Presentation is loading. Please wait.

Presentation is loading. Please wait.

Page 1 Pittsburgh, PA 15213-3890 Final Review CS1530 Software Engineering.

Similar presentations


Presentation on theme: "Page 1 Pittsburgh, PA 15213-3890 Final Review CS1530 Software Engineering."— Presentation transcript:

1 page 1 Pittsburgh, PA 15213-3890 Final Review CS1530 Software Engineering

2 © 2002 by Carnegie Mellon University page 2 Question 1 Software engineering is not concerned with: a)cost-effective software development b)all aspects of software production c)all aspects of computer-based systems development including hardware, software and process engineering. d)practicalities of developing and delivering useful software e)none of the above

3 © 2002 by Carnegie Mellon University page 3 Question 1 Software engineering is not concerned with: a)cost-effective software development b)all aspects of software production c)all aspects of computer-based systems development including hardware, software and process engineering. d)practicalities of developing and delivering useful software e)none of the above

4 © 2002 by Carnegie Mellon University page 4 Question 2 Which of the following is not an essential product attribute? a)support b)maintainability c)dependability d)efficiency e)usability

5 © 2002 by Carnegie Mellon University page 5 Question 2 Which of the following is not an essential product attribute? a)support b)maintainability c)dependability d)efficiency e)usability

6 © 2002 by Carnegie Mellon University page 6 Question 3 Which of the following is not a process perspective? a)Workflow b)Waterfall c)Data-flow d)Role/action e)They all are

7 © 2002 by Carnegie Mellon University page 7 Question 3 Which of the following is not a process perspective? a)Workflow b)Waterfall c)Data-flow d)Role/action e)They all are

8 © 2002 by Carnegie Mellon University page 8 Question 4 Which of the following is not a benefit of risk/misfit evaluation? a)exposes pros and cons of “jumping on the bandwagon” b)requires justification of use of features in terms of the risk of not using them c)determines how best to integrate components d)exposes design decisions that are buried as implementation decisions e)they all are

9 © 2002 by Carnegie Mellon University page 9 Question 4 Which of the following is not a benefit of risk/misfit evaluation? a)exposes pros and cons of “jumping on the bandwagon” b)requires justification of use of features in terms of the risk of not using them c)determines how best to integrate components d)exposes design decisions that are buried as implementation decisions e)they all are

10 © 2002 by Carnegie Mellon University page 10 Question 5 JavaBeans are a)Stateless enterprise session beans b)EJBs that can interface with one or more Java clients c)Java classes that can be reused and composed together into applications. d)Entity beans e)Message beans

11 © 2002 by Carnegie Mellon University page 11 Question 5 JavaBeans are a)Stateless enterprise session beans b)EJBs that can interface with one or more Java clients c)Java classes that can be reused and composed together into applications. d)Entity beans e)Message beans

12 © 2002 by Carnegie Mellon University page 12 Question 6 5. Which of the following is not a valid reason for using Enterprise JavaBeans? a)The application must be scalable. b)The application must have high performance c)Transactions are required to ensure data integrity. d)The application will have a variety of clients e)They are all valid reasons

13 © 2002 by Carnegie Mellon University page 13 Question 6 5. Which of the following is not a valid reason for using Enterprise JavaBeans? a)The application must be scalable. b)The application must have high performance c)Transactions are required to ensure data integrity. d)The application will have a variety of clients e)They are all valid reasons

14 © 2002 by Carnegie Mellon University page 14 Question 7 The cost of developing a reusable component requires that the component be reused at least how many times to cover the additional cost? a) once b) twice c) 2.5x d) 10x e) 12.5x

15 © 2002 by Carnegie Mellon University page 15 Question 7 The cost of developing a reusable component requires that the component be reused at least how many times to cover the additional cost? a) once b) twice c) 2.5x d) 10x e) 12.5x

16 © 2002 by Carnegie Mellon University page 16 Question 8 Which of the following is not a valid principle for the use of color in a user interface? a)Don't use too many colors b)Use colors to identify errors and warnings c)Allow users to control color coding d)Design for monochrome then add color e)Use color coding consistently

17 © 2002 by Carnegie Mellon University page 17 Question 8 Which of the following is not a valid principle for the use of color in a user interface? a)Don't use too many colors b)Use colors to identify errors and warnings c)Allow users to control color coding d)Design for monochrome then add color e)Use color coding consistently

18 © 2002 by Carnegie Mellon University page 18 Question 9 High-quality, high business value legacy systems should be: a)scrapped b)re-engineered or replaced if a suitable system is available c)Replaced with COTS, scrapped completely or maintained d)Continue in operation using normal system maintenance e)None of the above

19 © 2002 by Carnegie Mellon University page 19 Question 9 High-quality, high business value legacy systems should be: a)scrapped b)re-engineered or replaced if a suitable system is available c)Replaced with COTS, scrapped completely or maintained d)Continue in operation using normal system maintenance e)None of the above

20 © 2002 by Carnegie Mellon University page 20 Question 10 Database schemas can be best modeled using: a)Data-flow diagrams b)Collaboration diagrams c)Entity-relation diagrams d)Deployment diagrams e)None of the above

21 © 2002 by Carnegie Mellon University page 21 Question 10 Database schemas can be best modeled using: a)Data-flow diagrams b)Collaboration diagrams c)Entity-relation diagrams d)Deployment diagrams e)None of the above

22 © 2002 by Carnegie Mellon University page 22 Question 11 The following UML diagram is a:

23 © 2002 by Carnegie Mellon University page 23 Question 11 The following UML diagram is a: sequence diagram

24 © 2002 by Carnegie Mellon University page 24 Question 12 A programmatic style of persistence logic implemented directly inside the enterprise bean class is called:

25 © 2002 by Carnegie Mellon University page 25 Question 12 A programmatic style of persistence logic implemented directly inside the enterprise bean class is called: bean managed persistence

26 © 2002 by Carnegie Mellon University page 26 Question 13 Top-down subroutine control model where control starts at the top of a subroutine hierarchy and moves downwards is called:

27 © 2002 by Carnegie Mellon University page 27 Question 13 Top-down subroutine control model where control starts at the top of a subroutine hierarchy and moves downwards is called: call-return model

28 © 2002 by Carnegie Mellon University page 28 Question 14 Context models are used to illustrate system:

29 © 2002 by Carnegie Mellon University page 29 Question 14 Context models are used to illustrate system: boundaries.

30 © 2002 by Carnegie Mellon University page 30 Question 15 A text-based document that contains static template data, and elements that are used to create dynamic content is a:

31 © 2002 by Carnegie Mellon University page 31 Question 15 A text-based document that contains static template data, and elements that are used to create dynamic content is a: Java Server Page

32 © 2002 by Carnegie Mellon University page 32 Question 16 Enhancements to an existing system are normally requested using a:

33 © 2002 by Carnegie Mellon University page 33 Question 16 Enhancements to an existing system are normally requested using a: change request form.

34 © 2002 by Carnegie Mellon University page 34 Question 17 The process that checks that we are building the right product is called:

35 © 2002 by Carnegie Mellon University page 35 Question 17 The process that checks that we are building the right product is called: validation

36 © 2002 by Carnegie Mellon University page 36 Question 18 J2EE applications are made up of components that can be deployed into different:

37 © 2002 by Carnegie Mellon University page 37 Question 18 J2EE applications are made up of components that can be deployed into different: containers

38 © 2002 by Carnegie Mellon University page 38 Question 19 Security roles are defined in an Enterprise JavaBeans:

39 © 2002 by Carnegie Mellon University page 39 Question 19 Security roles are defined in an Enterprise JavaBeans: deployment descriptor

40 © 2002 by Carnegie Mellon University page 40 Question 20 The systematic transformation of an existing system into a new form to realize quality improvements in operation, system capability, functionality, performance, or evolvability at a lower cost, schedule, or risk to the customer is called:

41 © 2002 by Carnegie Mellon University page 41 Question 20 The systematic transformation of an existing system into a new form to realize quality improvements in operation, system capability, functionality, performance, or evolvability at a lower cost, schedule, or risk to the customer is called: reengineering

42 © 2002 by Carnegie Mellon University page 42 Question 21 Rank the three ensembles using the following data

43 © 2002 by Carnegie Mellon University page 43 Feature$ Value for Risk Max Risk Residual Risk Cost  $/  RR $ Per Risk  (r, c) F1$35,00056R1: 22 R2: 17 R3: 12 R4: 56 $10,000 23,000 4,000 0 F2$40,00035R1: 23 R2: 12 R3: 6 R4: 35 3,000 12,000 18,000 0 F3$90,00087R1: 34 R2: 12 R3: 43 R4: 87 52,000 78,000 56,000 0

44 © 2002 by Carnegie Mellon University page 44 Feature$ Value for Risk Max Risk Residual Risk Cost  $/  RR $ Per Risk  (r, c) F1$35,00047R1: 32 R2: 24 R3: 15 R4: 47 $10,000 23,000 4,000 0 F2$40,00064R1: 31 R2: 42 R3: 6 R4: 64 3,000 12,000 18,000 0 F3$90,00075R1: 32 R2: 31 R3: 15 R4: 75 52,000 78,000 56,000 0

45 © 2002 by Carnegie Mellon University page 45 Feature$ Value for Risk Max Risk Residual Risk Cost  $/  RR $ Per Risk  (r, c) F1$35,00087R1: 32 R2: 42 R3: 80 R4: 87 $10,000 23,000 4,000 0 F2$40,00024R1: 23 R2: 5 R3: 6 R4: 24 3,000 12,000 18,000 0 F3$90,00034R1: 17 R2: 12 R3: 21 R4: 34 52,000 78,000 56,000 0

46 © 2002 by Carnegie Mellon University page 46 Rankings 1.Ensemble 2.Ensemble 3.Ensemble

47 © 2002 by Carnegie Mellon University page 47 Question 22 Define input sequences based on the following input partitions to test the specified procedure. Show the input sequence, key, and output for each partition (5 points) Specification: procedure Search (Key : ELEM ; T: ELEM_ARRAY; Found : in out BOOLEAN; L: in out ELEM_INDEX) ; Pre-condition -- the array has at least one element T’FIRST <= T’LAST Post-condition -- the element is found and is referenced by L ( Found and T (L) = Key) or -- the element is not in the array ( not Found and not (exists i, T’FIRST >= i <= T’LAST, T (i) = Key ))

48 © 2002 by Carnegie Mellon University page 48 Input Sequences Array Element Single value In sequence Not in sequence Multiple values First element in sequence Last element in sequence Middle of sequence Not in sequence

49 © 2002 by Carnegie Mellon University page 49 Question 22 Answer Input sequence (T)Key (Key)Output (Found, L) 17 17, 29, 21, 23 41, 18, 9, 31, 30 16, 45 17, 18, 21, 23, 29, 41, 38 21, 23, 29, 33, 38 17 0 17 45 23 25 True, 1 False, ?? True, 1 True, 7 True, 4 False, ??

50 © 2002 by Carnegie Mellon University page 50 Question 23 Describe the differences between measures, preferences, criteria and preference structure in multi-criteria selection.

51 © 2002 by Carnegie Mellon University page 51 Question 23 Describe the differences between measures, preferences, criteria and preference structure in multi-criteria selection. Measures are numbers objectively assigned to an attribute. Preferences are subjectively assigned to measured attributes. An attribute that has been assigned a preference is a criterion. The set of criteria defines the preference structure for the evaluation.

52 © 2002 by Carnegie Mellon University page 52 Question 24 23. Write out the exact HTML generated by the JSP page: <% message.setString("TitleBookDescription", "Book Title"); message.setString("By", "By"); messages.getString("Price", "Cost";) messages.getString("Critics", "Critics"); book.setTitle("Building Systems from Commercial Components"); book.setFirstName("Kurt"); book.setSurname("Wallnau"); book.setPrice("54.95"); book.setYear("2001"); book.getDescription(“CBS development"); %>

53 © 2002 by Carnegie Mellon University page 53 Question 24 ( ) "/>


Download ppt "Page 1 Pittsburgh, PA 15213-3890 Final Review CS1530 Software Engineering."

Similar presentations


Ads by Google