New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
software testing and quality assurance
Software Engineering A Practitioner's Approach Software Engineering A Practitioner's Approach 8th Edition Roger Pressman - Solutions
=+34.4. "Communication overhead" can occur when multiple people work on a software proj-ect. The time spent communicating with others reduces individual productively (LOC/month), and the result can be less productivity for the team. Illustrate (quantitatively) how
=+34.10. If an automated scheduling tool is available, determine the critical path for the net-work defined in problem 34.9.
=+34.11. Using a scheduling tool (if available) or paper and pencil (if necessary), develop a time-line chart for the OLCRS project.
=+7. Does the software engineering team have the right mix of skills?
=+6. Is the project scope stable?
=+5. Do end users have realistic expectations?
=+4. Have customers been involved fully in the definition of requirements?
=+3. Are requirements fully understood by the software engineering team and its customers?
=+2. Are end users enthusiastically committed to the project and the system/product to be built?
=+1. Have top software and customer managers formally committed to support the project?
=+34.12. Assume you are a software project manager and that you've been asked to compute earned value statistics for a small software project. The project has 56 planned work tasks that are estimated to require 582 person-days to complete. At the time that you've been asked to do the earned value
=+34.3. Is there ever a case where a software project milestone is not tied to a review? If so, provide one or more examples.
=+34.2. What is the difference between a macroscopic schedule and a detailed schedule? Is it possible to manage a project if only a macroscopic schedule is developed? Why?
=+34.1. "Unreasonable" deadlines are a fact of life in the software business. How should you proceed if you're faced with one?
=+35.12. Recompute the risk exposure discussed in Section 35.42 when cost/LOC is $16 and the probability is 60 percent.
=+33.1. Assume that you are the project manager for a company that builds software for household robots. You have been contracted to build the software for a robot that mows the
=+32.4. Grady suggests an etiquette for software metrics. Can you add three more rules to those noted in Section 32.1.1?
=+were traceable to errors that were not discovered in the modeling phase. What is the DRE for these two phases?
=+32.12. At the conclusion of a project, it has been determined that 30 errors were found during the modeling phase and 12 errors were found during the construction phase that
=+32.11. A WebApp and its support environment have not been fully fortified against attack.Web engineers estimate that the likelihood of repelling an attack is only 30 percent. The system does not contain sensitive or controversial information, so the threat probability is 25 percent. What is the
=+32.10. A Web engineering team has built an e-commerce WebApp that contains 145 individ-ual pages. Of these pages, 65 are dynamic; that is, they are internally generated based on end-user input. What is the customization index for this application?
=+. Is the objective of the activity clearly defined?
=+lawn for a homeowner. Write a statement of scope that describes the software. Be sure your statement of scope is bounded. If you're unfamiliar with robots, do a bit of research before you begin writing. Also, state your assumptions about the hardware that will be required.Alternate: Replace the
=+33.2. Software project complexity is discussed briefly in Section 33.1. Develop a list of soft-ware characteristics (e.g ., concurrent operation, graphical output) that affect the complex-ity of a project. Prioritize the list.
=+33.3. Performance is an important consideration during planning. Discuss how perfor-mance can be interpreted differently depending upon the software application area.
=+Why do you think this is done? Are there circumstances when it should not be done?
=+33.8. It seems odd that cost and schedule estimates are developed during software project planning-before detailed software requirements analysis or design has been conducted.
=+33.7. For a project team: Develop a software tool that implements each of the estimation techniques developed in this chapter.
=+33.6. Develop a spreadsheet model that implements one or more of the estimation tech-niques described in this chapter. Alternatively, acquire one or more online models for esti-mation from Web-based sources.
=+33.5. Use the software equation to estimate the lawn-mowing robot software. Assume that Equation (33.4) is applicable and that P = 8,000.
=+450 LOC/pm with a burdened labor rate of $7,000 per person-month, estimate the effort and cost required to build the software using the LOC-based estimation technique described in this chapter.
=+33.4. Do a functional decomposition of the robot software you described in Problem 33.1.Estimate the size of each function in LOC. Assuming that your organization produces
=+· Are work products required as input and produced as output identified and described?
=+24.1. In your own words, describe why the class is the smallest reasonable unit for testing within an OO system.
=+24.2. Why do we have to retest subclasses that are instantiated from an existing class, if the
=+existing class has already been thoroughly tested? Can we use the test-case design for the existing class?
=+24.3. Why should "testing" begin with object-oriented analysis and design?
=+24.4. Derive a set of CRC index cards for SafeHome, and conduct the steps noted in Sec-tion 24.2.2 to determine if inconsistencies exist.
=+24.5. What is the difference between thread-based and use-based strategies for integration testing?
=+ How does cluster testing fit in?
=+24.6. Apply random testing and partitioning to three classes defined in the design for the SafeHome system. Produce test cases that indicate the operation sequences that will be invoked.
=+24.7. Apply multiple class testing and tests derived from the behavioral model for the Safe-Home design.
=+24.8. Derive four additional tests using random testing and partitioning methods as well as
=+multiple class testing and tests derived from the behavioral model for the banking applica-tion presented in Sections 24.5 and 24.6.
=+· Is the information factually accurate?
=+Is the information concise and to the point?
=+Is the layout of the content object easy for the user to understand?
=+Can information embedded within a content object be found easily?
=+Have proper references been provided for all information derived from other sources?
=+Is the information presented consistent internally and consistent with
=+information presented in other content objects?
=+Is the content offensive, misleading, or does it open the door to litigation?
=+Does the content infringe on existing copyrights or trademarks?
=+. Does the content contain internal links that supplement existing content?Are the links correct?
=+Does the aesthetic style of the content conflict with the aesthetic style of the interface?
Describe The Impact of Commercial Components
Explain the Software Architecture in Education
Identify Ending Evaluation Criteria
2: A great deal of attention has been given to separating the user interface from the remainder of the application both in Luther and in our other case studies. Why is this such a pervasive tactic?
=+If the NSU can be achieved using more than one navigation path, has every relevant path been tested?
1: Many of the case studies in this book feature architectures that separate the producers of data within a system from the consumers of data. Why is that important? What kind of tactic is it? Compile a list of the tactics or design approaches used to achieve separation, beginning with the ones
3: Consider the CelsiusTech case study presented in Chapter 15. Would J2EE/EJB be a good infrastructure choice for implementing this system? Justify your answer.
2: The J2EE/EJB specification uses many techniques that are actually just implementations of the "use an intermediary"tactic. Find as many distinct realizations of these instances as you can.
1: An addition to the EJB component model version 2.0 is "message-driven beans." These are enterprise beans that allow J2EE applications to process messages asynchronously. What are some of the uses of such a component? What sort of new enterprise architecture possibilities do message-driven beans
2: CelsiusTech changed management structures several times during its development of the SS2000. Consider the implications of these changes, given our recommendation in Chapter 7 that product structure should mirror project structure.
1: Could the CelsiusTech architecture have been used for the air traffic control system ofC hapter 6? Could CelsiusTech have used that architecture? What are the essential differences?
What Makes Software Product Lines Difficult?
1: Suppose a company builds two similar systems using a large set of common assets, including an architecture. Clearly these two systems form a product line. If they shared only an architecture but no elements, would they still be a product line? Suppose they shared only a single element. Suppose
=+If guidance is provided by the user interface to assist in navigation, are directions correct and understandable as navigation proceeds?
=+Is there a mechanism (other than the browser "back" arrow) for returning to
=+the preceding navigation node and to the beginning of the navigation path?
=+Do mechanisms for navigation within a large navigation node (i.e ., a long Web page) work properly?
=+If a function is to be executed at a node and the user chooses not to
=+provide input, can the remainder of the NSU be completed?
=+If a function is executed at a node and an error in function processing occurs, can the NSU be completed?
=+Is there a way to discontinue the navigation before all nodes have been reached, but then return to where the navigation was discontinued and proceed from there?
=+Is every node reachable from the site map? Are node names meaningful to end users?
=+If a node within an NSU is reached from some external source, is it pos-sible to process to the next node on the navigation path?
=+ Is it possible to return to the previous node on the navigation path?
=+Does the user understand his location within the content architecture as the NSU is executed?
=+Is the WebApp fully compatible with the server OS?
=+· Are system files, directories, and related system data created correctly when the WebApp is operational?
=+Do system security measures (e.g ., firewalls or encryption) allow the WebApp to execute and service users without interference or perfor-mance degradation?
=+Has the WebApp been tested with the distributed server configuration12(if one exists) that has been chosen?
=+Is the WebApp properly integrated with database software?
=+ Is the WebApp sensitive to different versions of database software?
=+Do server-side WebApp scripts execute properly?
=+Have system administrator errors been examined for their effect on WebApp operations?
=+· If proxy servers are used, have differences in their configuration been addressed with on-site testing?
=+Does the server response time degrade to a point where it is noticeable and unacceptable?
=+At what point (in terms of users, transactions, or data loading) does performance become unacceptable?
=+What system components are responsible for performance degradation?
=+What is the average response time for users under a variety of loading conditions?
=+Does performance degradation have an impact on system security?
=+Is WebApp reliability or accuracy affected as the load on the system grows?
=+What happens when loads that are greater than maximum server capacity are applied?
=+Does performance degradation have an impact on company revenues?
=+. Does the system degrade "gently," or does the server shut down as capac-ity is exceeded?
=+Does server software generate "server not available" messages? More generally, are users aware that they cannot reach the server?
=+Does the server queue resource requests and empty the queue once ca-pacity demands diminish?
Showing 1000 - 1100
of 3990
First
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Last
Step by Step Answers