Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Define Reverse Engineering? What are the main objectives of reverse engineering?
Ans: The reverse engineering is the procedure of generating representations that are implementation independent starting from code. It is opposite of usual forward engineering process. The major objectives of the reverse Engineering process are:
(i) It assists the companies to understand the complexities of the system
(ii) Assists the analyst to generate useful lost information about legacy systems
(iii) Can be utilized to identify reusable components for analysis and future use.
(iv) Assists in generating graphical representation of the system from different perspectives example are ER diagram, class diagram and DFD etc.
(v) Can be utilized as a part of Reengineering process.
(vi) Over a period of time alterations made to the software as well result into unexpected problems. The anomalies are able to be detected using reverse engineering techniques.
give the example of data dictionary
How does the risk factor affect the spiral model of software development? Ans: Risk Analysis phase is the most significant part of "Spiral Model". In this phase all possible (a
Create a compound data type called Post to store messages posted on Google+. Post should include: Name / Data Type / Description date / char [9] / date fields for
Incremental analysis happens when (partial) analysis may be performed on an incomplete product to permit early feedback on the development of that product.
What is the difference between Print Preview and Layout Preview? Print Preview and Layout Preview When a report is observed in Print preview, it appears almost exactly as it
What is the work product of software design process and who does this? A design model that encompasses architectural, interface, component level and their representations is th
What are the three activities of risk assessment? Ans: The three activities are analyzing, identifying and giving priorities. Risks are able to be identified by a check list
Write short note on black box testing. The black box testing is also known as behavioural testing. This method fully focuses on the functional requirements of the software. Te
effects of nativity in requirements specification
CAPABILITY MATURITY MODEL (CMM): CMM is a strategy for recovering the software process, irrespective of the actual life cycle model used.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd