Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
(a) Briefly explain the following concepts:
(i) Encapsulation and its advantages (ii) Abstract class and its use (iii) Polymorphism and its advantages
(b) Object oriented software development promotes class reuse. Explain how this is achieved and give two advantages and two disadvantages of class reuse.
(c) Briefly outline the facilities provided by a generic CASE tool to perform Object Oriented analysis and design. You may refer to an example of a CASE tool you have used during your course.
What are the fundamental activities of a software process? Specification Validation Design and implementation Evolution
Illustrate parameterization in QTP. - Parameterization - Passing values from external source into script. - The number of values passed can be single or multiple. - It he
What are the different architectures developed during BPE? Data architecture àframework for the information needs of a business. Application architecture à incorporates the
What is the work product of software design process and who does this? A design model that encompasses architectural, component level, interface and their representations is t
Define top-down testing. System developed starting from most general modules. Testing begins from the most general module.
What is Non-intrusive Testing? Testing that is transparent to the software under test; i.e., testing that does not alter the timing or processing characteristics of the software
Q. Explain about Mutation testing? Mutation testing In mutation testing the software is initial tested by using an preliminary test suite built up from the different white bo
Four Different Phases of spiral model are: 1) Planning 2) Risk analysis 3) Development 4) Assessment
What is Checksheet? Ans) A checksheet is the form used to record data as it is gathered.
After users are authenticated, what measures can be employed in order to maintain security when users are away from their computers? 2. Discuss ways in which the use of strong au
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd