相关章节作业及答案课件

上传人:沈*** 文档编号:241647798 上传时间:2024-07-12 格式:PPT 页数:49 大小:701KB
返回 下载 相关 举报
相关章节作业及答案课件_第1页
第1页 / 共49页
相关章节作业及答案课件_第2页
第2页 / 共49页
相关章节作业及答案课件_第3页
第3页 / 共49页
点击查看更多>>
资源描述
2010 Sichuan University.All rights reserved.|ConfidentialModern Software EngineeringCollege of Computer(SW)Science Sichuan University 2010 Sichuan University All rights reserved.|Confidential2Exercise1.Which question no longer concerns the modern software engineeringa.Why does computer hardware cost so much?b.Why does software take a long time to finish?c.Why does it cost so much to develop a piece of software?d.Why cant software errors be removed from products prior to delivery?Answer:a2.Today the increased power of the personal computer has brought about an abandonment of the practice of team development of software.a.True b.False Answer:b3.Software is a product and can be manufactured using the same technologies used for other engineering artifacts.a.True b.FalseAnswer:b4.Software deteriorates rather than wears out because a.Software suffers from exposure to hostile environments.1.Defects are more likely to arise after software has been used often.a.Multiple change requests introduce errors in component interactions.b.Software spare parts become harder to order.Answer:c1-A 2010 Sichuan University All rights reserved.|Confidential3Exercise5.Most software continues to be custom built because a.Component reuse is common in the software world.b.Reusable components are too expensive to use.c.Software is easier to build without using someone elses components.d.Off-the-shelf software components are unavailable in many application domains.Answer:d6.The nature of software applications can be characterized by their information plexity b.content c.determinacy d.both b and c Answer:d7.Change cannot be easily accommodated in most software systems,unless the system was designed with change in mind.a.True b.FalseAnswer:a8.The functionality of most computer systems does not need to be enhanced the lifetime of the system.TrueFalseAnswer:b 2010 Sichuan University All rights reserved.|Confidential4Chapter 2 A Generic View of Processn Software Engineering A Layered Technologyn A Process Frameworkn CMMIn Process Patternsn Process TechnologyContent 2010 Sichuan University All rights reserved.|Confidential5Exercise1.Which of the items listed below is not one of the software engineering layers?Answer:ba.Process b.Manufacturing c.Methodsd.Tools 2.Software engineering umbrella activities are only applied during the initial phases of software development projects.Answer:ba.True b.False 3.Which of these are the 5 generic software engineering framework activities?Answer:munication,planning,modeling,construction,deployment munication,risk management,measurement,production,reviewing c.analysis,designing,programming,debugging,maintenance d.analysis,planning,designing,programming,testing 4.Which of these terms are level names in the Capability Maturity Model?Answer:ea.Performed b.Repeated1.Reuseda.Optimizedb.Both a and d 2010 Sichuan University All rights reserved.|Confidential6Exercise5.Which of the items listed below is not one of the process patterns.Answer:da.Intent b.Solutionc.Resulting Contextd.Output 6.Process technology tools allow software organizations to compress schedules by skipping unimportant activities.Answer:b a.True b.False 7.It is generally accepted that one cannot have weak software processes and create high quality end products.Answer:aa.True b.False8.The tasks(and degree of rigor)for each activity are always unchanged.Answer:ba.Trueb.FalseQuestion for Chapter 2List three areas in which process models may differ from one another.What are the names of the six levels of the SEI Capability Maturity Model Integration(CMMI)?In your own words,briefly describe each.Why has the Personal Software Process has not been widely adopted by industry?Answer:(Section 2.6.2)Describe the“plan-do-check-act”cycle from in the ISO 9001:2000 standard as it is applied to assessing the quality management elements of a software project.2010 Sichuan University All rights reserved.|Confidential8Chapter 3 Process Modelsn Prescriptive process modelsn Waterfall Modeln Incremental process modelsnIncremental model nRAD modeln Evolutionary process modelsnPrototyping modelnSpiral modelnConcurrent development modelnSpecialized process modelsnComponent-Based development modelnFormal methods modelnAspect-Oriented software development modelnUnified ProcessContent 2010 Sichuan University All rights reserved.|Confidential9Exercise1.The linear sequential model of software development is Answer:aa.A reasonable approach when requirements are well defined.b.A good approach when a working program is required quickly.c.The best approach to use for projects with large development teams.d.An old fashioned model that cannot be used in a modern context.2.The linear sequential model of software development is also known as the Answer:ea.Classical life cycle model b.Fountain model c.Spiral model d.Waterfall model 1.both a and d3.The incremental model of software development is Answer:ba.A reasonable approach when requirements are well defined.b.A good approach when a working core product is required quickly.c.The best approach to use for projects with large development teams.d.A revolutionary model that is not used for commercial products.4.The rapid application development model is Answer:ca.Another name for component-based development.b.A useful approach when a customer cannot define requirements clearly.c.A high speed adaptation of the linear sequential model.d.All of the above.2010 Sichuan University All rights reserved.|Confidential10Exercise5.Evolutionary software process models Answer:da.Are iterative in natureb.Can easily accommodate product requirements changes c.Do not generally produce throwaway systemsd.All of the above6.The prototyping model of software development is Answer:b a.A reasonable approach when requirements are well defined.b.A useful approach when a customer cannot define requirements clearly.c.The best approach to use for projects with large development teams.d.A risky model that rarely produces a meaningful product.7.Which of these is not one of the phase names defined by the Unified Process model for software development?Answer:da.Inception phase b.Elaboration phasec.Construction phased.Validation phase 8.In the Unified Process model requirements are determined iteratively and may span more than one phase of the process.Answer:aTrueFalse 2010 Sichuan University All rights reserved.|Confidential11Chapter 4 Agile Developmentn What is Agility?n An Agile processn Agile Process Modeln Extreme Programming(XP)n Adaptive Software Development(ASD)n Dynamic Systems Development Method(DSDM)n Scrumn Crystaln Feature Driven Development(FDD)n Agile Modeling(AM)Content 2010 Sichuan University All rights reserved.|Confidential12Exercise1.Agility is nothing more than the ability of a project team to respond rapidly to change.a.True b.False 2.Which of the following is not necessary to apply agility to a software process?a.Eliminate the use of project planning and testingb.Only essential work products are producedc.Process allows team to streamline tasks d.Uses incremental product delivery strategy3.How do you create agile processes to manage unpredictability?a.Requirements gathering must be conducted very carefully b.Risk analysis must be conducted before planning takes place 1.Software increments must be delivered in short time periods 2.Software processes must adapt to changes incrementally 3.Both c and dAnswer:4.Which of the following traits need to exist among the members of an agile software team?1.Competence a.Decision-making ability b.Mutual trust and respect c.All of the above.Answer:1-B2-A3-E4-D 2010 Sichuan University All rights reserved.|Confidential13Exercise5.All agile process models conform to a greater or lesser degree to the principles stated in the Manifesto for Agile Software Development.Answer:a.Trueb.False6.What are the four framework activities found in the Extreme Programming(XP)process model?a.analysis,design,coding,testing b.planning,analysis,design,coding c.planning,analysis,coding,testing d.planning,design,coding,testing Answer:7.What are the three framework activities for the Adaptive Software Development(ASD)process model?Answer:analysis,design,coding feasibility study,functional model iteration,implementation requirements gathering,adaptive cycle planning,iterative development a.speculation,collaboration,learning 8.Which is not one of the key questions that is answered by each team member at each daily Scrum meeting?Answer:What did you do since the last meeting?What obstacles are you encountering?What is the cause of the problems you are encountering?What do you plan to accomplish at the next team meeting?5-A6-D7-D8-C 2010 Sichuan University All rights reserved.|Confidential14Part Two:Software Engineering Practicen How does system engineering lead to effective software engineering?n What is requirements engineering,and what are the underlying concepts that lead to good requirements analysis?n How is the analysis model created,and what are its elements?n What is design engineering,and what are the underlying concepts that lead to good design?n What concepts,models,and methods are used to create architectural,interface,and component-level designs?n What strategies are applicable to software testing?n What methods are used to design effective test cases?n What measures and metrics can be used to assess the quality of analysis and design models,source code,and test cases?2010 Sichuan University All rights reserved.|Confidential15ContentChapter :System Engineeringn Computer-Based Systemsn The System Engineering Hierarchyn Business Process Engineering:An Overviewn Product Engineering:An Overviewn System Modelingn Hatley-Pirbhai ModelingnSystem Modeling with UML 2010 Sichuan University All rights reserved.|Confidential16Exercise1.Which of the following can be elements of computer-based systems?Answer:a.documentationb.softwarec.hardwared.peoplee.all of above2.To construct a system model the engineer should consider which of the following restraining factors?Answer:a.assumptionsb.budgetc.constraints d.schedule1.both a and c3.During business process engineering,three different architectures are examined.Answer:a.applications,data,technology infrastructure munications,organization,financial infrastructure work,database,reporting structure d.systems,requirements,data structure a.The goal of product engineering is to translate the customers desire for a set of defined capabilities into a working product.Answer:1.Truea.False1-E2-E3-A4-A 2010 Sichuan University All rights reserved.|Confidential17Exercise5.UML notations that can be used to model the hardware and software elements of a system are a.Activity diagrams b.Class diagrams c.Deployment diagrams d.Use-case diagrams e.a,b,and cAnswer:e 6.The system model template contains which of the following elements a.input b.output c.user interface d.all of above Answer:d7.The top level of the hierarchical model of a system is known as the a.AFD b.DFD c.SCD d.SFD Answer:c5-E6-D7-C 2010 Sichuan University All rights reserved.|Confidential18Exercise8.Select any large system or product with which you are familiar.Define the set of domains that describe the world view of the system or product.Describe the set of elements that make up one or two domains.For one element,identify the technical components that must be engineered.BPE(Business Process Engineering)world view:bankdomains:loans,savings,foreign exchangeelements of savings:Window service,Online service,ATM servicetechnical components of Online service:customer identify(security),communication,databaseProduct Engineeringworld view:smart phonedomains:chipset,softwareelements of software:OS,application platformtechnical components of application platform:communication,security,utility(telephone book,calendar)2010 Sichuan University All rights reserved.|Confidential19Chapter 6 Requirements Engineeringn Requirements Engineering Tasksn Inceptionn Elicitationn Elaborationn Negotiationn Specificationn Validationn Requirements ManagementContent 2010 Sichuan University All rights reserved.|Confidential20Exercise1.In requirements validation the requirements model is reviewed to ensure its technical feasibility.a.Trueb.FalseAnswer:b2.In win-win negotiation,the customers needs are met even though the developers need may not be.a.Trueb.FalseAnswer:b3.Which of the following is not one of the context-free questions that would be used during project inception?a.What will be the economic benefit from a good solution?b.Who is against this project?c.Who will pay for the work?1.Who will use the solution?Answer:ba.The use of traceability tables helps to debug programs following the detection of run-time errors determine the performance of algorithm implementations a.identify,control,and track requirements changes none of the above Answer:c 2010 Sichuan University All rights reserved.|Confidential21Exercise5.The system specification describes the a.Function,performance and constraints of a computer-based system b.implementation of each allocated system c.element software architecture d.time required for system simulation Answer:a6.Use-case actors are always people,never system devices.a.True b.False Answer:b 7.Which of the following is not one of the requirement classifications used in Quality Function Deployment(QFD)?a.exciting b.expected c.mandatory normal Answer:c 2010 Sichuan University All rights reserved.|Confidential22Exercise8.Develop a complete use-case for one of the following activities.a.Making a withdrawal at an ATM b.Using your charge card for a meal at a restaurant c.Searching for books(on a specific topic)using an on-line bookstoreWithdrawalmanagementAbnormalprocessbankcardATMSolution aUse-case:withdrawal at an ATMPrimary actor:customer,bank card,ATMPrecondition:ATM is readyTrigger:customer decides to make a withdrawal Scenario:Customer insert bank card into ATMCustomer input passwordCustomer press the withdrawal Customer input the number of moneyCustomer gets the moneyCustomer takes out the bank cardException:The bank card is not recognized see abnormal processPassword is incorrect or not recognized see abnormal processMoney does not get out see abnormal processThe bank card can not be took out see abnormal process 2010 Sichuan University All rights reserved.|Confidential23Exercise8.Develop a complete use-case for one of the following activities.a.Making a withdrawal at an ATM b.Using your charge card for a meal at a restaurant c.Searching for books(on a specific topic)using an on-line bookstoreReadingcharge cardAbnormalprocesschargecardCardreaderCashierCustomerSolution b:Use-case:using charge card at a restaurantPrimary actor:customer,cashier,charge card,card readerPrecondition:card reader is readyTrigger:customer decides to pay by charge card Scenario:1.Cashier insert charge card into card reader2.Customer input password3.Cashier input the number of money4.Card reader prints the receipt5.Cashier takes out the charge card6.Customer signs the receiptException:1.The charge card is not recognized see abnormal processPassword is incorrect or not recognized see abnormal processreceipt does not get out see abnormal processThe charge card can not be took out see abnormal process 2010 Sichuan University All rights reserved.|Confidential24Exercise8.Develop a complete use-case for one of the following activities.a.Making a withdrawal at an ATM b.Using your charge card for a meal at a restaurant c.Searching for books(on a specific topic)using an on-line bookstoreonlinesearchAbnormalprocessSolution c:Use-case:searching for booksPrimary actor:customerPrecondition:customer registration startsTrigger:customer decides to search for books Scenario:1.Customer input ID and password2.Customer input specific topic3.Book list is displayed4.Customer checks the booksException:1.Password is incorrect or not recognized see abnormal process2.Internet disconnect see abnormal process 2010 Sichuan University All rights reserved.|Confidential25Chapter 7 Requirement Analysisn An overview of requirements analysisn Analysis Modeling Approachesn Data Modelingn Flow-Oriented Modelingn Object-Oriented Analysisn Scenario-Based Modelingn Class-Based Modelingn Creating a behavioral modeln Specification guidelinesContent 2010 Sichuan University All rights reserved.|Confidential26Exercise1.Which of these is not an element of an object-oriented analysis model?Answer:ca.Behavioral elementsb.Class-based elementsc.Data elementsd.Scenario-based elements2.Which of the following is not an objective for building an analysis model?Answer:ca.define set of software requirements that can be validatedb.describe customer requirements1.develop an abbreviated solution for the problem2.establish basis for software design3.The data flow diagram Answer:ea.depicts relationships between data objectsb.depicts functions that transform the data flowc.indicates how data are transformed by the systemd.indicates system reactions to external events1.both b and c4.Which of the following items does not appear on a CRC card?Answer:ca.class collaboratorsb.class name1.class reliability2.class responsibilities 2010 Sichuan University All rights reserved.|Confidential27Exercise5.For purposes of behavior modeling a state is any a.consumer or producer of data.b.data object hierarchy.c.observable mode of behavior.d.well defined process.Answer:c6.Attributes cannot be defined for a class until design has been completed.a.True b.False Answer:b7.Operations are object procedures that are invoked when an object receives a message.True FalseAnswer:a8.UML activity diagrams are useful in representing which analysis model elements?a.Behavioral elements b.Class-based elements c.Flow-based elements d.Scenario-based elements Answer:d 2010 Sichuan University All rights reserved.|Confidential28Exercise9.Which of the following should be considered as candidate objects in a problem space?a.events b.people c.structure d.all of the above Answer:d10.In a few sentences,try to describe the primary differences between structured analysis and object-oriented analysis.Answer:Structured analysis begins with a consideration of the data objects that the system must manipulate.In structured analysis the data objects are described with a data dictionary and the entity relation diagram(ERD)depicts relationships between data objects.The flow and transformation of data through a system are represented using the data flow diagram(DFD).The structured analysis also incorporates a behavioral modeling notation called the state transition diagram(STD).In the object oriented analysis model,class-based elements model the objects that the system will manipulate,the operations that will be applied to the objects to effect the manipulation,relationships(some hierarchical)between the objects,and the collaborations that occur between the classes that are defined.In addition the OO model represents the behavior of objects and the behavior of the system as a whole.2010 Sichuan University All rights reserved.|Confidential29Chapter 8 Design Engineeringn Design within the context of software engineeringn Design Process and Design Qualityn Design Conceptsn Design Modeln Data Design Elementsn Architectural Design Elementsn Interface Design Elementsn Component-level Design Elementsn Deployment-level Design Elementsn Pattern-based Software DesignContent 2010 Sichuan University All rights reserved.|Confidential30Exercise1.Which of the following are areas of concern in the design model?Answer:e a.architectureb.datac.interfaced.project scopee.a,b and c2.Which of these are characteristics of a good design?Answer:e a.exhibits strong coupling between its modules1.implements all requirements in the analysis model2.includes test cases for all components3.provides a complete picture of the software4.both b and da.Information hiding makes program maintenance easier by hiding data and procedure from unaffected parts of the program.Answer:aa.Trueb.False1.Cohesion is a qualitative indication of the degre
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 管理文书 > 施工组织


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!