Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What do you mean by Configuration Management?
Because of several reasons software changes during its life cycle. Consequently of the change made multiple versions of the software exist at one time. These changes should be managed controlled and documented properly in order to have reliable systems. Configuration management assists the developers to manage these changes systematically by applying procedures as well as standards and by using automated tools.
Although multiple versions of the software exist in the tool repository merely one official version of set of project components exist called baseline. The diverse components of the baseline are called configuration items. A few examples of configuration items are SRS, project plan, Design document, test plans and user manuals etc. A group of people comprise Configuration Control Board (CCB) which controls the changes to be made to the software. When changes are to be made the following steps are followed
(i) Submit the change demand along with details to CCB
(ii) CCB accesses the change demand after proper evaluation.
(iii) Depending upon the results and the request is either accepted or rejected or can be deferred for the future assessment.
(iv) If accepted appropriate plan is prepared to implement the change.
(v) Once changes are made subsequent to validating by the quality personnel all configuration items are updated.
A number of popular configuration management tools are Clear CASE Visual Source Safe etc.
What is cycle stealing DMA operation? Cycle Stealing: In this process, the DMA controller transfers one data word at a time, after which it must return control of the buses to
Explain in detail the design concepts. Abstraction Functional abstraction Data abstraction Control abstraction Information hiding Every module in
What is a user interface Ans) "User interface" is the interface among a human user and a computer system. It access the passage of information among a human user and hardware or
What are Quality management activities. Quality assurance Establish organisational process and standards for quality. Quality planning Select applicab
Problem 1. Explain Iterative Development Model in detail 2. Explain the Incremental Development Model in detail 3. What are the major technical and non-technical factors whic
What is the black box?
Attributes Attribute is a characteristic or property of an entity which is of interest to the organisation. It's represented by oval shaped box with name of attribute writt
Testing to satisfy the criterion that every statement in a program be implemented at least once during program testing.
Define the Minimum cardinality of a relationship Minimum cardinality of a relationship is the minimum number of instances of second entity (student, in this case) with every in
What are the advantages and disadvantages of big-bang? Advantages: This approach is easy. Disadvantages: It is difficult to debug.It is not easy to isolate errors whereas te
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd