Page 1 Pittsburgh, PA 15213-3890 Final Review CS1530 Software Engineering.

Slides:



Advertisements
Similar presentations
Lecture # 2 : Process Models
Advertisements

Chapter 2 – Software Processes
Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
Software testing.
Building Enterprise Applications Using Visual Studio ®.NET Enterprise Architect.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Introduction To System Analysis and Design
Chapter 15 Design, Coding, and Testing. Copyright © 2005 Pearson Addison-Wesley. All rights reserved Design Document The next step in the Software.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 23 Slide 1 Software testing.
CSEM01 SE Evolution & Management Anne Comer Helen Edwards
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 23 Slide 1 Software testing 2.
Java Programming, 3e Concepts and Techniques Chapter 1 An Introduction to Java and Program Design.
Fundamentals of Information Systems, Second Edition
Architecture, Deployment Diagrams, Web Modeling Elizabeth Bigelow CS-15499C October 6, 2000.
CS 425/625 Software Engineering Software Testing
Nov. 14, 2007 Systems Engineering ä System ä A set or arrangement of things so related as to form a unity or organic whole. ä A set of facts, principles,
Chapter 5 Database Application Security Models
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
Introduction to Software Design Chapter 1. Chapter 1: Introduction to Software Design2 Chapter Objectives To become familiar with the software challenge.
UNIT-V The MVC architecture and Struts Framework.
Chapter 10 Architectural Design
Software Engineering Muhammad Fahad Khan
Chapter 6 System Engineering - Computer-based system - System engineering process - “Business process” engineering - Product engineering (Source: Pressman,
Implementation Yaodong Bi. Introduction to Implementation Purposes of Implementation – Plan the system integrations required in each iteration – Distribute.
Testing phases. Test data Inputs which have been devised to test the system Test cases Inputs to test the system and the predicted outputs from these.
Chapter 12: Software Testing Omar Meqdadi SE 273 Lecture 12 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
An Introduction to Software Architecture
Using JavaBeans and Custom Tags in JSP Lesson 3B / Slide 1 of 37 J2EE Web Components Pre-assessment Questions 1.The _____________ attribute of a JSP page.
CSC 480 Software Engineering Lecture 14 Oct 16, 2002.
CS 425/625 Software Engineering Legacy Systems
® IBM Software Group © 2007 IBM Corporation J2EE Web Component Introduction
Database Application Security Models Database Application Security Models 1.
Introduction To System Analysis and Design
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Software Testing Reference: Software Engineering, Ian Sommerville, 6 th edition, Chapter 20.
DEV337 Modeling Distributed Enterprise Applications Using UML in Visual Studio.NET David Keogh Program Manager Visual Studio Enterprise Tools.
Software Testing Yonsei University 2 nd Semester, 2014 Woo-Cheol Kim.
Systems Analysis and Design
Software Testing Reference: Software Engineering, Ian Sommerville, 6 th edition, Chapter 20.
Software Engineering Prof. Ing. Ivo Vondrak, CSc. Dept. of Computer Science Technical University of Ostrava
1 CMPT 275 High Level Design Phase Modularization.
Chapter 2 – Software Processes Lecture 1 Chapter 2 Software Processes1.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 JSP Application Models.
CS451 Lecture 10: Software Testing Yugi Lee STB #555 (816)
Theory and Practice of Software Testing Chapter 14 Presman Software Testing Tactics BLACK BOX TESTING.
Chapter 12: Software Testing Omar Meqdadi SE 273 Lecture 12 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
Software Development Process CS 360 Lecture 3. Software Process The software process is a structured set of activities required to develop a software.
IT323 - Software Engineering 2 1 Tutorial 4.  List the main benefits of software reuse 2.
Software Engineering Lecture 10: System Engineering.
CMSC 2021 Software Development. CMSC 2022 Software Development Life Cycle Five phases: –Analysis –Design –Implementation –Testing –Maintenance.
1 IBM Software Group ® Mastering Object-Oriented Analysis and Design with UML 2.0 Module 4: Analysis and Design Overview.
1 Architectural Blueprints—The “4+1” View Model of Software Architecture (
Software Testing Reference: Software Engineering, Ian Sommerville, 6 th edition, Chapter 20.
RUP RATIONAL UNIFIED PROCESS Behnam Akbari 06 Oct
1 Chapter 2 SW Process Models. 2 Objectives  Understand various process models  Understand the pros and cons of each model  Evaluate the applicability.
Defect testing Testing programs to establish the presence of system defects.
J2EE Platform Overview (Application Architecture)
Building Enterprise Applications Using Visual Studio®
Principles of Information Systems Eighth Edition
CS 325: Software Engineering
N-Tier Architecture.
Rational Unified Process
Static Testing Static testing refers to testing that takes place without Execution - examining and reviewing it. Dynamic Testing Dynamic testing is what.
Software testing.
Design and Implementation
An Introduction to Software Architecture
CS310 Software Engineering Lecturer Dr.Doaa Sami
UML Design for an Automated Registration System
Presentation transcript:

page 1 Pittsburgh, PA Final Review CS1530 Software Engineering

© 2002 by Carnegie Mellon University page 2 Question 1 Software engineering is not concerned with: a)cost-effective software development b)all aspects of software production c)all aspects of computer-based systems development including hardware, software and process engineering. d)practicalities of developing and delivering useful software e)none of the above

© 2002 by Carnegie Mellon University page 3 Question 1 Software engineering is not concerned with: a)cost-effective software development b)all aspects of software production c)all aspects of computer-based systems development including hardware, software and process engineering. d)practicalities of developing and delivering useful software e)none of the above

© 2002 by Carnegie Mellon University page 4 Question 2 Which of the following is not an essential product attribute? a)support b)maintainability c)dependability d)efficiency e)usability

© 2002 by Carnegie Mellon University page 5 Question 2 Which of the following is not an essential product attribute? a)support b)maintainability c)dependability d)efficiency e)usability

© 2002 by Carnegie Mellon University page 6 Question 3 Which of the following is not a process perspective? a)Workflow b)Waterfall c)Data-flow d)Role/action e)They all are

© 2002 by Carnegie Mellon University page 7 Question 3 Which of the following is not a process perspective? a)Workflow b)Waterfall c)Data-flow d)Role/action e)They all are

© 2002 by Carnegie Mellon University page 8 Question 4 Which of the following is not a benefit of risk/misfit evaluation? a)exposes pros and cons of “jumping on the bandwagon” b)requires justification of use of features in terms of the risk of not using them c)determines how best to integrate components d)exposes design decisions that are buried as implementation decisions e)they all are

© 2002 by Carnegie Mellon University page 9 Question 4 Which of the following is not a benefit of risk/misfit evaluation? a)exposes pros and cons of “jumping on the bandwagon” b)requires justification of use of features in terms of the risk of not using them c)determines how best to integrate components d)exposes design decisions that are buried as implementation decisions e)they all are

© 2002 by Carnegie Mellon University page 10 Question 5 JavaBeans are a)Stateless enterprise session beans b)EJBs that can interface with one or more Java clients c)Java classes that can be reused and composed together into applications. d)Entity beans e)Message beans

© 2002 by Carnegie Mellon University page 11 Question 5 JavaBeans are a)Stateless enterprise session beans b)EJBs that can interface with one or more Java clients c)Java classes that can be reused and composed together into applications. d)Entity beans e)Message beans

© 2002 by Carnegie Mellon University page 12 Question 6 5. Which of the following is not a valid reason for using Enterprise JavaBeans? a)The application must be scalable. b)The application must have high performance c)Transactions are required to ensure data integrity. d)The application will have a variety of clients e)They are all valid reasons

© 2002 by Carnegie Mellon University page 13 Question 6 5. Which of the following is not a valid reason for using Enterprise JavaBeans? a)The application must be scalable. b)The application must have high performance c)Transactions are required to ensure data integrity. d)The application will have a variety of clients e)They are all valid reasons

© 2002 by Carnegie Mellon University page 14 Question 7 The cost of developing a reusable component requires that the component be reused at least how many times to cover the additional cost? a) once b) twice c) 2.5x d) 10x e) 12.5x

© 2002 by Carnegie Mellon University page 15 Question 7 The cost of developing a reusable component requires that the component be reused at least how many times to cover the additional cost? a) once b) twice c) 2.5x d) 10x e) 12.5x

© 2002 by Carnegie Mellon University page 16 Question 8 Which of the following is not a valid principle for the use of color in a user interface? a)Don't use too many colors b)Use colors to identify errors and warnings c)Allow users to control color coding d)Design for monochrome then add color e)Use color coding consistently

© 2002 by Carnegie Mellon University page 17 Question 8 Which of the following is not a valid principle for the use of color in a user interface? a)Don't use too many colors b)Use colors to identify errors and warnings c)Allow users to control color coding d)Design for monochrome then add color e)Use color coding consistently

© 2002 by Carnegie Mellon University page 18 Question 9 High-quality, high business value legacy systems should be: a)scrapped b)re-engineered or replaced if a suitable system is available c)Replaced with COTS, scrapped completely or maintained d)Continue in operation using normal system maintenance e)None of the above

© 2002 by Carnegie Mellon University page 19 Question 9 High-quality, high business value legacy systems should be: a)scrapped b)re-engineered or replaced if a suitable system is available c)Replaced with COTS, scrapped completely or maintained d)Continue in operation using normal system maintenance e)None of the above

© 2002 by Carnegie Mellon University page 20 Question 10 Database schemas can be best modeled using: a)Data-flow diagrams b)Collaboration diagrams c)Entity-relation diagrams d)Deployment diagrams e)None of the above

© 2002 by Carnegie Mellon University page 21 Question 10 Database schemas can be best modeled using: a)Data-flow diagrams b)Collaboration diagrams c)Entity-relation diagrams d)Deployment diagrams e)None of the above

© 2002 by Carnegie Mellon University page 22 Question 11 The following UML diagram is a:

© 2002 by Carnegie Mellon University page 23 Question 11 The following UML diagram is a: sequence diagram

© 2002 by Carnegie Mellon University page 24 Question 12 A programmatic style of persistence logic implemented directly inside the enterprise bean class is called:

© 2002 by Carnegie Mellon University page 25 Question 12 A programmatic style of persistence logic implemented directly inside the enterprise bean class is called: bean managed persistence

© 2002 by Carnegie Mellon University page 26 Question 13 Top-down subroutine control model where control starts at the top of a subroutine hierarchy and moves downwards is called:

© 2002 by Carnegie Mellon University page 27 Question 13 Top-down subroutine control model where control starts at the top of a subroutine hierarchy and moves downwards is called: call-return model

© 2002 by Carnegie Mellon University page 28 Question 14 Context models are used to illustrate system:

© 2002 by Carnegie Mellon University page 29 Question 14 Context models are used to illustrate system: boundaries.

© 2002 by Carnegie Mellon University page 30 Question 15 A text-based document that contains static template data, and elements that are used to create dynamic content is a:

© 2002 by Carnegie Mellon University page 31 Question 15 A text-based document that contains static template data, and elements that are used to create dynamic content is a: Java Server Page

© 2002 by Carnegie Mellon University page 32 Question 16 Enhancements to an existing system are normally requested using a:

© 2002 by Carnegie Mellon University page 33 Question 16 Enhancements to an existing system are normally requested using a: change request form.

© 2002 by Carnegie Mellon University page 34 Question 17 The process that checks that we are building the right product is called:

© 2002 by Carnegie Mellon University page 35 Question 17 The process that checks that we are building the right product is called: validation

© 2002 by Carnegie Mellon University page 36 Question 18 J2EE applications are made up of components that can be deployed into different:

© 2002 by Carnegie Mellon University page 37 Question 18 J2EE applications are made up of components that can be deployed into different: containers

© 2002 by Carnegie Mellon University page 38 Question 19 Security roles are defined in an Enterprise JavaBeans:

© 2002 by Carnegie Mellon University page 39 Question 19 Security roles are defined in an Enterprise JavaBeans: deployment descriptor

© 2002 by Carnegie Mellon University page 40 Question 20 The systematic transformation of an existing system into a new form to realize quality improvements in operation, system capability, functionality, performance, or evolvability at a lower cost, schedule, or risk to the customer is called:

© 2002 by Carnegie Mellon University page 41 Question 20 The systematic transformation of an existing system into a new form to realize quality improvements in operation, system capability, functionality, performance, or evolvability at a lower cost, schedule, or risk to the customer is called: reengineering

© 2002 by Carnegie Mellon University page 42 Question 21 Rank the three ensembles using the following data

© 2002 by Carnegie Mellon University page 43 Feature$ Value for Risk Max Risk Residual Risk Cost  $/  RR $ Per Risk  (r, c) F1$35,00056R1: 22 R2: 17 R3: 12 R4: 56 $10,000 23,000 4,000 0 F2$40,00035R1: 23 R2: 12 R3: 6 R4: 35 3,000 12,000 18,000 0 F3$90,00087R1: 34 R2: 12 R3: 43 R4: 87 52,000 78,000 56,000 0

© 2002 by Carnegie Mellon University page 44 Feature$ Value for Risk Max Risk Residual Risk Cost  $/  RR $ Per Risk  (r, c) F1$35,00047R1: 32 R2: 24 R3: 15 R4: 47 $10,000 23,000 4,000 0 F2$40,00064R1: 31 R2: 42 R3: 6 R4: 64 3,000 12,000 18,000 0 F3$90,00075R1: 32 R2: 31 R3: 15 R4: 75 52,000 78,000 56,000 0

© 2002 by Carnegie Mellon University page 45 Feature$ Value for Risk Max Risk Residual Risk Cost  $/  RR $ Per Risk  (r, c) F1$35,00087R1: 32 R2: 42 R3: 80 R4: 87 $10,000 23,000 4,000 0 F2$40,00024R1: 23 R2: 5 R3: 6 R4: 24 3,000 12,000 18,000 0 F3$90,00034R1: 17 R2: 12 R3: 21 R4: 34 52,000 78,000 56,000 0

© 2002 by Carnegie Mellon University page 46 Rankings 1.Ensemble 2.Ensemble 3.Ensemble

© 2002 by Carnegie Mellon University page 47 Question 22 Define input sequences based on the following input partitions to test the specified procedure. Show the input sequence, key, and output for each partition (5 points) Specification: procedure Search (Key : ELEM ; T: ELEM_ARRAY; Found : in out BOOLEAN; L: in out ELEM_INDEX) ; Pre-condition -- the array has at least one element T’FIRST <= T’LAST Post-condition -- the element is found and is referenced by L ( Found and T (L) = Key) or -- the element is not in the array ( not Found and not (exists i, T’FIRST >= i <= T’LAST, T (i) = Key ))

© 2002 by Carnegie Mellon University page 48 Input Sequences Array Element Single value In sequence Not in sequence Multiple values First element in sequence Last element in sequence Middle of sequence Not in sequence

© 2002 by Carnegie Mellon University page 49 Question 22 Answer Input sequence (T)Key (Key)Output (Found, L) 17 17, 29, 21, 23 41, 18, 9, 31, 30 16, 45 17, 18, 21, 23, 29, 41, 38 21, 23, 29, 33, True, 1 False, ?? True, 1 True, 7 True, 4 False, ??

© 2002 by Carnegie Mellon University page 50 Question 23 Describe the differences between measures, preferences, criteria and preference structure in multi-criteria selection.

© 2002 by Carnegie Mellon University page 51 Question 23 Describe the differences between measures, preferences, criteria and preference structure in multi-criteria selection. Measures are numbers objectively assigned to an attribute. Preferences are subjectively assigned to measured attributes. An attribute that has been assigned a preference is a criterion. The set of criteria defines the preference structure for the evaluation.

© 2002 by Carnegie Mellon University page 52 Question Write out the exact HTML generated by the JSP page: <% message.setString("TitleBookDescription", "Book Title"); message.setString("By", "By"); messages.getString("Price", "Cost";) messages.getString("Critics", "Critics"); book.setTitle("Building Systems from Commercial Components"); book.setFirstName("Kurt"); book.setSurname("Wallnau"); book.setPrice("54.95"); book.setYear("2001"); book.getDescription(“CBS development"); %>

© 2002 by Carnegie Mellon University page 53 Question 24 ( ) "/>