What do you mean by configuration management, Software Engineering

Assignment Help:

Q. What do you mean by Configuration Management?

Because of several reasons software changes during its life cycle. Consequently of the change made multiple versions of the software exist at one time. These changes should be managed controlled and documented properly in order to have reliable systems. Configuration management assists the developers to manage these changes systematically by applying procedures as well as standards and by using automated tools.

Although multiple versions of the software exist in the tool repository merely one official version of set of project components exist called baseline. The diverse components of the baseline are called configuration items. A few examples of configuration items are SRS, project plan, Design document, test plans and user manuals etc. A group of people comprise Configuration Control Board (CCB) which controls the changes to be made to the software. When changes are to be made the following steps are followed

(i) Submit the change demand along with details to CCB

(ii) CCB accesses the change demand after proper evaluation.

(iii) Depending upon the results and the request is either accepted or rejected or can be deferred for the future assessment.

(iv) If accepted appropriate plan is prepared to implement the change.

(v) Once changes are made subsequent to validating by the quality personnel all configuration items are updated.

A number of popular configuration management tools are Clear CASE Visual Source Safe etc.


Related Discussions:- What do you mean by configuration management

What are the various types of coupling, What are the various types of coupl...

What are the various types of coupling? i. Data coupling - The data coupling is possible by parameter passing or data interaction. ii. Control coupling - The modules share r

What is the disadvantage of the set protocol, Question: (a) What mecha...

Question: (a) What mechanism does illegal spammers exploit to send spam? (b) What is a hoax? (c) Name two ways in which you can increase the privacy of e-mail. (d)

Ftr, EXPLAIN ABOUT DEFECT AMPLIFICATION AND REMOVAL IN SOFTWARE ENGINEERING...

EXPLAIN ABOUT DEFECT AMPLIFICATION AND REMOVAL IN SOFTWARE ENGINEERING

Determine the boundary value analysis, What is a boundary value analysis? ...

What is a boundary value analysis? A boundary value analysis is a testing procedure by which the elements at the edge of the domain are selected and tested. It is a test case d

What is assertion testing, A dynamic analysis method which inserts assertio...

A dynamic analysis method which inserts assertions about the relationship among program variables into the program code. The truth of the assertions is determined as the program im

Explain test bed, 1) An environment that having the integral hardware, inst...

1) An environment that having the integral hardware, instrumentation, simulators, software tools, and other support elements required to conduct a test of a logically or physically

What are the general activities in design process, What are the general act...

What are the general activities in design process? i. System structuring - The system is separated into principle subsystems components and communications among these subsystem

Mobile application, we got the code for mobile app we need a document for t...

we got the code for mobile app we need a document for that

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd