Reference no: EM133480
QUESTION 1
There are many of issues affecting cost of software. List and explain the five parts affecting pricing in software.
QUESTION 2
char *strncat (char *dest, const char *src, size_t count)
{
char *temp=dest;
if( count) {
while(*dest)
dest++;
while((*dest++ = *src++)){
if( --count == 0){
*dest = ‘\0';
break;
}
}
}return temp;
}
(a) Sketch a control flow graph for the above function.
(b) Figure out the Cyclomatic complexity based on your control flow graph.
(c) Using two other methods, show that the Cyclomatic complexity acquired in the above question is correct.
(d) List the set of independent trails from the graph.
QUESTION 3:
Think about the following scenario.
Suppose you work for a company that makes dwelling safety and security monitoring devices and controllers. Now your company desires to sell home safety systems. You are requested to plan and build the software part of the system. The obtainable components are:
• controller (with associated monitoring devices) for door and window alarms
• controller (with associated monitoring devices) for motion detectors
• controller (with associated monitoring devices) for panic buttons
• controller (with associated monitoring devices) for fire detector
• controller (with associated devices) for light activator and deactivator
• controller/monitor for key device (to turn system on and off)
• wireless dial-out device with controller
(a) Evidently state your assumption and calculate the Adjusted Function Point.
(b) Calculate approximately the effort (time taken) to build the system. Presume a productivity of 10FPs per staff month.
QUESTION 4
(a) Portray the types of metrics we have in software development.
(b) List four problems that project managers encounter before starting and during the course of expansion phase of a software project
QUESTION 5
void sort( int *a, int n )
{
int i, j, t;
if( n <2 ) return;
for( i=0 ; i <n-1; i++)
{
for( j=i+1 ; j <n ; j++)
{
if( a[i] > a[j])
{
t=a[i];
a[i] =a[j];
a[j]=t;
}
}
}
}
Concerning Halstead's metrics, calculate the following:
(a) volume
(b) difficulty
(c) effort
Note: Ignore function definition
QUESTION 6
A lot of software companies still make use of subjective estimation techniques while replying to Request for Proposals (RFPs). List and illustrate four common estimation models.
QUESTION 7
char *strncat (char *dest, const char *src, size_t count)
{
char *temp=dest;
if( count) {
while(*dest)
dest++;
while((*dest++ = *src++)){
if( --count == 0){
*dest = ‘\0';
break;
}
}
} return temp;
}
(a) Conclude the Information Flow Complexity.
(b) Compute the Weighted IFC.
QUESTION 8
Using the below stated quality requirement as reference, Give details of the Software Quality Metrics Framework.
Quality precondition: "The product will be easy to use".
Sustainable community tourism
: Tourism Area Life Cycle, Doxey's Irridex model, Social Exchange Theory, on-traditional rural expansion strategies, environmental management tools, environmental collisions of tourism
|
Conserving biodiversity
: legal framework to guard biodiversity, marine biosphere, Ex-situ conservation, marine biodiversity, conservation of biodiversity, International Conventions
|
Ecosystem
: preserve biodiversity, social, environmental and cost-effective perspective, in-situ conservation, ex- situ conservation, Invasive alien species, conservation education a significant tool for protecting biodiversity, marine biodiversity, Ecosystem Ba..
|
Energy transition
: energy, poverty, agriculture, biodiversity, Energy Management, geothermal energy, use of E10 in petrol vehicles, use nuclear power to meet the electricity demand, sustainable energy
|
Information flow complexity
: Cyclomatic complexity, monitoring devices, wireless dial-out device with controller, Request for Proposals (RFPs), Weighted IFC
|
Project management for engineering
: economic feasibility of the projec, restrictions are the economics of the project based, technical feasibility for the project
|
Ip spoofing
: honeypot or a firewall, error handling, Denial-Of-Service, Public Key Infrastructure, WLAN Administrator, WEP Protocol, RSA Algorithm, Network Engineer
|
Protocol stack for wap2
: WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..
|
Network threats
: confidentiality, integrity and availability, trojan horse, Compress the data, Caesar cipher, rail fence cipher, PGP operation, network perimeter, MSFT, RSA cryptosystem
|