airline controller” software. Create BTL-6
3.
Explain in detail about COCOMO model for software cost estimation.
Use it to estimate the effort required to build software for a simple
ATM that produces 12 screens, 10 reports and has 80 software
4. (15) Evaluating BTL-5
components. Assume average complexity and average developer
maturity .Use application composition model with object points.

5. Suppose you have a budget cost of a project as Rs.9, 00,000.The


project is to be completed in 9 months. After a month, you have
completed 10 percent of the project at a total expense of Rs.1,
(15) Evaluating BTL-5
00,000.The planned completion should have been 15 percent .you
need to evaluate whether the project is on-time and on-budget? Use
Earned Value analysis approach and interpret.

You might also like