New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
software testing and quality assurance
Software Engineering A Practitioner's Approach Software Engineering A Practitioner's Approach 8th Edition Roger Pressman - Solutions
=+4. Will we develop a capability to provide video at a higher frames-per-second rate when high-
=+bandwidth connections are available?
=+9.1. Is it possible to begin coding immediately after a requirements modelhas been created?
=+Explain your answer and then argue the counterpoint.
=+9.2. An analysis rule of thumb is that the model "should focus on requirements that are
=+visible within the problem or business domain. "What types of requirements are not visible in these domains? Provide a few examples
=+9.3. What is the purpose of domain analysis? How is it related to the concept of require-ments patterns?
=+9.4. Is it possible to develop an effective analysis model without developing all four ele-ments shown in Figure 9.3? Explain.
=+9.5. The department of public works for a large city has decided to develop a Web-based pothole tracking and repair system (PHTRS). A description follows:Citizens can log onto a website and report the location and severity of potholes. As
=+potholes are reported they are logged within a "public works department repair system" and are assigned an identifying number, stored by street address, size (on a scale of 1 to 10), location (middle, curb, etc.), district (determined from street ad-
=+dress), and repair priority (determined from the size of the pothole). Work order data are associated with each pothole and include pothole location and size, repair crew identifying number, number of people on crew, equipment assigned, hours applied to repair, hole status (work in progress,
=+amount of filler material used, and cost of repair (computed from hours applied, number of people, material and equipment used). Finally, a damage file is created to hold information about reported damage due to the pothole and includes citizen's name, address, phone number, type ofdamage, and
=+Draw a UML use case diagram PHTRS system. You'llhave to make a number of assumptions about the manner in which a user interacts with this system.
=+9.6. Write two or three use cases that describe the roles of various actors in the PHTRS described in Problem 9.5.
=+9.7. Develop an activity diagram for one aspect of PHTRS.
=+9.8. Develop a swimlane diagram for one or more aspects of PHTRS.
=+10.1. You have been asked to build one of the following systems:
=+a. A network-based course registration system for your university.
=+b. A Web-based order-processing system for a computer store.
=+c. A simple invoicing system for a small business.
=+d. An Internet-based cookbook that is built into an electric range or microwave
=+Select the system that is ofinterest to you and develop a processing narrative. Then use the grammatical parsing technique to identify candidate objects and classes.
=+10.2. Develop a set of operations that are used within the classes identified in Problem 10.1.
=+10.3. Develop a class model for the PHTRS system present in Problem 9.5.
=+10.4. Write a template-based use case for the SafeHome home management system
=+described informally in the sidebar following Section 10.4.
=+10.5. Develop a complete set of CRC model index cards on the product or system you chose as part of Problem 10.1.
=+10.6. Conduct a review of the CRC index cards with your colleagues. How many additional classes, responsibilities, and collaborators were added as a consequence of the review?
=+10.7. What is an analysis package and how might it be used?
=+Q1:What output video resolution is provided by SafeHome cameras?
=+What occurs if an alarm condition is encountered while the cam-Q2:era is being monitored?
=+How does the system handle cameras that can be panned and Q3 zoomed?
=+What information should be provided along with the camera view?Q4:
=+(For example, location? time/date? last previous access?)
=+Should certain elements be easier to reach (require fewer navigation
=+steps) than others? What is the priority for presentation?
=+Should certain elements be emphasized to force users to navigate in their direction?
=+How should navigation errors be handled?
=+Should navigation to related groups of elements be given priority over navigation to a specific element?
=+Should navigation be accomplished via links, via search-based access, or by some other means?
=+Should certain elements be presented to users based on the context of previous navigation actions?
=+Should a navigation log be maintained for users?
=+Should a full navigation map or menu (as opposed to a single "back" link
=+or directed pointer) be available at every point in a user's interaction?
=+Should navigation design be driven by the most commonly expected
=+user behaviors or by the perceived importance of the defined WebApp elements?
=+Can a user "store" his previous navigation through the WebApp to expe-dite future usage?
=+For which user category should optimal navigation be designed?
=+How should links external to the WebApp be handled? Overlaying the
=+existing browser window? As a new browser window? As a separate frame?
=+11.1. There are two different types of "states" that behavioral models can represent. What are they?
=+11.2. How does a sequence diagram differ from a state diagram?
=+ How are they similar?
=+11.3. Suggest three requirements patterns for a modern mobile phone and write a brief description of each. Could these patterns be used for other devices? Provide an example.
=+11.4. Select one of the patterns you developed in Problem 11.3 and develop a reason-
=+ably complete pattern description similar in content and style to the one presented in Section 11.4.2.
=+11.5. How much analysis modeling do you think would be required for www.safehomeassured.com?
=+Would each of the model types described in Section 11.5.3 be required?
=+11.6. What is the purpose of the interaction model for a WebApp?
=+11.7. It could be argued that a WebApp functional model should be delayed until design.Present pros and cons for this argument.
=+11.8. What is the purpose of a configuration model?
=+11.9. How does the navigation model differ from the interaction model?
=+1. Examine the information domain Evaluate and select design patterns for a design model and design appropriate data
=+class or a subsystem.structures for data objects and their Review design classes and revise as required.attributes.
=+5. Design any interface required with external systems
=+2. Using the andysis model, select an architectural or devices.style (pattern) that is appropriate for the software.
=+6. Design the user interface:
=+3. Partition the analysis model into design subsystems Review results of task analysis.and allocate these subsystems within the architecture:
=+Specify action sequence based on user scenarios.Be certain that each subsystem is functionally
=+Create behavioral model of the interface.cohesive.
=+Define interface objects, control mechanisms.
=+Design subsystem interfaces.
=+Review the interface design and revise as
=+Allocate analysis classes or functions to each required.subsystem.7. Conduct component-level design.
=+4.Create a set of design classes or components:
=+Specify all algorithms at a relatively low level of Translate analysis class description into a design abstraction.class.
=+Refine the interface of each component.Check each design class against design criteria;
=+Define component-level data structures.consider inheritance issues.
=+Review each component and correct all errors
=+Define methods and messages associated with uncovered.each design class.8.
=+Develop a deployment model.
=+12.1. Do you design software when you "write" a program? What makes software design different from coding?
=+12.2. If' a software design is not a program (and it isn't), then what is it?
=+12.3. How do we assess the quality of a software design?
=+12.4. Examine the task set presented for design. Where is quality assessed within the task set?
=+How is this accomplished? How are the quality attributes discussed in Section 12.2.1 achieved?
=+12.5. Provide examples of three data abstractions and the procedural abstractions that can be used to manipulate them.
=+12.6. Describe software architecture in your own words.
=+12.7. Suggest a design pattern that you encounter in a category of everyday things (e.g .,
=+consumer electronics, automobiles, appliances). Briefly describe the pattern.
=+12.8. Describe separation of concerns in your own words. Is there a case when a "divide and conquer" strategy may not be appropriate? How might such a case affect the argument for modularity?
=+12.9. When should a modular design be implemented as monolithic software? How can this be accomplished?
=+ Is performance the only justification for implementation of monolithic software?
=+12.10. Discuss the relationship between the concept of information hiding as an attribute of
=+effective modularity and the concept of module independence.
=+12.11. How are the concepts of coupling and software portability related? Provide examples to support your discussion.
=+12.12. Apply a "stepwise refinement approach" to develop three different levels of proce-dural abstractions for one or more of the following programs: (1) Develop a check writer
=+that, given a numeric dollar amount, will print the amount in words normally required on a check. (2) Iteratively solve for the roots of a transcendental equation. (3) Develop a simple task-scheduling algorithm for an operating system.
=+12.13. Consider the software required to implement a full navigation capability (using GPS)in a mobile, handheld communication device. Describe two or three crosscutting concerns
=+that would be present. Discuss how you would represent one of these concerns as an aspect.
Showing 2400 - 2500
of 3990
First
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Last
Step by Step Answers