Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
What do you mean by coupling and cohesion? Write down the relationship between them?
What do you mean by the term Software Requirement Specification (SRS)? Write down the components of it?
What are the benefits of using the waterfall model?
Define the term metric. What are the desirable attributes or characteristics of a metric?
Define the term software engineering. What is the basic requirement of a systematic approach to software development?
Which type of diagrams do you employ to track the progress in a project?
Do you know what a baseline is in configuration management? How do you freeze a significant moment in the project?
Can you give reasons why maintenance of software is the biggest or most costly part of an application's life cycle?
Do you know the difference between the functional testing and exploratory testing? How would you test a website?
What is the last thing you learned regarding algorithms from a book, magazine or the web site?
Can you describe what Test-Driven Development is? Can you name some of the principles of Extreme Programming?
Do you know regarding design patterns? Which design patterns have you used and in what conditions?
What are the metaphors employed for in functional design? Can you name some successful illustrations?
Can you name a number of various methods for specifying the requirements?
Name the 3 major approaches to dealing with possible threats, when planning with partially instantiated operators. Describe what is “back-jumping” and “dependency-directed backtracki
IPSec uses two protocols for security: Authentication protocol (AH) and the Encapsulated Security Header Protocol (ESP). Why is AH used with ESP although ESP provides some authentication?
What is the major weakness of key distribution using KDC? List 2 ways how this can be overcome. Provide two examples of modern block cipher other than DES.
Describe two limitations of steganography. Describe the operation of Trojan horse program. How can we protect our computer from such a program?
What could be the consequences if there is mismatch between the business process model and the software or system design?
Describe in detail regarding the software Maintenance.
Describe iterative waterfall and spiral model for software life cycle and different activities in each and every phase.
Describe the integration testing. Write down all the steps for top-down integration and bottom-up integration? Compare and contrast the top-down and bottom-up integration testing?
What are the characteristics of good design? Explain different kinds of coupling and cohesion. How design evaluation is functioned?
Describe in detail the Requirement Engineering Process. What is the main difference between user requirements and system requirements?
What is the main criterion for deciding whether (or) not to use waterfall model in software development project? Describe. How do we define software engineering? Describe.