Explain the waterfall model, Software Engineering

Assignment Help:

Explain the waterfall model. Explain why it is more advantageous than adhoc methods.

Ans Waterfall Model:

1.The waterfall model is a chronological software development process in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of Initiation, Conception, analysis, design (validation) and testing Construction and maintenance.

2. The first official description of the waterfall model is given by Winston W. Royce in 1950 nevertheless popular in 1970 and further refined by Barry Boehm.

3. To follow the waterfall model one carries on from one phase to the next in a purely sequential manner. For instance one first completes requirements specifications which are set in stone. When the requirements are completely completed one proceeds to design.

4. Process structured as a tumble of phases where output of one is input of next.

5. Several variants of model depending on organization and specific project. However underlying phases are same for all.


Related Discussions:- Explain the waterfall model

Explain information management strategy, Question: (a) ‘Information Str...

Question: (a) ‘Information Strategy involves the encompassing of an organisation's information requirements and information systems planning with its long-term objectives.' T

What is big-bang strategy, Explain Big-Bang Strategy? Ans) Big-Bang appr...

Explain Big-Bang Strategy? Ans) Big-Bang approach is very easy in its philosophy where basically all the modules or builds are constructed and tested independently of each other

Determine the software testing, What is software testing The testing pr...

What is software testing The testing process focuses on the logical internals of the software, ensuring that all statements have been tested, and on the functional externals, t

Describe the different types of frequency hoping, Question: (a) What i...

Question: (a) What is a piconet in a Bluetooth context? (b) Discuss the concept of Master, slave, stand-by and parked devices with respect to a Bluetooth piconet. (c)

What is cycle stealing dma operation, What is cycle stealing DMA operation?...

What is cycle stealing DMA operation? Cycle Stealing: In this process, the DMA controller transfers one data word at a time, after which it must return control of the buses to

Why we use coverage analyzers, Q. Why we use Coverage analyzers? Cover...

Q. Why we use Coverage analyzers? Coverage analyzers (execution verifiers) A coverage analyzer is the most common and important tool for testing. It is often relatively simpl

Explain lines of code (loc), Lines of code (LOC) is a software metric used...

Lines of code (LOC) is a software metric used to calculate the size of a software program by counting the number of lines in the text of the program's source code. LOC is typicall

State the primary objectives of analysis model, State the primary objective...

State the primary objectives of analysis Model. To explain what the customer needs To set up a basis for the creation of a software design To explain a set of requirem

What is the use of cmm, What is the use of CMM? Capability Maturity Mod...

What is the use of CMM? Capability Maturity Model is used in assessing how well an organisation's processes permit to complete and manage latest software projects.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd