Question 1there are many of issues affecting cost of

Assignment Help Software Engineering
Reference no: EM13349529

QUESTION 1

There are many of issues affecting cost of software. List and explain the five parts affecting pricing in software.

QUESTION 2

char *strncat (char *dest, const char *src, size_t count)
{
char *temp=dest;
if( count) {
while(*dest)
dest++;
while((*dest++ = *src++)){
if( --count == 0){
*dest = ‘\0';
break;
}
}
}return temp;
}

(a) Sketch a control flow graph for the above function.

(b) Figure out the Cyclomatic complexity based on your control flow graph.

(c) Using two other methods, show that the Cyclomatic complexity acquired in the above question is correct.

(d) List the set of independent trails from the graph.

QUESTION 3:

Think about the following scenario.
Suppose you work for a company that makes dwelling safety and security monitoring devices and controllers. Now your company desires to sell home safety systems. You are requested to plan and build the software part of the system. The obtainable components are:

• controller (with associated monitoring devices) for door and window alarms

• controller (with associated monitoring devices) for motion detectors

• controller (with associated monitoring devices) for panic buttons

• controller (with associated monitoring devices) for fire detector

• controller (with associated devices) for light activator and deactivator

• controller/monitor for key device (to turn system on and off)

• wireless dial-out device with controller

(a) Evidently state your assumption and calculate the Adjusted Function Point.

(b) Calculate approximately the effort (time taken) to build the system. Presume a productivity of 10FPs per staff month.

QUESTION 4

(a) Portray the types of metrics we have in software development.

(b) List four problems that project managers encounter before starting and during the course of expansion phase of a software project

QUESTION 5

void sort( int *a, int n )
{
int i, j, t;
if( n <2 ) return;
for( i=0 ; i <n-1; i++)
{
for( j=i+1 ; j <n ; j++)
{
if( a[i] > a[j])
{
t=a[i];
a[i] =a[j];
a[j]=t;
}
}
}
}

Concerning Halstead's metrics, calculate the following:

(a) volume

(b) difficulty

(c) effort

Note: Ignore function definition

QUESTION 6

A lot of software companies still make use of subjective estimation techniques while replying to Request for Proposals (RFPs). List and illustrate four common estimation models.

QUESTION 7

char *strncat (char *dest, const char *src, size_t count)
{
char *temp=dest;
if( count) {
while(*dest)
dest++;
while((*dest++ = *src++)){
if( --count == 0){
*dest = ‘\0';
break;
}
}
} return temp;
}

(a) Conclude the Information Flow Complexity.

(b) Compute the Weighted IFC.

QUESTION 8

Using the below stated quality requirement as reference, Give details of the Software Quality Metrics Framework.
Quality precondition: "The product will be easy to use".

Reference no: EM13349529

Questions Cloud

Question 1specified the scale of activities of the tourist : question 1specified the scale of activities of the tourist sector it is clear that it can comprise a major
Question 1a give details with examples the importance ofi : question 1a give details with examples the importance ofi conserving biodiversityii need for a legal framework to guard
Question 1why should we preserve biodiversity give : question 1why should we preserve biodiversity? give explanation for your answer with examples from a social
Question 1figure 1 underneath shows the human development : question 1figure 1 underneath shows the human development index hdi and annual per capita energy utilization in kilo
Question 1there are many of issues affecting cost of : question 1there are many of issues affecting cost of software. list and explain the five parts affecting pricing in
Question 1a pool of newly qualified doctors are not : question 1a pool of newly qualified doctors are not satisfied with their existing revenue and decide to set up an
Question 1a is an intrusion avoidance system more like a : question 1a is an intrusion avoidance system more like a honeypot or a firewall? describe why?b what does the quality
Question 1amake a distinction between passive and active : question 1amake a distinction between passive and active attacks.bprovide two reasons why it is very important to
Question 1a differentiate between confidentiality integrity : question 1a differentiate between confidentiality integrity and availability. demonstrate your answer using an

Reviews

Write a Review

Software Engineering Questions & Answers

  Differentiate between alpa and beta testing

Differentiate between alpa and beta testing, Consider a piece of an embedded software that is a part of a T.V. Which of the types of system testing would you choose to apply and at what time?

  What would you want your employees to do

A fellow employee is being harassed at work and is afraid to say or do anything about it. If you "blow the whistle" the company may retaliate against you. You could even lose your job.

  Create an eer mode using traditional eer notation

Create an EER model for the following situation using traditional EER notation, the Visio notation or the supertypes notation. An international school of technology has hired you to create a database management system

  Create inheritance hierarchy for customer-s bank account

Create inheritance hierarchy which a bank might use to represent customer's bank accounts. All customers at this bank can deposit money into their accounts and withdraw money from accounts.

  Creating an idef1x e-r diagram

The scenario is that the Public Affairs Office at Highline University gets requests for speakers on particular topics. To be able to respond to such request, that office wishes to create a database.

  Question about make buy decision

The make purchase decision is an important management prerogative. Assumed to be a manager of a software company that has an average software development cost of $20/LOC.

  Explain and justify the need for good hci practice

Explain and justify the need for good HCI practice and discuss the role of cognitive psychology in the design of user interfaces.

  Compute degree centrality of an undirected graph

Compute the degree centrality- closeness centrality of nodes in the graph - write a program in your preferred programming language to compute degree centrality of an undirected graph.

  Analyze the strengths and weaknesses of both virtualization

Analyze the strengths and weaknesses of both virtualization and cloud computing in providing secure and trusted systems. In what ways do the experts foresee the use of each of these technologies evolving in the future.

  Draw class diagram for computing machine

Each problem reported by a distinct user is assigned a unique problem number (even if different users call in to report the same problem). Draw a class diagram that accurately reflects the system's requirements.

  Microsoft word and powerpoint presentation

Assume A friend of you has just started using M.S. Word, and has e-mailed you requesting instructions on how to apply a first line indent to a paragraph. Construct a list of instructions about how to configure a 1st line indent for a paragraph.

  Write several functions to input the faculty information

You should write several functions to input the faculty information from console input. Then save all those information in string, and vectors.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd