Sen Model Answer w23
Sen Model Answer w23
(Autonomous)
                                                  (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
                                                                                                    informa
                                                                                                    tion
                                                                                                    make
                                                                                                    Gantt
                                                                                                    charts
                                                                                                    an ideal
                                                                                                    choice
                                                                                                    for
                                                                                                    teams
                                                                                                     Page No: 1 | 27
                                                                                                    to use
                                MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                          (Autonomous)
                                                (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
      Ans    Risk is uncertain events associated with future events which have a probability of
             occurrence but it may or may not occur and if occurs it brings loss to the project.
1) Generic risk
OR
                                                                                                   Page No: 2 | 27
                              MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                       (Autonomous)
                                             (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
             1)     Schedule/Time -related/Delivery Related Planning risks
2) Budget/Financial risks
3) Operational/Procedural Risks
      Ans    Software quality control: It is a procedure that focuses on fulfilling the quality       1 M for each
             requested. QC aims to identify and fix defects. It is a method to verify the quality-     definition
             Validation. It always involves executing a program and hence it’s a Corrective
             technique.
             Software quality assurance: Quality assurance consists of the auditing and reporting
             functions of management. The goal of quality assurance is to provide management with
             the data necessary to be informed about product quality, thereby gaining insight and
             confidence that product quality is meeting its goals. It's a Preventive technique.
      Ans    Following are the phases of Software Quality Assurance:                                 Any 2 phases-
                                                                                                       each 1 M
             i. Prepares an SQA plan for a project.
             ii. Participates in the development of the project’s software process description.
             iii. Reviews software engineering activities to verify compliance with the defined
             software process.
             iv. Audits designated software work products to verify compliance with those defined
             as part of the software process.
             v. Ensures that deviations in software work and work products are documented and
             handled according to a documented procedure. vi. Records any noncompliance and
             reports to senior management.
                                                                                                 Page No: 3 | 27
                               MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                       (Autonomous)
                                             (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
      a)     Explain software engineering as layered technology approach.                                   4M
      Ans    Software engineering is a layered technology. The layers of software engineering as           Correct
             shown in the above diagram are: -                                                          Diagram -1 M,
                                                                                                        explanation -
                                                                                                             3M
              2. Process Layer: The foundation for software engineering is the process layer.
             Software Engineering process is the glue that holds the technology layers together and
             enables rational and timely development of computer software. Process defines a
             framework that must be established for effective delivery of software engineering
             technology. The software process forms the basis for management control of software
             projects and establishes the context in which technical methods are applied, works
             products (models, documents, data, reports, forms etc.) are produced, milestones are
             established, quantity is ensured, and change is properly managed.
                                                                                                    Page No: 4 | 27
                                 MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                        (Autonomous)
                                              (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
      Ans                                                                                                        Correct
                        Symbol                        Notation                            Use                 symbols with
                                                                                                              explanation -
              External entity                                                  External entities are            1 M each
                                                                               objects outside the
                                                                               system
             Circle: A circle (bubble) shows a process that transforms data inputs into data outputs.
             Data Flow: A curved line shows the flow of data into or out of a process or data store.
             Data Store: A set of parallel lines shows a place for the collection of data items. A data
             store indicates that the data is stored which can be used at a later stage or by the other
             processes in a different order. The data store can have an element or group of elements.
             Source or Sink: Source or Sink is an external entity and acts as a source of system
             inputs or sink of system outputs.
                                                                                                      Page No: 6 | 27
                               MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                        (Autonomous)
                                              (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
      d)     Explain four basic principles of software project scheduling.                                    4M
             3)Time allocation: Each task to be scheduled must be allocated some number of work
             units (e.g., person-days of effort). In addition, each task must be assigned a start date
             and a completion date that are a function of the interdependencies and whether work
             will be conducted on a full-time or part-time basis.
             4)Effort validation: Every project has a defined number of staff members. As time
             allocation occurs, the project manager must ensure that no more than the allocated
             number of people has been scheduled at any given time.
6)Defined outcomes: Every task that is scheduled should have a defined outcome.
             7)Defined milestones: Every task or group of tasks should be associated with a project
             milestone. Program evaluation and review technique (PERT) and critical path method
             (CPM) are two project scheduling Methods that can be applied to software
             development.
             8)Defined outcomes: Every task that is scheduled should have a defined outcome for
             software projects such as a work product or part of a work product – Work products are
             often combined in deliverables.
                                                                                                     Page No: 7 | 27
                                 MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                         (Autonomous)
                                               (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
    Ans                                                                                                      Any four points
                                                                                                             each point 1 M
            Sr      Parameter                     Perspective Process Model         Agile Process
            No                                                                      Model
                   Never become contentious in your words or actions (e.g., rolling your eyes or
                    shaking your head) as a person is talking.
                   Spend the time to understand the problem before you meet with others. If
                    necessary, perform some research to understand business domain.
                                                                                                           Page No: 8 | 27
                               MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                        (Autonomous)
                                              (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
                  Every communication meeting should have a leader (a facilitator)
                  For example, a participant may create a drawing /document that serves as a focus
                   for discussion.
                  Each small collaboration builds trust among team members and creates a
                   common goal for the team.
                  The more people involved in any communication, the more likely that discussion
                   will bounce from one topic to the next.
                  The facilitator should keep the conversation modular; leaving one topic only after
                   it has been resolved.
 A sketch or drawing can often provide clarity when words fail to do the job.
           Principle 9
                   (a) Once you agree to something, move on.
                   (b) If you can’t agree to something, move on.
                   (c) If a feature or function is unclear and cannot be clarified at the moment,
                   move on.
                                                                                                      Page No: 9 | 27
                               MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                       (Autonomous)
                                             (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
                              best way to achieve communication agility.
           Principle 10 Negotiation is not a contest or a game: It works best when both parties
           win.
                             There are many instances in which you and other stakeholders must
                              negotiate functions and features, priorities, and delivery dates.
           If the team has collaborated well, all parties have a common goal. Still, negotiation will
           demand compromise from all parties.
    Ans                                                                                                 Level 0 2M
                                                                                                        Level 1 2M
                                                                                                   Page No: 10 | 27
                               MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                        (Autonomous)
                                              (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
                                                                                                   Page No: 11 | 27
                                MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                        (Autonomous)
                                              (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
           4. count physical lines on input screen.
           Consider the following example for counting LOC:
           KCSI: thousands of changed source instructions.
           KSSI: thousands shipped source instructions.
           Second Release,
           KCSI = 20 KSSI = 50+ 20 (new and changed lines of code) -4 (assuming 20% are
           changed lines of code) = 66
           Defect/KCSI = 1.8 (assuming 10% improvement over the first release). Total number of
           additional defects = 1.8 x 20 = 36.
           Third Release,
           KCSI=30
           KSSI 66+30 (new and changed lines of code) -6 (assuming 20% of changed lines of
           code) = 90.
           Targeted number of additional defects (no more than previous release) = 36.
           Defect rate target for the new and changed lines of code: 36/30= 1.2
           defects/KCSI or lower.
 Communication
 Simplicity
 Feedback
 Courage
                  Respect
           Extreme Programming involves-
                  Writing unit tests before programming and keeping all of the tests running at all
                   times. The unit tests are automated and eliminate defects early, thus reducing the
                   costs.
                  Starting with a simple design just enough to code the features at hand and
                   redesigning when required.
                                                                                                   Page No: 13 | 27
                                MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                           (Autonomous)
                                               (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
                  Programming in pairs (called pair programming), with two programmers at one
                   screen, taking turns to use the keyboard. While one of them is at the keyboard,
                   the other constantly reviews and provides inputs.
                  Keeping the customer involved all the time and obtaining constant feedback.
                   Iterating facilitates the accommodating changes as the software evolves with the
                   changing requirements.
                      Costs incurred in changes: Extensive and ongoing testing makes sure the
                       changes do not break the existing functionality. A running working system
                       always ensures sufficient time for accommodating changes such that the
                       current operations are not affected.
                      Business changes: Changes are inevitable and are accommodated at any point
                       of time.
                                                                                                  Page No: 14 | 27
                                MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                         (Autonomous)
                                               (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
                      Code reviews are effective as the code is reviewed all the time.
                      Short iterations are effective as the planning game for release planning and
                       iteration planning.
    Ans    1 Core Principles of software engineering practice are:                                       List of all core
                                                                                                         principles- 4 M
           1.The Reason It All Exists
           A software system exists for one reason: to provide value to its users. All decisions
           should be made with this in mind.
           2.Keep it simple stupid.
           All design should be as simple as possible, but no simpler. This facilitates having a more
           easily understood and easily maintained system.
           3.Maintain the vision.
           A clear vision is essential to the success of a software project.
           4. What You Produce, Others Will Consume.
           Always specify, design, and implement by keeping in mind that someone else will have
           to understand what you are doing.
           5.Be open to the future.
           A system with a long lifetime has more value. Systems must be ready to adapt changes.
           6. Plan ahead for reuse.
           The reuse of code and designs has a major benefit of using object-oriented technologies.
           7. Think!
           Placing clear, complete thought before action almost always produces better results.
                                                                                                      Page No: 15 | 27
                                MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                         (Autonomous)
                                               (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
                The risk mitigation and monitoring start after the project is started and the
                 documentation of RMMM is completed.
                                                                                                         Page No: 16 | 27
                               MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                       (Autonomous)
                                             (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
               i)     Heuristic
               ii)    Empirical
               In the above expression, e is the characteristic of the software which has already been
               estimated (independent variable). Estimated Parameter is the dependent parameter to
               be estimated. The dependent parameters to be estimated could be effort, project
               duration, staff size, etc. c1 and d1 are constants. The values of the constants c1 and
                                                                                                     Page No: 17 | 27
                                MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                         (Autonomous)
                                               (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
               d1 are usually determined using data collected from past projects (historical data).
               The basic COCOMO model is an example of single variable cost estimation model.
               A multivariable cost estimation model takes the following form:
               Where e1, e2, … are the basic (independent) characteristics of the software already
               estimated, and c1, c2, d1, d2, … are constants.
           ii) Empirical
           Empirical estimation is a technique or model in which empirically derived formulae are
           used for predicting the data that are a required and essential part of the software project
           planning step.
           These techniques are usually based on the data that is collected previously from a project
           and based on some guesses, prior experience with the development of similar types of
           projects, and assumptions.
           It uses the size of the software to estimate the effort.
           In this technique, an educated guess of project parameters is made. Hence, these models
           are based on common sense. However, as there are many activities involved in empirical
           estimation techniques, this technique is formalized.
    e)     Explain GANTT chart and it's application for project tracking with an                             4M
           example.
     a)    Sketch use-case diagram for library management with minimum four use-                           6M
           cases and two actors.
                                                                                                   Page No: 19 | 27
                               MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                         (Autonomous)
                                             (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
    Ans                                                                                                          Use case
                                                                                                               diagram : 4
                                                                                                                Valid Use
                                                                                                               Cases – 4 M ,
                                                                                                              2 valid actors :
                                                                                                                2M=6M
b) Differentiate between white box and black box testing. (Any six point) 6M
    Ans                                                                                                         Differences
                                                                                                              between white
            Sr.    Black Box Testing                           White Box Testing                               box and black
            No.                                                                                               box testing any
                                                                                                              valid six points
              1    It is a way of software testing in          It is a way of testing the software in
                                                                                                                = 6 M, 1 M
                   which the internal structure or the         which the tester has knowledge about                 each
                   program or the code is hidden and           the internal structure or the code or the
                   nothing is known about it.                  program of the software.
                                                                                                           Page No: 20 | 27
                                MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                         (Autonomous)
                                               (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
              5    It can be referred to as outer or            It is the inner or the internal software
                   external software testing.                   testing.
           COCOMO II :
           COCOMO-II is the revised version of the original Cocomo (Constructive Cost Model)
           and is developed at University of Southern California. It is the model that allows one to
           estimate the cost, effort and schedule when planning a new software development
           activity.
           COCOMO II provides the following three-stage series of models for estimation of
           Application Generator, System Integration, and Infrastructure software projects:
           COCOMO II has three different models:
               1. The Application Composition Model
           • Supports prototyping projects and projects where there is extensive reuse.
                                                                                                    Page No: 22 | 27
                               MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                       (Autonomous)
                                             (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
           • Based on standard estimates of developer productivity in
           Application (object) points /month.
           • Takes CASE tool use into account
           Formula is
           – PM = ( NAP × (1 - %reuse/100 ) ) / PROD
           – PM is the effort in person‐months,
           NAP is the number of application points and
           PROD is the productivity
               2. Early design model
               • Estimates can be made after the requirements have been agreed.
               • Based on a standard formula for algorithmic models
               – PM = A × SizeB
               ×M
               where – M = PERS × RCPX × RUSE × PDIF × PREX × FCIL × SCED;
               – A = 2.94 in initial calibration,
               Size in KLOC, B varies from 1.1 to 1.24 depending on novelty of the project,
               development flexibility, risk management approaches and the process maturity.
     Ans   Diagram of translation of requirement model into design model                                labeled diagram
                                                                                                        of translation of
                                                                                                   Page No: 23 | 27
                               MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                       (Autonomous)
                                             (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
                                                                                                        requirement
                                                                                                         model into
                                                                                                       design model :
                                                                                                          3 M and
                                                                                                      explanation(any
                                                                                                         other valid
                                                                                                         description
                                                                                                       shall be given
                                                                                                       marks ) : 3 M ,
                                                                                                         total : 6 M
OR
           Each of the elements of the requirements model provides information that is necessary to
           create the four design models required for a complete specification of design.
           The flow of information during software design is illustrated in Figure above
            The requirements model, manifested by scenario-based, class-based, flow-oriented, and
           behavioral elements, feed the design task.
            Using design notation and design methods, design produces a data/class design, an
           architectural design, an interface design, and a component design. The data/class design
                                                                                                 Page No: 24 | 27
                               MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                        (Autonomous)
                                              (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
           transforms class models into design class realizations and the requisite data structures
           required to implement the software. The objects and relationships defined in the CRC
           diagram and the detailed data content depicted by class attributes and other notation
           provide the basis for the data design action.
           Part of class design may occur in conjunction with the design of software architecture.
           More detailed class design occurs as each software component is designed.
           The architectural design defines the relationship between major structural elements of the
           software, the architectural styles and design patterns that can be used to achieve the
           requirements defined for the system, and the constraints that affect the way in which
           architecture can be implemented. The architectural design representation—the
           framework of a computer-based system—is derived from the requirements model. The
           interface design describes how the software communicates with systems that interoperate
           with it, and with humans who use it. An interface implies a flow of information (e.g.,
           data and/or control) and a specific type of behavior. Therefore, usage scenarios and
           behavioral models provide much of the information required for interface design. The
           component-level design transforms structural elements of the software architecture into a
           procedural description of software components. Information obtained from the class-
           based models, flow models, and behavioral models serve as the basis for component
           design. During design you make decisions that will ultimately affect the success of
           software construction and, as important, the ease with which software can be maintained.
    Ans    SEI CMMI is a process improvement approach that provides organizations with the Description of
           essential elements of effective processes.                                             CMMI : 1 M;
           • CMMI can help you make decisions about your process improvement plans.              significance of
           CMM stands for Capability Maturity Model.                                             all levels : 5 M,
           • Focuses on elements of essential practices and processes from various bodies of         total 6 M
           knowledge.
           • Describes common sense, efficient, proven ways of doing business (which you should
           already be doing) - not a radical new approach.
           • CMM is a method to evaluate and measure the maturity of the software development
           process of an organization.
           • CMM measures the maturity of the software development process on a scale of 1 to 5.
i) Employee detail
                                                                                                    Page No: 26 | 27
                                 MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
                                                        (Autonomous)
                                              (ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
           i. Employee details
           a. Getting information about the customer
           b. Updation of employee details (department, change of address, emp_code etc.)
           c. Assignment of tasks, duties and responsibilities.
           d. Recording of employee attendance.
           iii. Performance
           a. Recording annual performance
           b. Details about parameters for performance appraisal
           c. Analysis performance and determining hike in payment.
Page No: 27 | 27