Explain the steps in a generic design process

Assignment Help Computer Engineering
Reference no: EM131950585

Assignemnt

You may consult any book, your notes, D2L discussions, and any other reference material, including online references. You may not discuss the examination with others, whether they are members of the class or not.

1. Explain the steps in a generic design process.

2. Carefully distinguish between architectural-design, mid-level design and low level design.

3. What are the two main techniques for evaluating architectural design alternatives? Carefully explain them.

4. Does the MVC style insulate the user interface from changes in the application domain? Justify your answer.

5. Explain how the Layered style supports reuse.

True or False

1. UML use case diagrams are dynamic models of all the use cases in a product.

2. Project Mission Statement Template includes "Business Requirements."

3. Architectural design is high-level software engineering design analysis.

4. A good architectural style supports all quality features.

5. Activity diagrams can represent any process and are useful throughout software design.

6. During the architectural design step we specify the internal details of each component.

7. Regarding activity diagrams, an activity is an atomic task or procedure that cannot be broken into parts.

8. Regarding activity diagrams, an initial node produces a token on each outgoing edge when an activity begins.

9. Software requirements specification (SRS) is the main input for the product design process.

10. With respect to product design principles,simplicity means: Adesign is acceptable only if it is simple and easy to understand.

11. A set of requirements is consistent if it includes every relevant requirement.

12. Every use case diagram must have at least one actor associated with each use case.

13. Postconditions must be true when the use case ends whether it is successful or not.

14. Use case models provide atomized requirements statements.

15. Product Design Principles include feasibility, usability, economy and changeability.

16. Only direct adjacent layers can invoke each other's methods in a layered architecture.

17. There is data sharing between all layers in a layered architecture.

18. A UML diagram must provide a complete view of the entire software system.

19. The MVC style should be used to separate an interactive interface from the remainder of a program, thus increasing user interface flexibility.

20. Among the advantages of layered architecture is "each layer is selected to be a set of related services; thus the architecture provides high degree of cohesion within the layer."

21. A resolution model is any representation of a design problem.

22. Architecture design is a problem-solving activity whose input is the SRS document and whose output is the SDD.

23. All architectural designs are the same in terms of their level of. abstraction.

24. Architectural Design better done as an individual first and then bring together all the individual architectural design suggestions.

25. Finalizing The Architectural Design step ensures that the selected architecture does satisfy the various functional and non-functional requirements (and possibly may delight the users) and is clearly documented.

26. In Low-Level Detailed Design PAID stands for Packaging, Algorithms, Interfaces, and Data structures.

27. In Layered architecture if any layer only uses the layer directly below it, then it is a Relaxed Layered Style.

28. In Layered architecture each layer may hide private information from other layers

29. In Pipe-Filter architecture Pipe is a mechanism that allows the flow of data.

30. Problems that fit Shared Data architecture includes real-time systems such as: airplane control, medical equipment monitor, home monitor,

31. In Model-View-Controller (MVC) architecture, Controller isthe portion that handles the data model and the logic related to the application functions.

32. In contrast to mid-level, low level detailed design fills in the details for programming purpose.

33. A program entity is visible at a point in a program if it can be "used" (read or change its value) at that point.

34. Regarding sequence diagrams, when an individual sends an asynchronous message, it blocks or suspends until the message returns.

35. State diagrams are a UML notation for describing finite automata.

36. Software architecture is crucial not only for satisfying a product's functional requirements, but also for satisfying its non-functional requirements.

37. Architectural design may begin during product design.

38. There is a clear boundary between architectural and detailed design.

39. Mid-level design must specify both static and dynamic aspects of components.

40. Hope you have done a good job up to this point. You get automatic credit for this one.

Attachment:- Lecture.zip

Reference no: EM131950585

Questions Cloud

What is the computer forensic tool testing : What is the Computer Forensic Tool Testing (CFTT) and how can it be utilized in forensic investigations?
Which database table is most frequently loaded : Which database table is most frequently loaded - Are there any server errors? Ideas about possible causes - implement an application or script
The aqua liquid assets money market mutual fund : The Aqua Liquid Assets Money Market Mutual Fund has a NAV of $1 per share. What will the NAV of this fund be at the end of the year? Why?
Suggest viable approaches to resolving the dilemma : Suggest the most significant challenge that entrepreneurs may encounter when growing a business.
Explain the steps in a generic design process : Explain the steps in a generic design process. Carefully distinguish between architectural-design, mid-level design and low level design.
What is the probability that they would say that the effects : If you randomly selected an individual from those polled, what is the probability that they would say that the effects "were not harmful at all"?
Assess the effectiveness of starbucks management decisions : Assess the effectiveness of Starbucks' management decisions in providing innovative offerings for its customers.
Find the probability that their weights sum : If 465 M&Ms are randomly selected, find the probability that their weights sum to at least 396.9. (Round your answer to four decimal places.)
Do you believe your new products are truly successful : Share with the class this new product idea; in addition to describing this new item indicate whether this new product is either additions to existing product.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd