0% found this document useful (0 votes)
49 views13 pages

QB Blooms

This document contains the question bank for the subject 191AIE504T - Software Engineering for the 5th semester. It is divided into three parts - Part A contains 2 mark questions, Part B contains 13 mark questions, and Part C contains 15 mark questions. The question bank covers various topics related to software engineering such as software lifecycle models, requirement analysis and specification, formal system specification techniques like finite state machines and Petri nets, object modeling using UML diagrams, and functional modeling techniques like data flow diagrams.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views13 pages

QB Blooms

This document contains the question bank for the subject 191AIE504T - Software Engineering for the 5th semester. It is divided into three parts - Part A contains 2 mark questions, Part B contains 13 mark questions, and Part C contains 15 mark questions. The question bank covers various topics related to software engineering such as software lifecycle models, requirement analysis and specification, formal system specification techniques like finite state machines and Petri nets, object modeling using UML diagrams, and functional modeling techniques like data flow diagrams.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

EASWARI ENGINEERING COLLEGE

DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA


SCIENCE

QUESTION BANK

V SEMESTER
191AIE504T – SOFTWARE ENGINEERING
Regulation – 2019
Academic Year 2023 – 2024 ODD

Prepared by
Mrs.K.P. REVATHI,
Assistant Professor/AI&DS
EASWARI ENGINEERING COLLEGE

DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE


QUESTION BANK

SUBJECT : 191AIE504T – SOFTWARE ENGINEERING


SEM / YEAR: V / III

UNIT I - INTRODUCTION
Software engineering concepts – Development activities – Software lifecycle models - Classical waterfall –
Iterative waterfall – Prototyping – Evolutionary - Spiral – Software project management – Project planning
Estimation –Scheduling–Risk management–Software configuration management.
PART-A (2 - MARKS)
Q. No QUESTIONS Competence BT Level
1. Write the IEEE definition of software engineering. Remember BTL-1
Demonstrate your understanding of umbrella activities of a
2. Apply BTL-3
Software process.
If you have to develop a word processing software product, what
3. Apply BTL-3
process model will you choose? Justify your answer and examine.
4. Differentiate verification and validation. Give an example. Understand BTL-2
List the characteristics of software contrasting it with characteristics of
5. Remember BTL-1
hardware.
6. Explain How do we create a process that can manage unpredictability? Evaluate BTL-5
List out the goals of software engineering
7. Remember BTL-1
8. Is it possible to realize spiral model for software. analyse Analyze BTL-4
9. Summarize the pros and cons of iterative software development model. Evaluate BTL-5
10. State evolutionary prototype. Remember BTL-1
List two deficiencies in waterfall model. Which process model do you
11. Remember BTL-1
suggest to overcome each deficiency
12. Compare perspective and specialized process model. Analyze BTL-4
13. What is software process? Understand BTL-2
14. Discuss about the various drawbacks of spiral model Understand BTL-2
15. Generalize on any two characteristics of software as a product. Create BTL-6

If you have to develop a word processing software product, what process


16. model will you choose? Justify your answer. Apply BTL-3

17. Suggest a model to be used when enough staffing is unavailable and why? Analyze BTL-4
18. What are the processes of risk management? Create BTL-6
19. List out the various steps in planning process Understand BTL-2
Distinguish between “Known risks” and “predictable risks”.
20. Remember BTL-1

PART-B (13- MARKS)


Define software life cycle. List all life cycle models and explain spiral
1. (13) Remember BTL-1
model with a neat diagram.
Explain alteast one scenario where
a) Evolutionary model would be applicable and not the waterfall (7)
2. model. Analyze BTL-4
b) waterfall model is preferable compare to all other models. (6)
3. (i) Compare the life cycle models based on their distinguishing factors,
(7)
strengths and weaknesses.
Analyze BTL-4
(ii) Discuss the prototyping model .what is the effect of designing
(6)
prototype on the overall cost of the software project?
(i) Explain in detail about iterative and waterfall model. (7)
4. Analyze BTL-4
(ii) Write short notes on Prototyping models. (6)
5. (i) Compare and contrast waterfall model, spiral model and iterative
(7)
model. Understand BTL-2
(6)
(ii) What is the significance of the spiral model when compared
with other model?
6 (i) Summarize in detail about Risk Management.
(5) Analyze BTL-4
(ii) Elaborate on how LOC and FP can be used in project estimation.
(8)
7 (i) What is the impact of reusability in software development process?
(4) Remember BTL-1
(ii) Explain the component based software development model with a
neat sketch (9)
8 Which process model would you choose to manufacture a car? Explain
(13) Analyze BTL-4
the same
9 What are the pros and cons of using mathematical approach for software (13)
Remember BTL-1
development?
10 Explain in detail about Software configuration management (13)
Analyze BTL-4

PART-C (15- MARK )


Generalize about system engineering hierarchy with suitable diagram
1. and give an overview of the Business process Engineering with a (15) Create BTL-6
diagram.
Compare the following life cycle models based on their distinguishing
2. (15) Evaluate BTL-5
factors, strengths and weakness-waterfall model, AD model, Spiral
Model, and Formal Methods Model.(Present in the form of table only-
use diagrams wherever necessary).
Explain about the umbrella activities which support software
development process and discuss about their necessity in maintaining
3. (15) Evaluate BTL-5
the quality in both software process and product that is being developed
for railway reservation system.
Assume that you are the technical manager of a software development
organization. A Client approached you for a software solution the
problems stated by the client have uncertainties which lead to loss if it
4. (15) Evaluate BTL-5
not planned and solved which software development model you will
suggest for this project –justify. Explain that model With its pros and
cons and neat sketch.
UNIT II- SOFTWARE REQUIREMENT SPECIFICATION
Requirement analysis and specification – Requirements gathering and analysis – Software Requirement
Specification – Formal system specification – Finite State Machines – Petri nets – Object modelling using UML –
Use case Model–Class diagrams – Interaction diagrams–Activity diagrams–State chart diagrams –Functional
modelling–Data Flow Diagram..
PART-A (2 - MARKS)
Q.No QUESTIONS BT Level Competence
Give a use case diagram for an online shopping which should provide
1. provisions for registering authenticating the customers and also online
Understand BTL-2
payment through any payment gateway like PayPal.
2. Define feasibility study. And list the types. Remember BTL-1
3. List out the characteristics of good SRS. Apply BTL-3
Draw and explain a simple semantic data model for a library
4.
Management system Analyze BTL-4
List the characteristics of a good system requirements
5. Remember BTL-1
specification(SRS)
6. Define Quality Function Development(QFD) Remember BTL-1
7. How requirements are classified? List them with an example for each. Apply BTL-3
8. Develop the spiral view of requirement engineering process. Create BTL-6
9. Differentiate between normal and exciting requirement. Understand BTL-2
Point out the problems faced when user requirements are written in
10. Analyze BTL-4
natural language.
Distinguish between the terms inception, elicitation and elaboration
11. Understand BTL-2
with reference to requirements.
Define Petri Net and list types of traceability in a software process.
12. Remember BTL-1
13. Define a component. Give example.
Remember BTL-1
Depict the relationship between work product, task, activity and system.
14. Understand BTL-2
Identify the notations for requirements specification.
15. Evaluate BTL-5
16. Short notes on Interaction diagrams. Remember BTL-1
17. Define Functional modelling Remember BTL-1
18. What are the Components of an Activity Diagram Remember BTL-1
19. List the Steps to draw a state diagram Evaluate BTL-5
20. How will you represent DFD. Give example. Evaluate BTL-5

PART-B (13- MARK )


(i) Describe how Software requirements are documented. State the (7)
1. importance of documentation. Understand BTL-2
(6)
(ii) Give the steps involved in initiating requirements engineering.
2 (i) List and explain the Three aspects that SRS should clearly
(7)
document.
Remember BTL-1
(ii) List the characteristics of good SRS document and their
(6)
components.
(iii)Demonstrate the structure of requirement document. (7)
3 Apply BTL-3
(iv)Show the possible users of requirement document. (6)
4 Explain the different ways of writing a system requirement
(7)
specification. Remember BTL-1
(6)
Describe the spiral view of system requirement.
Analyze about the requirement engineering process and how the
5 (13) Analyze BTL-4
requirements are managed.
(i) Discuss about the requirement management planning. (7)
6 Understand BTL-2
(ii) Describe about the requirement change management. (6)
(i) Analyze briefly about the structural system analysis in detail. (7)
7 Analyze BTL-4
(ii) Explain about classical perti nets model. (6)
8 (i) What is the purpose of data flow diagrams? What are the notations (7)
used for the same? Analyze BTL-4
(ii) Explain by constructing a context flow diagram level-0 DFD and (6)
9 Draw a Petri Net that depicts the operation of an “Automated Teller (13)
Apply BTL-3
Machine”,State the functional requirements you are considering.

10 (13)
Apply BTL-3
11 Draw an ER and DFD diagram for university information System. (13)
Apply BTL-3
12 (i) Explain the feasibility studies. What are the outcomes? Does it have (7)
either implicit or explicit Analyze BTL-4
effects on software requirement collection?
(ii) What is the prototyping technique? How prototype models are (6)
prepared for a software process?
Discuss.
13 What is the use of context diagram? Draw a Level-1 DFD and STD for (8)
photocopier software. Apply BTL-3
PART-C (15 -MARKS)
Develop an online railway reservation system, which allows the user to
select route, book/cancel tickets using net banking/credit/debit cards.
1. The site also maintains the history of the passengers. For the above (15) Create BTL-6
system, list and draw the use case scenario and model the above
specification.
2. Assess on software requirement specification for banking system. (15) Evaluate BTL-5
Draw and Explain the use case diagram for an ATM system in
3. (15) Evaluate BTL-5
requirement elicitation.
Develop the process of ordering a pizza over the phone. Draw the use
case diagram and also sketch the activity diagram representing each step
of the process, from the moment you pick up the phone to the point
BTL-6
4. where you start eating the pizza. Include activities that others need to (15) Create
perform. Add exception handling to the activity diagram you developed.
Consider at least two exceptions (e.g. delivery person wrote down
wrong address, deliver person brings wrong pizza).
5.

BTL-6
(15) Create
6.

BTL-6
(15) Create

UNIT III- SOFTWARE DESIGN


Design process – Design Concepts-Design Model– Design Heuristic – Architectural Design -Architectural styles,
Architectural Design, Architectural Mapping using Data Flow- User Interface Design: Interface analysis,
Interface Design –Component level Design: Designing Class based components, traditional Components.
PART-A (2 - MARKS)
1. What do you interpret from design heuristics? Understand BTL-2
2. List two principles of good design. Remember BTL-1
3. What do you infer from the design quality attributes ‘FURPS’? Analyze BTL-4
4. Draw the context flow graph of an ATM automation system. Remember BTL-1
5. 'A system must be loosely coupled and highly cohesive’. Justify. Evaluate BTL-5
6. Define Modularity. Remember BTL-1
7. Give the various types of architectural styles with example. Understand BTL-2
8. What is coupling and list the various types of coupling? Remember BTL-1
How do you apply modularization criteria for monolithic software?
9. Understand BTL-2
Discuss.
10. Define mapping. Remember BTL-1
Analyze an UI design pattern are used for the following.
i) Page layout
11. ii) Tables Analyze BTL-4
iii) Navigation through menus and webpages
iv) Shopping cart.
12. Distinguish between transform flow and transaction flow. Understand BTL-2
13. List the basic design principles of class based component. Remember BTL-1
Point out the steps that are applied to develop a decision table in tabular
14. Analyze BTL-4
design notation.
Classify the four distinct frame work activity in the user interface
15. Apply BTL-3
analysis and design process.
16. Design the architectural context diagram. Create BTL-6
In case of user interface analysis, assess the steps that are taken for
17. Evaluate BTL-5
understanding the problems.
18. Classify the user interface design steps. Apply BTL-3
Show the facilities to be provided in a system to recover users from the
19. Apply BTL-3
mistakes.
20. Generalize on the concept of user interface design pattern. Create BTL-6

PART-B (13- MARKS )


Explain the following list of design concept
(i) Abstraction and Modularity (5)
1. Remember BTL-1
(ii) Patterns (4)
(iii) Functional independence (4)
Explain about software architecture design, with emphasize as fan in, (13) Evaluate BTL-5
2. fan-out, coupling, cohesion and factoring.
Analyze your understanding on the following design models
(i) Data design elements and Architectural design elements. (5)
3. Analyze BTL-4
(ii) Interface design elements and Component-level design elements. (4)
(iii) Deployment-level design elements. (4)
(i) Demonstrate in detail about architectural design. (7)
4. Apply BTL-3
(ii) Illustrate in detail about any four architectural styles. (6)
(i) Give the steps involved in transform mapping. (7)
5. Understand BTL-2
(ii) Discuss transform mapping with example. (6)
(i) List the steps involved in transaction mapping. (7)
6. Remember BTL-1
(ii) Describe transaction mapping with example. (6)
(i) Discuss the basic design principles of class based components. (7)
7. Remember BTL-2
(ii) Discuss the component-level design guidelines. (6)
Describe the various coupling and cohesion methods used in software
8. (13) Understand BTL-2
design.
Examine Architectural Styles.
(i) Data centered Architecture and Data Flow Architecture. (5)
9. Apply BTL-3
(ii) Call and Return Architecture and Object Oriented Architecture. (4)
(iii) Layered Architecture. (4)
(i) Analyze on the concept of graphical design notation. (7)
Analyze BTL-4
10. (ii) Explain Tabular Design Notation. (6)
i) Describe about user interface analysis in detail. (7)
11. Remember BTL-1
ii) Explain the general model of a real time system. (6)
(i) Generalize on the concept of user interface design and list the (7)
12. characteristics of a good user interface design Create BTL-6
(ii) Develop the design issues in interface design. (6)
(i) Analyze about program design language in designing conventional (7)
13. components. Analyze BTL-4
(ii) Classify and explain the various architectural styles in detail. (6)
i) What are? Describe how UID may be developed for a data acquition (7)
14. system. Remember BTL-1
ii) Discuss the design heuristics for effective modularity design. (6)
PART-C(15 -MARKS)
Model a Dataflow diagram for a "Library Management System". State
1. (15)
and explain the functional requirements you are considering. Evaluate BTL-5
What is the purpose of DFD ?what are the components of DFD? Design
DFD for the following system:
2. An on-line shopping system for XYZ provides many services and (15) Create BTL-6
benefits to its members and staffs. Currently ,XYZ staffs manually
handle the purchasing information with the use of basic office software,
such ass Microsoft office word and excel.it may results in having
mistakes easily and the process is very inconvenient .XYZ needs an
online shopping system at their intranet based on the requirement of
users. XYZ online shopping system has 5 key features:
i) to provide the user friendly online shopping cart function to members
to replace hardcopy ordering form.
ii)o store inventory and sales information in data base to reduce the
human mistakes, increase accuracy and enhance the flexibility of
information processing.
iii) to provide an efficient inventory system which can help the XYZ
staffs to gain enough information to update the inventory.
iv) to able to print invoice to members and print a set of summary
reports for XYZ internal usage.
v) to design the system that is easy to maintain the upgrade.
Summarize on the Hierarchical concept of user interface design and
3. (15)
Draw the swim lane diagram for prescription refill function. Evaluate BTL-5

4. Rewrite the concept of OCP in your own words. Why is it important to (15) Create
create abstraction that serve as an interface between components? BTL-6
UNIT IV- TESTING AND MAINTENANCE
Software testing fundamentals-Internal and external views of Testing-white box testing – basis path testing-
control structure testing-black box testing- Regression Testing – Unit Testing – Integration Testing – Validation
Testing – System Testing And Debugging –Software Implementation Techniques: Coding practices-Refactoring-
Maintenance and Reengineering-BPR model-Reengineering process model-Reverse and Forward Engineering.
PART-A (2 -MARKS)
Describe the objectives of testing. What is "cyclomatic complexity”?
1.
Point out its primary use. Remember BTL-1
Analyze on what is a "good" test and List two principles of good
2.
design. Analyze BTL-4
Differentiate verification and validation. Which type of testing address
3.
verification? Which type of testing address validation? Understand BTL-2
Identify What methods are used for breaking very long expression and
4.
statement. Remember BTL-1
What is flow graph notation and show how it is important in white box
5.
testing? Remember BTL-1
6. Measure the performance of equivalence partitioning. Evaluate BTL-5
7. What is controllability in testing? Remember BTL-1
8. Point out the purpose of stud and driver used for testing. Analyze BTL-4
9. What are the generic characteristics of software testing? Remember BTL-1
10. Summarize various testing strategies for conventional software? Understand BTL-2
Examine how the software Testing results related to the reliability of
11.
the software. Remember BTL-1
Between "statement coverage and Branch Coverage”, Examine which
12.
is a stronger criteria? Why? Apply BTL-3
Identify and analyze the type of maintenance for each of the following:
13. a) Correcting the software faults.
b) Adapting the change in environment. Apply BTL-4
Give the testing principles the software engineer must apply while
14.
performing the software testing. Understand BTL-2
15. Generalize your opinion about Smoke Testing. Create BTL-6
16. Classify the Reverse Engineering process. Apply BTL-3
17. Show your understanding on maintainability. Apply BTL-3
Generalize on What options exist when we are faced with a poorly
18.
designed and implemented program? Create BTL-6
19. Give the software reengineering activities. Understand BTL-2
20. Assess on BPR model with neat diagram. Evaluate BTL-5
PART-B (13- MARKS )
Describe the type’s basic path testing given.
1. (i)Flow graph notation. (7) Remember BTL-1
(ii) Independent program paths. (6)
What is black box testing? Explain the different types of black box
2. (13)
testing strategies. Explain by considering suitable examples. Analyze BTL-4
(i) Write elaborately on unit testing. How do you develop test suites.
(7)
3. (ii) Explain how to broaden testing coverage and improve the quality
(6)
of white box-testing. Remember BTL-1
(i) What is cyclomatic complexity and what are the ways to compute it? (5)
4. (ii) Give the steps to select the path in data flow testing. (4)
(iii) Explain how the various types of loops are tested. (4) Understand BTL-2
(i) Describe in detail about software testing strategies. (7)
5.
(ii) Explain in detail about any one control structure testing. (6) Remember BTL-1
(i) Summarize on Top-down Integration testing and Bottom -up (7)
6. integration testing .
(ii) Describe business process reengineering. (6) Understand BTL-2
(i) How would you apply your understanding about (7)
7. Software implementation techniques.
(ii) What is refactoring? when is it needed? Explain with an example. (6) Apply BTL-3
(i) Analyze on equivalence partitioning. List rules used to define valid (7)
and invalid equivalence classes. explain the technique using examples.
8. Analyze BTL-4
(ii) What is boundary value analysis? Explain the technique specifying
rules and its usage with the help of an example. (6)
(i) What conclusions can you draw from regression testing? Support
(7)
your answer with a neat sketch.
(ii)explain the list given below
9. (6) Evaluate BTL-5
(a) Reverse Engineering to Understand Data.
(b) Reverse Engineering to Understand Processing.
(c) Reverse Engineering User Interfaces.
Write a generalize concept on the following system testing
10. (i) Recovery testing and Security testing. (7) Create BTL-6
(iii) Orthogonal array testing and Graph-based testing. (6)
(i) Describe in detail about BPR model with a neat diagram. (7)
11. Remember BTL-1
(ii) Explain Forward Engineering in detail. (6)
Apprise and analyze the purpose of system testing with a high level
12. (13) Analyze BTL-4
explanation on all its types.
(i) What is the purpose of software reengineering? Explain with a neat (7)
13. diagram. Understand BTL-2
(ii) Summarize the activities involved in software reengineering. (6)
(i) Illustrate in detail about Reverse engineering process. (7)
14. Apply BTL-3
(iii) Explain Forward Engineering for Client-Server Architectures. (6)
PART-C (15-MARKS)
Consider the following program segment.
/*num is the number of function searches in a presorted integer array
arr*/
int bin_search(int num)
{
int min , max; min=0; max=100;
while(min!=max) {
if(arr[(min+max)/2]>num)
max=(min+max)/2;
else if(arr[(min+max)/2]
1. (15) Evaluate BTL-5
min=(min+max)/2;
else return((min+max)/2);
}
return(-1);
}
(i)Draw the control flow graph for this program segment.
(ii)Define cyclomatic complexity.
(iii)Determine the cyclomatic complexity for this program.(Show the
intermediate steps in your computation. writing only the final result is
not sufficient)
Consider the pseudocode for simple subtraction given below:
Program ‘Simple Subtraction’
Input (x,y)
Output(y)
If x> y then DO
x-y=z
2. (15) Evaluate BTL-5
else y-x=z
endif
output(z)
output ‘End Program’
perform the basic path testin and generate test cases .Explain black box
and white box testing.
Given a set of numbers 'n' ,the function findprime(a[],n) prints a number
if it is a prime number. Draw a control flow graph, calculate the
cyclomatic complexity and enumerate all paths. State how many test
3. (15)
cases are needed to adequately cover the code in terms of branches, Create BTL-6
decisions and statement? Develop the necessary test cases using sample
values for 'a' and 'n'.
4. Generalize on forward and reverse engineering process in detail. (15) Create BTL-6
UNIT V-PROJECT MANAGEMENT
Software Project Management: Estimation – LOC, FP Based Estimation, Make/Buy Decision COCOMO I & II
Model – Project Scheduling – Scheduling, Earned Value Analysis Planning – Project Plan, Planning Process, RFP
Risk Management – Identification, Projection – Risk Management-Risk Identification-RMMM Plan-CASE
TOOLS
PART-A (2 -MARKS)
1. Define risk. What are its type? Give an example. Remember BTL-1
2. What is version control? Analyze BTL-1
Organic software occupies 15,000 LOC. Assess how many
3. Evaluate BTL-5
programmers are needed to complete.
4. Analyze on how are the software risks assessed. Analyze BTL-4
5. List out the principles of project scheduling. Remember BTL-1
Discuss is there a systematic way to sort through the options associated
6. Understand BTL-2
with the make/buy decision?
7. Give the purpose of LOC based estimation. Understand BTL-2
8. Compare size oriented and function oriented metrics. Evaluate BTL-5
9. Predict on what is RFP risk Management. Understand BTL-2
10. Examine ZIPF's law. Remember BTL-1
11. Describe Earned Value Analysis. Remember BTL-1
12. Give some steps in project planning. Understand BTL-2
13. Relate task set and network. Apply BTL-3
14. Generalize on how productivity and cost related to function points. Create BTL-6
15. List the two character tics of software risk. Remember BTL-1
16. What are predictable risk? Classify some categories of predictable risk. Analyze BTL-4
17. What do you infer from RMMM? Analyze BTL-4
18. Write a note on Risk Information Sheet(RIS). Apply BTL-3
19. Show the basic principles that guide software project scheduling. Apply BTL-3
20. Generalize on the concept of project metrics. Create BTL-6
PART-B(13 MARKS )
(i) Examine the activities associated with project process planning. (7)
1.
(ii)Write short notes on earned value analysis for project tracking. (6) Remember BTL-1
(i) What elements used in COCOMO II model?
(7)
2. (ii) Explain in detail about the COCOMO II model for software Analyze BTL-4
(6)
estimation.
How do you compute Earned Value Analysis and use it to assess BTL-5
3. (13) Create
progress.
Develop a program for sorting of n numbers. Draw the flow chart, Flow
4. (13) Evaluate BTL-6
graph, find out the cyclomatic complexity.(MAKE AND BUY)
(i) Summarize on purpose of Delphi method .state advantages and (5)
disadvantages of the method.
5. Understand BTL-2
(ii) Discuss the steps involved in project planning. (4)
(iii)State ZIPF's law. (4)
Demonstrate on the following list given below
6. (i) Function Point estimation. (7) Apply BTL-3
(ii) LOC based estimation. (6)
Describe in detail about the following scheduling
(i) Timeline charts. (5)
7. Remember BTL-1
(ii) Tracking the schedule. (4)
(iii) Tracking progress for an OO project. (4)
(i) Explain in detail about risk identification. (7)
8.
(ii) Analyze on the concept of risk Projection. (6) Analyze BTL-4
(i) Discuss about risk management in a software development life cycle. (7)
9.
(ii) Discuss on the concept of RMMM. (6) Understand BTL-2
Discuss the process of functional point analysis. Explain the function (7)
point analysis with sample cases for components of different
10.
complexity.
(ii) Describe a task set for the software project. (6) Remember BTL-1
(i) Explain in detail COCOMO model for software cost estimation.
(7)
11. (ii) if a team A found 342 errors prior to release of software and team
(6)
B found 182 errors .what additional measures and metrics are needed Analyze BTL-4
to
find out if the teams have removed the errors effectively? Analyze.
Apply COCOMO-II model to estimate total time and effort required to
(7)
develop a software of KLOC 230.
12.
(ii) Outline the importance of "project scheduling and use of Gantt
(6)
charts". Apply BTL-3
Consider the following Function point components and their
complexity. If the total degree of influences is 52, Predict the estimated
function points.
Function type Estimated count complexity
13. ELF 2 7 (13) Understand BTL-2
ILF 4 10
EQ 22 4
EO 16 5
EI 24 4
(i) Describe in detail about Process Metrics. (7)
14. Remember BTL-1
(ii) How should we use metrics during the project itself? (6)
PART-C(15 MARKS)
Compute and prepare function point value for a project with the
following information domain characteristics.
No. of external inputs-30
No.of external outputs - 52
1. No. of external inquiries-22 (15) Create BTL-6
No. of logical files-12
No. of external interface files-2
Assume complexity adjustment values for the above are average
(4,5,4,10,7 respectively).
Prepare RIS Sheets for any two risk associated with “Automated
2. (15) Create BTL-6
Airline controller" software.
Explain in detail about COCOMO model for software cost estimation.
Use it to estimate the effort required to build software for a simple ATM
3. that produces 12 screens, 10 reports and has 80 software components. (15) Evaluate BTL-5
Assume average complexity and average developer maturity .Use
application composition model with object points.
Suppose you have a budget cost of a project as Rs.9, 00,000.The project
is to be completed in 9 months. After a month, you have completed 10
percent of the project at a total expense of Rs.1, 00,000.The planned
4. (15) Evaluate BTL-5
completion should have been 15 percent .you need to evaluate whether
the project is on-time and on-budget? Use Earned Value analysis
approach and interpret.

You might also like