Question 1there are many of issues affecting cost of

Assignment Help Software Engineering
Reference no: EM13349529

QUESTION 1

There are many of issues affecting cost of software. List and explain the five parts affecting pricing in software.

QUESTION 2

char *strncat (char *dest, const char *src, size_t count)
{
char *temp=dest;
if( count) {
while(*dest)
dest++;
while((*dest++ = *src++)){
if( --count == 0){
*dest = ‘\0';
break;
}
}
}return temp;
}

(a) Sketch a control flow graph for the above function.

(b) Figure out the Cyclomatic complexity based on your control flow graph.

(c) Using two other methods, show that the Cyclomatic complexity acquired in the above question is correct.

(d) List the set of independent trails from the graph.

QUESTION 3:

Think about the following scenario.
Suppose you work for a company that makes dwelling safety and security monitoring devices and controllers. Now your company desires to sell home safety systems. You are requested to plan and build the software part of the system. The obtainable components are:

• controller (with associated monitoring devices) for door and window alarms

• controller (with associated monitoring devices) for motion detectors

• controller (with associated monitoring devices) for panic buttons

• controller (with associated monitoring devices) for fire detector

• controller (with associated devices) for light activator and deactivator

• controller/monitor for key device (to turn system on and off)

• wireless dial-out device with controller

(a) Evidently state your assumption and calculate the Adjusted Function Point.

(b) Calculate approximately the effort (time taken) to build the system. Presume a productivity of 10FPs per staff month.

QUESTION 4

(a) Portray the types of metrics we have in software development.

(b) List four problems that project managers encounter before starting and during the course of expansion phase of a software project

QUESTION 5

void sort( int *a, int n )
{
int i, j, t;
if( n <2 ) return;
for( i=0 ; i <n-1; i++)
{
for( j=i+1 ; j <n ; j++)
{
if( a[i] > a[j])
{
t=a[i];
a[i] =a[j];
a[j]=t;
}
}
}
}

Concerning Halstead's metrics, calculate the following:

(a) volume

(b) difficulty

(c) effort

Note: Ignore function definition

QUESTION 6

A lot of software companies still make use of subjective estimation techniques while replying to Request for Proposals (RFPs). List and illustrate four common estimation models.

QUESTION 7

char *strncat (char *dest, const char *src, size_t count)
{
char *temp=dest;
if( count) {
while(*dest)
dest++;
while((*dest++ = *src++)){
if( --count == 0){
*dest = ‘\0';
break;
}
}
} return temp;
}

(a) Conclude the Information Flow Complexity.

(b) Compute the Weighted IFC.

QUESTION 8

Using the below stated quality requirement as reference, Give details of the Software Quality Metrics Framework.
Quality precondition: "The product will be easy to use".

Reference no: EM13349529

Questions Cloud

Question 1specified the scale of activities of the tourist : question 1specified the scale of activities of the tourist sector it is clear that it can comprise a major
Question 1a give details with examples the importance ofi : question 1a give details with examples the importance ofi conserving biodiversityii need for a legal framework to guard
Question 1why should we preserve biodiversity give : question 1why should we preserve biodiversity? give explanation for your answer with examples from a social
Question 1figure 1 underneath shows the human development : question 1figure 1 underneath shows the human development index hdi and annual per capita energy utilization in kilo
Question 1there are many of issues affecting cost of : question 1there are many of issues affecting cost of software. list and explain the five parts affecting pricing in
Question 1a pool of newly qualified doctors are not : question 1a pool of newly qualified doctors are not satisfied with their existing revenue and decide to set up an
Question 1a is an intrusion avoidance system more like a : question 1a is an intrusion avoidance system more like a honeypot or a firewall? describe why?b what does the quality
Question 1amake a distinction between passive and active : question 1amake a distinction between passive and active attacks.bprovide two reasons why it is very important to
Question 1a differentiate between confidentiality integrity : question 1a differentiate between confidentiality integrity and availability. demonstrate your answer using an

Reviews

Write a Review

Software Engineering Questions & Answers

  Question 1 a inscribe detailed notes related to

question 1 a inscribe detailed notes related to object-oriented concepts on the following-i class and object

  Importance of professional looking worksheets

Discuss and explain in Excel why is it important to have a professional looking worksheet? Why spend so much time with styles and formats and creating borders?

  Importance of internet to most companies

Discuss how important is the Internet to most corporations? How have corporations improved the sales / service / performance process utilizing the Internet?

  Draw a class diagram for one-of-a-kind antiques

Draw a class diagram for the following situation Stillwater Antiques buys and sells one-of-a-kind antiques of all kinds (e.g., furniture, jewelry, china, and clothing).

  Question about consecutive bytes

Determine the address where the longest consecutively numbered string of bytes starts. Consecutive bytes are defined as those that differ through the number 01.

  Draw pattern activity for adapter and data access object

Draw Pattern Activity: Create a 2-3 page paper comparing and contrasting five of design patterns. Select any five from the list.

  Case study: building an access control system

Define five major tasks, each with one to two subtasks. Also write a brief description for each task and create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).

  Draw the physical data flow diagrams

Draw the physical data flow diagrams. Use Microsoft Visio to prepare examples of flow charts and data flow diagrams.

  What would you want your employees to do

A fellow employee is being harassed at work and is afraid to say or do anything about it. If you "blow the whistle" the company may retaliate against you. You could even lose your job.

  Describe a non-agile alternative

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

  Important tool into their sdlc

What are some constructive ways to change the work flow of a small to medium company to include this important tool into their SDLC?

  Methodology to develop software applications

What needs to be considered in devising a company's policy for selecting a methodology to develop software applications?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd