CLICK HERE FOR VARIOUS NEW JOBS 
CLICK HERE FOR VARIOUS EDUCATIONAL NEWS 
CLICK HERE FOR NEW SCHOLARSHIPS 
CLICK HERE FOR ADMISSION NOTICES 
Click And Follow On Google+ To Get Updates
Please Wait 10 Seconds... OR You CanSkip

ADMISSION NOTICES
Scholarships

Scholarship-300x291

BUDGET 2014-15
budget_2014-2015
New Date Sheets
VU SOLVED ASSIGNMENTS
Recent Posts

Posts Tagged ‘Software EngineeringII’

VU CS605- Software EngineeringII FinalTerm solved unsolved past papers

VU CS605- Software EngineeringII FinalTerm Solved Unsolved Past Papers

 

Question No: 1    ( Marks: 1 )    – Please choose one

 A law affirming that to continue after a certain level of performance has been reached will result in a decline in effectiveness. This law is know as __________________

 

► Law of Diminishing returns

 

► Law of effectiveness

 

► Law of Saturation

 

► Law of Marketing returns

 

 

Question No: 2    ( Marks: 1 )    – Please choose one

 Build and Fix model is a ___________ type of software development activity.

 

► Mathematical

► Perfect

► Haphazard

► Planned

 

Question No: 3    ( Marks: 1 )    – Please choose one

  In _________________ a team is structured along a traditional hierarchy of authority

► closed paradigm

► synchronous paradigm

► random paradigm

► open paradigm

 

Question No: 4    ( Marks: 1 )    – Please choose one

 MTTC is the abbreviation of

 

 

 

 

 

► measured time to change

► mean time to collaborate

► mean time to change

► measure time to cope

 

Question No: 5    ( Marks: 1 )    – Please choose one

 While creating matrix for a set of projects, data should be collected that belongs to a similar domain

► true

► false

 

Question No: 6    ( Marks: 1 )    – Please choose one

 The rapid application development model is

 

► Another name for component-based development.

 

► A useful approach when a customer cannot define requirements clearly

► A high speed adaptation of the linear sequential model.

 

► All of the given

 

 

Question No: 7    ( Marks: 1 )    – Please choose one

 While managing the historical data, we should consider the following except

 

 

 

 

► Data should be collected only from scientific projects and applications

 

 

► Data should be collected from many projects

► Data should be consistent

► Correct data should be taken

 

Question No: 8    ( Marks: 1 )    – Please choose one

 Quality costs may be divided into costs associated with

 

► prevention, appraisal, and failure

► people, process, and product

► customers, developers, and maintenance

► all of the given

 

Question No: 9    ( Marks: 1 )    – Please choose one

 When a software is delivered to a client and then client reports the bug in it then that bug is termed as

 

► Error

 

 

► Defect

 

 

► Mistake

► Fault

 

Question No: 10    ( Marks: 1 )    – Please choose one

 Mean Time To Repair (MTTR) is the

 

► Time when system remained unable for usage

 

► Time taken to fix the error

 

► Time taken to repair the software

 

► All of the given options are correct.

 

 

Question No: 11    ( Marks: 1 )    – Please choose one

 Reliability and Safety are same concepts with respect to software quality

 

► True

► False

 

Question No: 12    ( Marks: 1 )    – Please choose one

 Software configuration management is used to

 

► Manage change in the software

 

► Mange the financials accounts in an organization

 

► Manage the administration of company

 

► All of the given

 

 

Question No: 13    ( Marks: 1 )    – Please choose one

 SCM is the requirement of the ________ level(s) of CMM

 

► First

 

► Second and later

 

► Third and later

 

► Only Second

 

 

Question No: 14    ( Marks: 1 )    – Please choose one

 If a new version of a product is released by fixing the bugs in the previous release then it is termed as _________________

► Product Update

 

► Product Upgrade

 

► Defect Removal

 

 

► Product Performance

 

Question No: 15    ( Marks: 1 )    – Please choose one

 The Evolution Graph signifies the

 

► version relationship

 

► baseline of a particular release

 

► change control activity

 

► all of the given

 

 

Question No: 16    ( Marks: 1 )    – Please choose one

 The management of creeping requirements is important for the ease of

 

► maintenance

 

► development

 

► testing

 

► all of the given

 

 

Question No: 17    ( Marks: 1 )    – Please choose one

 Following are the components of a Legacy system except:

 

► business processes

 

► system hardware

 

► marketing

 

► application software

 

 

Question No: 18    ( Marks: 1 )    – Please choose one

 There are many reasons for which the legacy system become difficult to maintain EXCEPT

 

 

► Language in which system was developed become obsolete

 

► lack of consistency as different parts of the system have been developed by different teams

► None of these

 

► No documentation is available

 

 

Question No: 19    ( Marks: 1 )    – Please choose one

 The application software is assessed on the basis of following factors except

 

► Documentation

 

► Understandability

 

► Code Refactoring

 

► Test data

 

 

Question No: 20    ( Marks: 1 )    – Please choose one

 The process of rediscovering the software design is called

 

 

► Reverse Engineering

 

► Business Engineering

 

► Business Process Engineering

 

► Forward Engineering

 

 

Question No: 21    ( Marks: 1 )    – Please choose one

 In ______________, new user and technology requirement can also be integrated into the re-engineering effort.

 

 

► Backward re-engineering

 

► Forward re-engineering

 

► Business Engineering

 

► Business Process Engineering

 

 

Question No: 22    ( Marks: 1 )    – Please choose one

 A redesigned business process must be prototyped before it is fully integrated into the business.

 

► False

 

► True

 

 

 

Question No: 23    ( Marks: 1 )    – Please choose one

 In ___________ representation of CMMI model, consideration is given to improve selected processes areas.

 

► Staged

► Continuous

 

Question No: 24    ( Marks: 1 )    – Please choose one

 The purpose of earned value analysis is to

 

► determine how to compensate developers based on their productivity

 

► provide a quantitative means of assessing software project progress

 

► provide a qualitative means of assessing software project progress

 

► set the price point for a software product based on development effort

 

 

Question No: 25    ( Marks: 1 )    – Please choose one

 The software plan is not a static document, it is frequently adjusted to make the project appear on track to meet all deadlines and quality targets.

► True

► False

 

Question No: 26    ( Marks: 1 )    – Please choose one

 There are tools available in the market for project tracking. These tools can autmomatically track and manage the project replacing the need of any human being as a Project Manager.

► True

► False

 

Question No: 27    ( Marks: 1 )    – Please choose one

 Timeline chart is also known as the _____________ chart

► Gantt

► PERT

► FREE LANCE

► None of the given

 

Question No: 28    ( Marks: 1 )    – Please choose one

 The processes at ———– is focus on continually improving process performance through both incremental and innovative technological changes/improvements.

 

 

 

► Level 5

► Level 1

► Level 4

► Level 3

 

Question No: 29    ( Marks: 1 )    – Please choose one

 In a complex system that will lead to much ………..code to write and maintain.

 

► More

► None of the given

► Less

► Meaningless

 

Question No: 30    ( Marks: 1 )    – Please choose one

 Review is a type of _________ that helps preventing the bugs to move in the next stage of software development

 

► Bug seeding tool

► Filter

► Alarm

► None of the given

 

Question No: 31    ( Marks: 2 )

 Why software engineers collect measures?

To have the accurate requirments

To achive Goals more effectly and more effeciently

 

Question No: 32    ( Marks: 2 )

 Give two importances of reviews?

With Technical review you may come to know more about the technical requirments and specifications.

reviews the process description for compliance with the organizational policies, internal software standards, externally imposed standards, and other parts of the software project plan.

 

Question No: 33    ( Marks: 2 )

 Discuss the role of program restructuring in software reengineering?

 

In this case we modify source code and data in order to make it amenable to future changes. This includes code as well as data restructuring. Code restructuring requires redesign with same function with higher quality than original program and data restructuring involves restructuring the database or the database schema. It may also involve code restructuring.All will be insoftware reengineering/ Program is restructured after the reverse engineering phase.

 

 

Question No: 34    ( Marks: 2 )

 Give the properties of Capability Levels?

 

0  Incomplete

1  Performed

2  Managed

3  Defined

4  Quantitatively Managed

5  Optimizing

 

 

 

Question No: 35    ( Marks: 3 )

 What would this model depict?

Yes it will

   

Question No: 36    ( Marks: 3 )

 Give any six attribute of Requirements?

 

Software Quality Assurance

Quality Assurance

Cost of quality

SQA Activities

SQA Group Activities

Quality Control

 

Question No: 37    ( Marks: 3 )

 List the factors involved in calculating the cost of Reengineering?

Current annual maintenance cost for an application

Current annual operation cost for an application

Current annual business value of an application

Predicted annual maintenance cost after reengineering

Predicted annual operations cost after reengineering

Predicted annual business value cost after reengineering

Eestimated reengineering cost

Estimated reengineering calendar time

Reengineering risk factor

Expected life of the system

 

 

Question No: 38    ( Marks: 3 )

 How do you identify the problems in a software?

 


Question No: 39    ( Marks: 5 )

 Draw the Software Reengineering Process Model.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Question No: 40    ( Marks: 5 )

 Can you think it is difficult to implement CMM level in small software companies?

 

The CMM Level where basic project management processes are established to track cost, schedule, and functionality. That is, it is characterized by basic project management practices. It also implies that without project management not much can be achieved. In Small software house

 

–     Project size

As the project size increases, the complexity of the problem also increases and therefore its management also becomes more difficult.

 

–     Delivery deadline

Delivery deadline directly influences the resources and quality.

 

–     Budgets and costs

A good estimate of budget, cost and schedule is essential for any successful project.

 

–     Application domain

Application domain also plays an important role in the success of a project. The chances of success of a project in a well-known application domain would be much better than of a project in a relatively unknown domain.

 

So implementation of all the procedure for this Level can be a bit difficult for small software houses because they usually work on small projects where cost and time always metter.

 

VU CS605- Software EngineeringII FinalTerm Solved Unsolved Past Papers

VU CS605- Software EngineeringII FinalTerm solved unsolved past papers Spring 2011

VU CS605- Software EngineeringII FinalTerm Solved Unsolved Past Papers Spring 2011

 

 

CS 605 Software Engineering 2

Spring 2011 Final Term Subjective ( Solved)

1)  what is software refactoring

 

Software refactoring is the process of changing a software system such that the external behavior of

the system does not change while the internal structure of the system is improved. This is

sometimes called “Improving the design after it has been written”.

 

2)  what is software safety

 

Software Safety is a software SQA activity that focuses on identification of potential hazards that

may affect software negatively         and cause an entire system to fail. Modeling and analysis process is

conducted as part of software safety and hazards are identified and categorized by                criticality and

risk.

 

3)  Difference between DD& CD.

 

The difference between DD and                                                                                                  CD is that in Democratic Decentralized (DD) there                                                                                         is no permanent

leader and decisions are taken          with mutual consensus. While in Controlled Decentralized (CD) there

is a team leader who coordinates some specific tasks.

 

4)  uses of time boxing

 

Time-boxing is used in severe deadline pressure. It is a use incremental strategy where tasks

associated with each increment        are time-boxed in the following manner:

 

• Schedule for each task is adjusted by working backward from the delivery date.

 

• A box is put around each task

 

• When a task hits the boundary of the box, work stops and next task begins

The principle behind time-boxing is the 90-10 rule (similar to Pareto Principle) – rather than

becoming stuck on the 10% of a        task, the product proceeds towards the delivery date in 90% of the

case

 

5) Difference between check-in and check-out processes.

 

The difference between check in and check out is that when a change is needed in an object than it

is checked out on that time it is locked so that no other software engineer can lock  this object. After

the change has been done than                                                                                                    the object is again incorporated to the project this                                                                                                     process is called

checked in. at the same time the object is unlocked again.

1)  What should be included  in software tracking methods?

 

 

A schedule is meaningless if  it is not followed and tracked. Tasks and milestones defined

 

WWW.VUSTUDENTS.NING.COM
MC090409351@vu.edu.pk

 

 

 

CS 605 Software Engineering 2

Spring 2011 Final Term Subjective ( Solved)

in   a   project   schedule   must                          be   tracked   and   controlled   as   project   proceeds.   Tracking

methods include:

• Periodic project status meetings

• Evaluating the results of all reviews

• Determine whether project milestones have been accomplished by the scheduled date

• Comparing actual start date to planned start date

• Informal meetings with the practitioners

• Using earned value analysis

• Error tracking

 

 

2)  Hazards associated with the computer based cruise of an automobile

• Causes uncontrolled acceleration that cannot be stopped

• Does not respond to depression of brake pedal

• Does not engage when switch is activated

• Slowly loses or gains speed

3)  Waterfall’s major drawback is it may not fulfill client’s requirements. In   your opinion

which model handles this shortcoming?

In my point of view incremental model will fulfill its short comings. In the incremental

models, as opposed to the waterfall model, the product is partitioned into smaller pieces

which are then built and delivered to the client in increments at regular intervals. Since each

piece is much smaller than the whole, it can be built and sent to the client quickly. This

results in quick feedback from the client and any requirement related errors or changes can

be incorporated at a much lesser cost. It is therefore less traumatic as compared to the

waterfall model.

 

5) Working of check-in and check-out processes

 

 

 

 

 

 

 

WWW.VUSTUDENTS.NING.COM
MC090409351@vu.edu.pk

 

 

 

CS 605 Software Engineering 2

Spring 2011 Final Term Subjective ( Solved)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

In SCM, the processes of Check-in and Check-out take a central stage. These are two

important elements of change control and provide access and synchronization control. Access

control   manages   who   has   the   authority  to   check-out   the   object   and synchronization

control ensures that parallel changes by two different people do not overwrite one another.

Synchronization control implements a control on updates. When a copy is checked-out, other

copies can be checked out for use only but they cannot be modified. In essence, it

implements a single-writer multiple-readers protocol. This process is depicted in the

following diagram.

1)  Risks involve in migration of legacy systems.

 

 

 

Legacy system migration is    not an easy task and there are a number of risks involved that

need to be mitigated. First     of all, there is rarely a complete specification of the system

available.   Therefore, there is  no straight forward   way   of   specifying   the services provided

by a legacy system. Thus, important business rules are often embedded in      the software and

may not be documented elsewhere. Business processes and the way legacy    systems   operate

are   often   intertwined.   New        software   development   may   take several years.   New software

WWW.VUSTUDENTS.NING.COM
MC090409351@vu.edu.pk

 

 

 

CS 605 Software Engineering 2

Spring 2011 Final Term Subjective ( Solved)

development is itself risky as changes to one part of the system inevitably involve further

changes to other components. We therefore need to assess a legacy system   before a decision

for migration is made.

2) What problem can be caused by the following bad smells?

  • large classes
  • shotgun surgery

Large classes try to do too much and as a result of it they reduce cohesion.

Shotgun strategy requires so many small changes in various different classes

3) what is the advantage of having consistency in work product?

4)   How can we calculate notion of availability in statistical measurement?

5)   What does mean by the term “Software Reengineering”?

Software solutions often automate the business by implementing business rules and business

processes. In many cases, the  software makes the business processes. As these rules and

processes change, the software must also change. A time comes when these changes become

very difficult to handle. So reengineering is re-implementing legacy systems  to make them

more maintainable.

6)   How can quality of design is measured quantitatively?

Statistical SQA is a technique that measures the quality in a quantitative fashion. It implies

that information about defects is collected and categorized and an attempt is   made to trace

each defect to underlying cause. It uses Pareto Principle to identify vital causes

(80% of defects can be traced to 20% of causes) and moves to correct the problems that have

caused the defects.

7)   Subtasks have interdependencies based on their sequence; Give an example  of subtask

interdependencies?

The interdependency of each compartmentalized activity or task must be determined.

Some tasks must occur in sequence while others can occur in parallel. Some   activities cannot

commence until the work product produced by another is available.

8)   What is the guideline for organizations so that they will not depend on single individuals

for there growth?

9)   What is the difference between     code and design re-structuring?

Program is restructured after the reverse engineering phase. In this case we modify source

code and data in order to make it amenable to future changes. This includes code as well as

data restructuring. Code restructuring requires redesign with same function with higher

quality than original program  and data restructuring involves restructuring the database or the

database schema. It may also involve code restructuring.

10) Give some recommendation to      make a Walkthrough to be effective?

• Avoid drift

 

WWW.VUSTUDENTS.NING.COM
MC090409351@vu.edu.pk

 

 

 

CS 605 Software Engineering 2

Spring 2011 Final Term Subjective ( Solved)

• Limit debate and rebuttal

• Enunciate problem areas but don’t try to solve all problems

• Take written notes

• Limit the number of participants and insist upon advanced preparation

• Develop a checklist for each product that is likely to be reviewed

• Allocate resources and schedule time for FTRs

• Conduct meaningful training for all reviewers

• Review your early reviews

• Determine what approach works best for you

 

11) What would this model dep ict?

Defects           Detection

Errors Passed

Errors from                Through         Percentage

previous step         Amplified Errors   Efficiency    Errors passed

1:x              For error      To next step

Newly generated    detection

errors

 

Developme nt Step

 

 

 

This model depicts that each development step inherits certain errors from the previous step.

Some of these errors are just  passed through to the next step while some are worked on and

hence are amplified with a ratio of 1:x. In addition, each step may also generate some new

errors. If each step has some mechanism for error detection, some of these errors may be

detected and removed and the rest are passed on to the next step.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

VU CS605- Software EngineeringII FinalTerm Solved Unsolved Past Papers Spring 2011

VU CS605- Software EngineeringII FinalTerm solved unsolved past papers Spring 2006

VU CS605- Software EngineeringII FinalTerm Solved Unsolved Past Papers Spring 2006

 

ment risks, technical risks, design risks

 

CS605

Final Term Examination – Spring 2006

Time Allowed: 150 Minutes

 

 

 

Question No. 1                                                                                                                                                           Marks : 1

W ith respect to Software Refactoring, what is meant by “move method” and why it is

useful?

 

 

Question No. 2                                                                                                                                                                 Marks : 3

 

T hree categories of risks are

 

 

1.      business risks, personnel risks, budget risks

2.      project risks, technical risks, business risks

3.      planning risks, technical risks, personnel risks

4.      manage

 

Question No. 3                                                                                                                                                                 Marks : 3

Compute the SPI, Schedule variance and Percent complete for the situation given below.

Assume you are a software project Manager and that you have been asked to compute earned
value statistics for a small software project. The project has 56 planned work tasks that are
estimated to require 582 persons-days to complete. At the time that you have been asked to do
the earned v alue analysis. 5 tasks have been completed. However the project schedule indicates
th at 8 tasks should have been completed. The following schedule data (in person-days) are
available.

 

Task    Planned                                       effort    Actual                                     effort

1     12     12

2     15     11

3     13     17

4                                                              8                                                              9

5     10     9

6                                                              18                                                           —-

 

 

eork

pthduct i

 

 

 

 

7                                                             10                                                           —-

8                                                             4                                                             —-

(Hint: SPI = BCWP / BCWS
SV=BCWP – BCWS

P erson Complete = BCWP / BAC
BAC = ∑ (BCWS  k) for all tasks k

 

W hereBCWP = Budgeted Cost of Work Performed, BCWS = Budgeted Cost of Work

Scheduled, BAC = Budget at Completion)

 

 

 

Question No. 4                                                                                                                                                          Marks : 1

 

T he software reengineering process model includes restructuring activities for which of the following

it   ms?

 

 

1.     Code

2.     Documentation

3.     Data

4.     all of the given options

 

Question No. 5                                                                                                                                                           Marks : 1

One graphical technique for determining whether a process exhibits out-of-control change behavior

is a

1.     control chart

2.     fishbone diagram

3.     Pareto diagram

4.     process diagram

 

 

Question No. 6                                                                                                                 Marks : 1

What team structure for the following situation would you choose and

why?

You have been appointed a software project manager for a company that services the genetic

engineering world. Your job is to manage the development t of a new software product that

accelerate the pace of           gene typing. The work is R&D oriented, but the goal to produce a

w      in the next year.

 

 

Question No. 7                                                                                                                                                          Marks : 1

 

C  hange control is not necessary if a development group is making use of an automated project database

tool.

 

1.     T

2.     F

 

Question No. 8                                                                                                                                                          Marks : 1

T he linear sequential model of software development is also known as

the

 

 

l

etece.

allsoem.

software

sn

Unople.

sehind

 

 

 

 

 

 

 

1.      Classical life c       ycle model

2.      Fountain mode

3.      Spiral model

4.      Chaos model

 

Question No. 9                                                                                                                                                                 Marks : 1

 

W hat is the difference between SCM audit and a formal technical

review?

 

Question No. 10                                                                                                                                                        Marks : 3

 

Doubling the size of your software project team is guaranteed to cut project completion time in

half.

 

1.  T

2.  F

 

Question No. 11                                                                                                                                                         Marks : 3

W hat is the role of risk analysis in evolutionary process models like the spiral

model?

 

Question No. 12                                                                                                               Marks : 10

T henumber of people required for a software project is

determined

1.  after an estimate of the development effort is

2.   afterean estimate of the   velopment effort is

3.  drem an assessment of th             hnical complexity of the

4.        f the given options

 

 

Question No. 13                                                                                                                                                         Marks : 1

 

In terms of the Capability Maturity Model, what level would you describe the current situation as b                                                                                                                                                   eing?

Justify your answer.

The owner of the software games company: HotFusion Games has hired you to                 e their

comispany. 18 months ago, their game “Powers and Perils” became an international success, ince then their software development group has grown from 5 people to 50
fortunately, their sequel to the first game “Powers and Perils II” is now six months

chedule and the owner is quite bewildered at this. After examining the situation at                          on

GotFusi you realize that while the organization is equipped with some very capable

developers, they have never established any formal process in their software

development.

 

 

Question No. 14                                                                                                                                                         Marks : 1

 

 

4.  tel of the given options

the

sgftware

soff

eststraints.

 

 

 

 

 

 

Which of these benefits can be achieved when software is
restructured?

1.  higher quality           s

2.   reducedmaintenance    rt

3.       tware easier to

st

 

 

Question No. 15                                                                                                                                                        Marks : 1

 

T he first step in project planning is to

 

1.  determine the

2.   selecta.team organizational

3.   deoterm.    ine the project

4.       ablish the objectives and

scope.

Question No. 16                                                                                                                                                        Marks :      1

 

Using this table information and this phase index distribution, compute the overall error index for

organization. Assume PS= 100.

A n organization            a four step software engineering process in which the phase index of

stepeis    given below:   each

Step                                                                  Phase Index

1                                                                             2

2                                                                             4

3                                                                             3

4                                                                             5

 

(Hint: The Formula for       Error index is EI = ∑ (i * PI  i) / PS

Where:

i is the number of step

PI is the Phase index)

 

 

 

 

Question No. 17                                                                                                                                                        Marks : 1

T he goal of quality assurance is to provide management with the data needed to determine which

en   ineers are producing the most

defects.

 

1.  True

2.  False

 

VU CS605- Software EngineeringII FinalTerm Solved Unsolved Past Papers Spring 2006

ALL NEW RESULTS
Educational News

Updated Educational News

Categories
POSTS BY DATE
December 2016
M T W T F S S
« Sep    
 1234
567891011
12131415161718
19202122232425
262728293031