QB Blooms
QB Blooms
QUESTION BANK
V SEMESTER
191AIE504T – SOFTWARE ENGINEERING
Regulation – 2019
Academic Year 2023 – 2024 ODD
Prepared by
Mrs.K.P. REVATHI,
Assistant Professor/AI&DS
EASWARI ENGINEERING COLLEGE
UNIT I - INTRODUCTION
Software engineering concepts – Development activities – Software lifecycle models - Classical waterfall –
Iterative waterfall – Prototyping – Evolutionary - Spiral – Software project management – Project planning
Estimation –Scheduling–Risk management–Software configuration management.
PART-A (2 - MARKS)
Q. No QUESTIONS Competence BT Level
1. Write the IEEE definition of software engineering. Remember BTL-1
Demonstrate your understanding of umbrella activities of a
2. Apply BTL-3
Software process.
If you have to develop a word processing software product, what
3. Apply BTL-3
process model will you choose? Justify your answer and examine.
4. Differentiate verification and validation. Give an example. Understand BTL-2
List the characteristics of software contrasting it with characteristics of
5. Remember BTL-1
hardware.
6. Explain How do we create a process that can manage unpredictability? Evaluate BTL-5
List out the goals of software engineering
7. Remember BTL-1
8. Is it possible to realize spiral model for software. analyse Analyze BTL-4
9. Summarize the pros and cons of iterative software development model. Evaluate BTL-5
10. State evolutionary prototype. Remember BTL-1
List two deficiencies in waterfall model. Which process model do you
11. Remember BTL-1
suggest to overcome each deficiency
12. Compare perspective and specialized process model. Analyze BTL-4
13. What is software process? Understand BTL-2
14. Discuss about the various drawbacks of spiral model Understand BTL-2
15. Generalize on any two characteristics of software as a product. Create BTL-6
17. Suggest a model to be used when enough staffing is unavailable and why? Analyze BTL-4
18. What are the processes of risk management? Create BTL-6
19. List out the various steps in planning process Understand BTL-2
Distinguish between “Known risks” and “predictable risks”.
20. Remember BTL-1
10 (13)
Apply BTL-3
11 Draw an ER and DFD diagram for university information System. (13)
Apply BTL-3
12 (i) Explain the feasibility studies. What are the outcomes? Does it have (7)
either implicit or explicit Analyze BTL-4
effects on software requirement collection?
(ii) What is the prototyping technique? How prototype models are (6)
prepared for a software process?
Discuss.
13 What is the use of context diagram? Draw a Level-1 DFD and STD for (8)
photocopier software. Apply BTL-3
PART-C (15 -MARKS)
Develop an online railway reservation system, which allows the user to
select route, book/cancel tickets using net banking/credit/debit cards.
1. The site also maintains the history of the passengers. For the above (15) Create BTL-6
system, list and draw the use case scenario and model the above
specification.
2. Assess on software requirement specification for banking system. (15) Evaluate BTL-5
Draw and Explain the use case diagram for an ATM system in
3. (15) Evaluate BTL-5
requirement elicitation.
Develop the process of ordering a pizza over the phone. Draw the use
case diagram and also sketch the activity diagram representing each step
of the process, from the moment you pick up the phone to the point
BTL-6
4. where you start eating the pizza. Include activities that others need to (15) Create
perform. Add exception handling to the activity diagram you developed.
Consider at least two exceptions (e.g. delivery person wrote down
wrong address, deliver person brings wrong pizza).
5.
BTL-6
(15) Create
6.
BTL-6
(15) Create
4. Rewrite the concept of OCP in your own words. Why is it important to (15) Create
create abstraction that serve as an interface between components? BTL-6
UNIT IV- TESTING AND MAINTENANCE
Software testing fundamentals-Internal and external views of Testing-white box testing – basis path testing-
control structure testing-black box testing- Regression Testing – Unit Testing – Integration Testing – Validation
Testing – System Testing And Debugging –Software Implementation Techniques: Coding practices-Refactoring-
Maintenance and Reengineering-BPR model-Reengineering process model-Reverse and Forward Engineering.
PART-A (2 -MARKS)
Describe the objectives of testing. What is "cyclomatic complexity”?
1.
Point out its primary use. Remember BTL-1
Analyze on what is a "good" test and List two principles of good
2.
design. Analyze BTL-4
Differentiate verification and validation. Which type of testing address
3.
verification? Which type of testing address validation? Understand BTL-2
Identify What methods are used for breaking very long expression and
4.
statement. Remember BTL-1
What is flow graph notation and show how it is important in white box
5.
testing? Remember BTL-1
6. Measure the performance of equivalence partitioning. Evaluate BTL-5
7. What is controllability in testing? Remember BTL-1
8. Point out the purpose of stud and driver used for testing. Analyze BTL-4
9. What are the generic characteristics of software testing? Remember BTL-1
10. Summarize various testing strategies for conventional software? Understand BTL-2
Examine how the software Testing results related to the reliability of
11.
the software. Remember BTL-1
Between "statement coverage and Branch Coverage”, Examine which
12.
is a stronger criteria? Why? Apply BTL-3
Identify and analyze the type of maintenance for each of the following:
13. a) Correcting the software faults.
b) Adapting the change in environment. Apply BTL-4
Give the testing principles the software engineer must apply while
14.
performing the software testing. Understand BTL-2
15. Generalize your opinion about Smoke Testing. Create BTL-6
16. Classify the Reverse Engineering process. Apply BTL-3
17. Show your understanding on maintainability. Apply BTL-3
Generalize on What options exist when we are faced with a poorly
18.
designed and implemented program? Create BTL-6
19. Give the software reengineering activities. Understand BTL-2
20. Assess on BPR model with neat diagram. Evaluate BTL-5
PART-B (13- MARKS )
Describe the type’s basic path testing given.
1. (i)Flow graph notation. (7) Remember BTL-1
(ii) Independent program paths. (6)
What is black box testing? Explain the different types of black box
2. (13)
testing strategies. Explain by considering suitable examples. Analyze BTL-4
(i) Write elaborately on unit testing. How do you develop test suites.
(7)
3. (ii) Explain how to broaden testing coverage and improve the quality
(6)
of white box-testing. Remember BTL-1
(i) What is cyclomatic complexity and what are the ways to compute it? (5)
4. (ii) Give the steps to select the path in data flow testing. (4)
(iii) Explain how the various types of loops are tested. (4) Understand BTL-2
(i) Describe in detail about software testing strategies. (7)
5.
(ii) Explain in detail about any one control structure testing. (6) Remember BTL-1
(i) Summarize on Top-down Integration testing and Bottom -up (7)
6. integration testing .
(ii) Describe business process reengineering. (6) Understand BTL-2
(i) How would you apply your understanding about (7)
7. Software implementation techniques.
(ii) What is refactoring? when is it needed? Explain with an example. (6) Apply BTL-3
(i) Analyze on equivalence partitioning. List rules used to define valid (7)
and invalid equivalence classes. explain the technique using examples.
8. Analyze BTL-4
(ii) What is boundary value analysis? Explain the technique specifying
rules and its usage with the help of an example. (6)
(i) What conclusions can you draw from regression testing? Support
(7)
your answer with a neat sketch.
(ii)explain the list given below
9. (6) Evaluate BTL-5
(a) Reverse Engineering to Understand Data.
(b) Reverse Engineering to Understand Processing.
(c) Reverse Engineering User Interfaces.
Write a generalize concept on the following system testing
10. (i) Recovery testing and Security testing. (7) Create BTL-6
(iii) Orthogonal array testing and Graph-based testing. (6)
(i) Describe in detail about BPR model with a neat diagram. (7)
11. Remember BTL-1
(ii) Explain Forward Engineering in detail. (6)
Apprise and analyze the purpose of system testing with a high level
12. (13) Analyze BTL-4
explanation on all its types.
(i) What is the purpose of software reengineering? Explain with a neat (7)
13. diagram. Understand BTL-2
(ii) Summarize the activities involved in software reengineering. (6)
(i) Illustrate in detail about Reverse engineering process. (7)
14. Apply BTL-3
(iii) Explain Forward Engineering for Client-Server Architectures. (6)
PART-C (15-MARKS)
Consider the following program segment.
/*num is the number of function searches in a presorted integer array
arr*/
int bin_search(int num)
{
int min , max; min=0; max=100;
while(min!=max) {
if(arr[(min+max)/2]>num)
max=(min+max)/2;
else if(arr[(min+max)/2]
1. (15) Evaluate BTL-5
min=(min+max)/2;
else return((min+max)/2);
}
return(-1);
}
(i)Draw the control flow graph for this program segment.
(ii)Define cyclomatic complexity.
(iii)Determine the cyclomatic complexity for this program.(Show the
intermediate steps in your computation. writing only the final result is
not sufficient)
Consider the pseudocode for simple subtraction given below:
Program ‘Simple Subtraction’
Input (x,y)
Output(y)
If x> y then DO
x-y=z
2. (15) Evaluate BTL-5
else y-x=z
endif
output(z)
output ‘End Program’
perform the basic path testin and generate test cases .Explain black box
and white box testing.
Given a set of numbers 'n' ,the function findprime(a[],n) prints a number
if it is a prime number. Draw a control flow graph, calculate the
cyclomatic complexity and enumerate all paths. State how many test
3. (15)
cases are needed to adequately cover the code in terms of branches, Create BTL-6
decisions and statement? Develop the necessary test cases using sample
values for 'a' and 'n'.
4. Generalize on forward and reverse engineering process in detail. (15) Create BTL-6
UNIT V-PROJECT MANAGEMENT
Software Project Management: Estimation – LOC, FP Based Estimation, Make/Buy Decision COCOMO I & II
Model – Project Scheduling – Scheduling, Earned Value Analysis Planning – Project Plan, Planning Process, RFP
Risk Management – Identification, Projection – Risk Management-Risk Identification-RMMM Plan-CASE
TOOLS
PART-A (2 -MARKS)
1. Define risk. What are its type? Give an example. Remember BTL-1
2. What is version control? Analyze BTL-1
Organic software occupies 15,000 LOC. Assess how many
3. Evaluate BTL-5
programmers are needed to complete.
4. Analyze on how are the software risks assessed. Analyze BTL-4
5. List out the principles of project scheduling. Remember BTL-1
Discuss is there a systematic way to sort through the options associated
6. Understand BTL-2
with the make/buy decision?
7. Give the purpose of LOC based estimation. Understand BTL-2
8. Compare size oriented and function oriented metrics. Evaluate BTL-5
9. Predict on what is RFP risk Management. Understand BTL-2
10. Examine ZIPF's law. Remember BTL-1
11. Describe Earned Value Analysis. Remember BTL-1
12. Give some steps in project planning. Understand BTL-2
13. Relate task set and network. Apply BTL-3
14. Generalize on how productivity and cost related to function points. Create BTL-6
15. List the two character tics of software risk. Remember BTL-1
16. What are predictable risk? Classify some categories of predictable risk. Analyze BTL-4
17. What do you infer from RMMM? Analyze BTL-4
18. Write a note on Risk Information Sheet(RIS). Apply BTL-3
19. Show the basic principles that guide software project scheduling. Apply BTL-3
20. Generalize on the concept of project metrics. Create BTL-6
PART-B(13 MARKS )
(i) Examine the activities associated with project process planning. (7)
1.
(ii)Write short notes on earned value analysis for project tracking. (6) Remember BTL-1
(i) What elements used in COCOMO II model?
(7)
2. (ii) Explain in detail about the COCOMO II model for software Analyze BTL-4
(6)
estimation.
How do you compute Earned Value Analysis and use it to assess BTL-5
3. (13) Create
progress.
Develop a program for sorting of n numbers. Draw the flow chart, Flow
4. (13) Evaluate BTL-6
graph, find out the cyclomatic complexity.(MAKE AND BUY)
(i) Summarize on purpose of Delphi method .state advantages and (5)
disadvantages of the method.
5. Understand BTL-2
(ii) Discuss the steps involved in project planning. (4)
(iii)State ZIPF's law. (4)
Demonstrate on the following list given below
6. (i) Function Point estimation. (7) Apply BTL-3
(ii) LOC based estimation. (6)
Describe in detail about the following scheduling
(i) Timeline charts. (5)
7. Remember BTL-1
(ii) Tracking the schedule. (4)
(iii) Tracking progress for an OO project. (4)
(i) Explain in detail about risk identification. (7)
8.
(ii) Analyze on the concept of risk Projection. (6) Analyze BTL-4
(i) Discuss about risk management in a software development life cycle. (7)
9.
(ii) Discuss on the concept of RMMM. (6) Understand BTL-2
Discuss the process of functional point analysis. Explain the function (7)
point analysis with sample cases for components of different
10.
complexity.
(ii) Describe a task set for the software project. (6) Remember BTL-1
(i) Explain in detail COCOMO model for software cost estimation.
(7)
11. (ii) if a team A found 342 errors prior to release of software and team
(6)
B found 182 errors .what additional measures and metrics are needed Analyze BTL-4
to
find out if the teams have removed the errors effectively? Analyze.
Apply COCOMO-II model to estimate total time and effort required to
(7)
develop a software of KLOC 230.
12.
(ii) Outline the importance of "project scheduling and use of Gantt
(6)
charts". Apply BTL-3
Consider the following Function point components and their
complexity. If the total degree of influences is 52, Predict the estimated
function points.
Function type Estimated count complexity
13. ELF 2 7 (13) Understand BTL-2
ILF 4 10
EQ 22 4
EO 16 5
EI 24 4
(i) Describe in detail about Process Metrics. (7)
14. Remember BTL-1
(ii) How should we use metrics during the project itself? (6)
PART-C(15 MARKS)
Compute and prepare function point value for a project with the
following information domain characteristics.
No. of external inputs-30
No.of external outputs - 52
1. No. of external inquiries-22 (15) Create BTL-6
No. of logical files-12
No. of external interface files-2
Assume complexity adjustment values for the above are average
(4,5,4,10,7 respectively).
Prepare RIS Sheets for any two risk associated with “Automated
2. (15) Create BTL-6
Airline controller" software.
Explain in detail about COCOMO model for software cost estimation.
Use it to estimate the effort required to build software for a simple ATM
3. that produces 12 screens, 10 reports and has 80 software components. (15) Evaluate BTL-5
Assume average complexity and average developer maturity .Use
application composition model with object points.
Suppose you have a budget cost of a project as Rs.9, 00,000.The project
is to be completed in 9 months. After a month, you have completed 10
percent of the project at a total expense of Rs.1, 00,000.The planned
4. (15) Evaluate BTL-5
completion should have been 15 percent .you need to evaluate whether
the project is on-time and on-budget? Use Earned Value analysis
approach and interpret.