Cs605 Collection of Old Papers
-
Upload
httpmajidvacom -
Category
Documents
-
view
346 -
download
6
description
Transcript of Cs605 Collection of Old Papers
http://vujannat.ning.com BEST SITE TO HELP STUDENTS
What is the objective of formal technical reviews conducted by software engineers? (Note: Your answer should not be more than three lines) What are the strengths and weaknesses in spiral model? (Note: Your answer should not be more than three lines) List the names of five Software Configuration Management tasks. What is meant by generic risks? (Note: Your answer should not be more than two lines) What is "time-boxing" as it relates to project scheduling? (Note: Your answer should not be more than three lines) List any five basic principles to make a realistic project schedule. What is defect removal efficiency? What is the formula to calculate it? --What is meant by software refactoring?
--What is a software configuration audit?
WW
W.vu
jann
at.n
ing.C
OM
FINALTERM EXAMINATION
Fall 2008
CS605- Software EngineeringII (Session - 1)
Ref No: 324799
Time: 120 min
Marks: 70
Student Info
StudentID:
Center: OPKST
ExamDate: 2/8/2009 12:00:00 AM
For Teacher's Use Only
Q No. 1 2 3 4 5 6 7 8 Total
Marks
Q No. 9 10 11 12 13 14 15 16
Marks
Q No. 17 18 19 20 21 22 23 24
Marks
Q No. 25 26 27 28 29 30 31
Marks
WW
W.v
uja
nnat
.nin
g.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
WW
W.vu
jann
at.n
ing.C
OM
Question No: 1 ( Marks: 1 ) - Please choose one
The purpose of earned value analysis is to
► determine how to compensate developers based on their productivity
► provide a quantitative means of assessing software project progress
► provide a qualitative means of assessing software project progress
► set the price point for a software product based on development effort
Question No: 2 ( Marks: 1 ) - Please choose one The RMMM plan assists the project team in developing strategy for dealing with risk.
In this context, an effective strategy must consider:
► Risk avoidance
► Risk monitoring
► Risk management and contingency plan
► All of the given choices
Question No: 3 ( Marks: 1 ) - Please choose one
The component-based development model is
► only appropriate for computer hardware design.
► not able to support the development of reusable components.
► dependent on object technologies for support.
► not cost effective by known quantifiable software metrics.
Question No: 4 ( Marks: 1 ) - Please choose one In ___________ representation of CMMI model, consideration is given to improve all
the defined processes areas.
► Staged
► Continuous
WW
W.v
uja
nnat
.nin
g.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
WW
W.vu
jann
at.n
ing.C
OM
Question No: 5 ( Marks: 1 ) - Please choose one
If you know the relationship between the use cases, classes, GUIs, Test cases and other
artifacts then we can say that requirements are traceable in that project.
►True
►False
Question No: 6 ( Marks: 1 ) - Please choose one There could be multiple GUIs to satisfy one requirement
►True
►False
Question No: 7 ( Marks: 1 ) - Please choose one
Check in and Check out is actually one and the same process with two different names
►True
►False
Question No: 8 ( Marks: 1 ) - Please choose one If a new version of a product is released by fixing the bugs in the previous release then it
is termed as _________________
►Product Update
►Product Upgrade
►Defect Removal
►Product Performance
Question No: 9 ( Marks: 1 ) - Please choose one
When an Item is baselined, it becomes frozen, here frozen means, that the item can be
changed only by creating an old version
►
►
WW
W.v
uja
nnat
.nin
g.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
WW
W.vu
jann
at.n
ing.C
OM
Question No: 10 ( Marks: 1 ) - Please choose one
Configuration Item identification involves:
►Identifying the structure of the s/w system
►Uniquely identify individual components
►Uniquely identifying various revisions
►All of the given
Question No: 11 ( Marks: 1 ) - Please choose one Incomplete Configuration identification documents may result in:
►Schedule Product
►all of the given choices are correct
►Defective Product
►Higher Maintenance Costs
Question No: 12 ( Marks: 1 ) - Please choose one
If Configuration item identification is not identified, it is possible to control changes and
establish records.
► True
► False
Question No: 13 ( Marks: 1 ) - Please choose one Availability and Reliability are concerned with
► Perceived quality
► Quantitatively measured quality
Question No: 14 ( Marks: 1 ) - Please choose one
Software Availability can be calculated by the following equation:
► Availability = (MTTR/MTTF) x 100
► Availability = (MTBF/MTTR) x 100
WW
W.v
uja
nnat
.nin
g.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
WW
W.vu
jann
at.n
ing.C
OM
► Availability = (MTTF/MTBF) x 100
► Availability = (MTBF/MTTF) x 100
Question No: 15 ( Marks: 1 ) - Please choose one
Phase Index can be calculated by the help of the following formula, where
Ei – the total number of errors uncovered during the ith step in the SE process
Si – number of serious errors
Mi – number of moderate errors
Ti – number of minor errors
PSi – product size at the ith step
ws, wm, wt – weighting factors for serious, moderate, and minor errors
► PIi = ws(Si/Ei) + wm(Mi/Ei) + wt(Ti/Ei)
► PIi = ws(Si/Ei) + wm(Mi/Mi) + wt(Ti/T)
► PIi = ws(Si/Ei) + wm(Mi/Mi) + wt(Ti/Ei)
► PIi = ws(Si/S) + wm(Mi/M) + wt(Ti/E)
Question No: 16 ( Marks: 1 ) - Please choose one The higher the Error Index, the higher will be the Defect Removal Efficiency
► True
► False
Question No: 17 ( Marks: 1 ) - Please choose one
The goal of quality assurance is to provide management with the data needed to
determine which software engineers are producing the most defects.
► true
► false
Question No: 18 ( Marks: 1 ) - Please choose one From the following listed software development Model, which one is an object oriented
model
► Classical life cycle model
► Fountain model
► Spiral model
WW
W.v
uja
nnat
.nin
g.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
WW
W.vu
jann
at.n
ing.C
OM
► Waterfall model
Question No: 19 ( Marks: 1 ) - Please choose one
The prototyping model of software development is
► a reasonable approach when requirements are well defined.
► a useful approach when a customer cannot define requirements clearly.
► the best approach to use for projects with large development teams.
► a risky model that rarely produces a meaningful product.
Question No: 20 ( Marks: 1 ) - Please choose one ___________________is a team organization where there is no permanent leader and
task coordinators are appointed for short duration. Decisions on problems and approach
are made by group consensus and communication among team is horizontal.
► Democratic decentralized (DD)
► Controlled decentralized (CD)
► Synchronous paradigm (SP)
► Controlled centralized (CC)
Question No: 21 ( Marks: 2 )
Discuss the role of program restructuring in software reengineering?
Question No: 22 ( Marks: 2 ) Differentiate Change Control Authority (CCA) and Change Control Board (CCB)?
Question No: 23 ( Marks: 2 )
Give the uses of Time Boxing?
Question No: 24 ( Marks: 3 ) Differentiate between organizational maturity and process area capability?
Question No: 25 ( Marks: 3 )
What would you understand by the conventional numbering of the product release?
WW
W.v
uja
nnat
.nin
g.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
WW
W.vu
jann
at.n
ing.C
OM
Question No: 26 ( Marks: 3 )
What would this model depict?
Errors Passed
Through
Amplified Errors
1:x
Newly generated
errors
Percentage
Efficiency
For error
detection
Errors passed
To next step
Errors from
previous step
Development Step
Defects Detec tion
Errors Passed
Through
Amplified Errors
1:x
Newly generated
errors
Percentage
Efficiency
For error
detection
Errors passed
To next step
Errors from
previous step
Development Step
Defects Detec tion
Question No: 27 ( Marks: 5 )
How we schedule a project with the help Critical Path Method (CPM)? Give only key
points.
Question No: 28 ( Marks: 5 ) What problems can be caused by following bad smells in code?
· Large class
· Short gun surgery
Question No: 29 ( Marks: 5 )
Briefly explain the following graph
WW
W.v
uja
nnat
.nin
g.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
WW
W.vu
jann
at.n
ing.C
OM
Question No: 30 ( Marks: 10 ) What are the difficulties in maintaining the Legacy System?
Question No: 31 ( Marks: 10 )
If we have collected the historical data of our organization, how the data related to errors
help in assessing the quality of the present project?
WW
W.v
uja
nn
at.n
ing.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
oo people, process, payoff, product
people, product, performance, process o people, product, process, project
o people, performance, payoff, product Effective software project management focuses on
Question No. 1 Marks : 01
Total Marks: 70 Total Questions: 22
**WARNING: Please note that Virtual University takes serious note of unfair means. Anyone found involved in cheating will get an `F` grade in this course.
3. A Note is added to some questions. Follow the instruction given in the note to give accurate answer.
c. Write all steps, missing steps may lead to deduction of marks.
b. If you believe that some essential piece of information is missing, make an appropriate assumption and use it to solve the problem.
a. If you think that there is something wrong with any of the questions, attempt it to the best of your understanding.
2. Do not ask any questions about the contents of this examination from anyone.
1. Attempt all questions. Marks are written adjacent to each question.
Please read the following instructions carefully before attempting any of the questions:
Time Allowed: 150 Minutes
Final Term Examination – Spring 2005
CS605 Software Engineering II
www.vujannat.ning.com
Which one of the following activities does not belong to Risk Mitigation, Monitoring, and Management Plan?
Question No. 8 Marks : 01
What is "time-boxing" as it relates to project scheduling? [5 Marks]
Question No. 7 Marks : 05
Compare the staged and continuous models of CMMI for software systems. [10 Marks]
Question No. 6 Marks : 10
Explain what is wrong with the notion that software engineering is too time consuming and interferes with a programmer's productivity. [10 Marks]
Question No. 5 Marks : 10
List the 3 broad categories of information that make up the software configuration. [5 Marks]
Question No. 4 Marks : 05
oo Software project tracking
Peer reviews o Process measurement
Software configuration management oo Process change management
Which one of the following is a CMM level 5 KPA? Question No. 3 Marks : 01
oo Systems that appear magical from the outside, are really just composed of
simple code on the inside.
No one technique will magically kill all software development problems. o Real design problems can only be solved with real (i.e. non-magical) tools.
o The "software crisis" was an illusion that proved not to be a threat at all. o Software engineers should be shot (but we're not allowed to).
What did Fredrick Brooks mean when he said "There is no silver bullet"?
Question No. 2 Marks : 01
o people, process, price, product
Question No. 13 Marks : 01
How is project scope defined? [10 Marks] Question No. 12 Marks : 10
oo Level 5
o Level 4
Level 2 o Level 3
o Level 1
"Basic project management processes established to track cost, schedule and functionality. Has the necessary process discipline in place to repeat earlier successes on projects with similar applications".
Which maturity level is characterised by:
Question No. 11 Marks : 01
oo An old fashioned model that is rarely used any more.
The best approach to use for projects with large development teams. o A risky model that rarely produces a meaningful product.
A reasonable approach when requirements are well defined. oo A useful approach when a customer cannot define requirements clearly.
The prototyping model of software development is
Question No. 10 Marks : 01
oo Synchronize and stabilize
o Prototyping
Incremental development o eXtreme Programming
o RAD Pair programming is associated with:
Question No. 9 Marks : 01
Risk avoidance oo Risk Management and Contingency Planning
oo Risk Mitigation
Risk Identification o Risk Projection
Question No. 18 Marks : 01
o Usability o Integrity
oo Maintainability
Correctness o Code size
Which one of the following is NOT a useful indicators of software quality? Question No. 17 Marks : 01
oo repeatable
managed o defined
o optimizing o initial or ad hoc
Which one of the following is the 4th level of the SEI Capability Maturity Model? Question No. 16 Marks : 01
Describe all activities that must occur in order to produce a Risk Mitigation, Monitoring, and Management Plan. [10 Marks]
Question No. 15 Marks : 10
Function point analysis oo Milestone definition
oo effort validation
Interdependency identification o time allocation
Which one of the following principles/techniques is NOT a software projects scheduling principle?
Question No. 14 Marks : 01
Finding and fixing errors after release oo Not reporting errors
oo Finding and fixing errors after insertion
Avoiding defect insertion o Avoiding defect insertion, but fixing errors when reported
Defect prevention is defined as:
Question No. 21 Marks : 05
define milestones and track progress oo Request 50% more time than estimated
o allow absolutely no schedule slippage
double the project team size oo request a large budget
What activity does a software project manager need to perform to minimize the risk of software failure?
Question No. 20 Marks : 01
o Architect
oo Specialist with knowledge of the application
o The programming tools supplier
User o Quality Engineer
Who of the following is NOT usually present in a technical review: Question No. 19 Marks : 01
Risk management oo Contingency planning
oo Risk monitoring
Risk avoidance o Security risk assessment
Which one of the following does not belong to a strategy for dealing with risk?
it causes the user no surprises during operation. oo the modifications are reflected in the documentation.
the allocations are difficult to cope with changes in the organization. oo it does not allow to make copies.
o the code produced for one system can be applied to others with little or no modification.
The quality of a software is high, if Question No. 22 Marks : 01
With respect to Software Refactory, what is meant by "move method" and why is it useful? [5 Marks]
WWW.vujannat.ning.Com Connecting VU Students
6 18 ---- 5 10 9 4 8 9 3 13 17 2 15 11 1 12 12 Task Planned effort Actual effort available. th
Compute the SPI, Schedule variance and Percent complete for the situation given below. Assume you are a software project Manager and that you have been asked to compute earned value statistics for a small software project. The project has 56 planned work tasks that are estimated to require 582 persons-days to complete. At the time that you have been asked to do the earned v
Question No. 3
4. manage3. planning risks, technical risks, personnel risks 2. project risks, technical risks, business risks 1. business risks, personnel risks, budget risks
T Question No. 2 W Question No. 1
Final Term Examination – Spring 2006 Time Allowed: 150 Minutes
Marks : 1
ith respect to Software Refactoring, what is meant by “move method” and why it is useful?
Marks : 3
hree categories of risks are
ment risks, technical risks, design risks
Marks : 3
alue analysis. 5 tasks have been completed. However the project schedule indicates at 8 tasks should have been completed. The following schedule data (in person-days) are
CS605
T
Question No. 8
1. T 2. F
C
Question No. 7 Marks : 1
wa
What team structure for the following situation would you choose and why? You have been appointed a software project manager for a company that services the genetic engineering world. Yo
Q
uestion No. 6
diagram 4. process
2. fishbone diagram1. control chart
graphical techniq
Q
uestion No. 5 Marks : 1
e given options 3. Data 4. all of th
2. Documentation 1. Code
Tit
Question No. 4 Marks : 1
SW
) for all tasks k
kBAC = ∑ (BCWSPSV=BCWP - BCWS (Hint: SPI = BCWP / BCWS 8 4 10 ----
----
erson Complete = BCWP / BAC
here BCWP = Budgeted Cost of Work Performed, BCWS = Budgeted Cost of Work cheduled, BAC = Budget at Completion)
he software reengineering process model includes restructuring activities for which of the following work ems?
One ue for determining whether a process exhibits out-of-control change behavior is a
3. Pareto diagram
Marks : 1
ur job is to manage the development t of a new software product that will ccelerate the pace of gene typing. The work is R&D oriented, but the goal to produce a product ithin the next year.
hange control is not necessary if a development group is making use of an automated project database tool.
Marks : 1
he linear sequential model of software development is also known as the
7
Q
uestion No. 14
dG
In terms of the Capability Maturity Model, what level would you describe the current situation as bJustify your answer. The owner of the software games company: HotFusion Games has hired you to adviscompany. 18 months ago, their game “Powers and Perils” became an international success, ansince then their software development group has grown from 5 people to 50 people. Unfortunately, their sequel to the first game “Powers and Perils II” is now six months behind schedule and the owner is quite bewildered at this. After examining the situation at HotFusi
Question No. 13 Marks : 1
all of the given options
2. after an estimate of the de1. after an estimate of the development effort is made.
num T
Q
uestion No. 12
W
Q
uestion No. 11
2. F
D Question No. 10 Marks : 3 W Question No. 9
odel 3. Spiral m4. Chaos m
2. Fountain mode1. Classical life c
ycle model l
odel
Marks : 1
hat is the difference between SCM audit and a formal technical review?
oubling the size of your software project team is guaranteed to cut project completion time in half.
1. T
Marks : 3
hat is the role of risk analysis in evolutionary process models like the spiral model?
Marks : 10
he ber of people required for a software project is determined
velopment effort is made. 3. from an assessment of the technical complexity of the system. 4.
eing?
e their d
on ames, you realize that while the organization is equipped with some very capable software evelopers, they have never established any formal process in their software development.
Marks : 1
1. True
enT
Question No. 17 Marks : 1
Pi Where: (Hint: The Formula for
4 5
2 4 3 3
1 2
step is gi el
A
organization. Assume PS= 100.
n organization uses
U
Question No. 16 Marks :
objectives and scope. 4. establish the
2. select a team organizational model. 3. determine the project constraints.
1. determine the budget.
T
Question No. 15
2. reduced maintenance effo3. software easier to test
s 1. higher quality program
hich of these benefits can be achieved when software is restructured?
rt
4. all of the given options
Marks : 1
he first step in project planning is to
1
sing this table information and this phase index distribution, compute the overall error index for the
a four step software engineering process in which the phase index of each ven b ow:
Step Phase Index
Error index is EI = ∑ (i * PIi) / PS
is the number of step I is the Phase index)
he goal of quality assurance is to provide management with the data needed to determine which software gineers are producing the most defects.
2. False
W
WW
W.vu
jann
at.n
ing.C
OM
MIDTERM EXAMINATION
Fall 2008
CS605- Software EngineeringII (Session - 2)
Time: 60 min
Marks: 38
Student Info
StudentID:
Center: OPKST
ExamDate: 12/2/2008 12:00:00 AM
For Teacher's Use Only
Q No. 1 2 3 4 5 6 7 8 Total
Marks
Q No. 9 10 11 12 13 14 15 16
Marks
Q No. 17 18 19 20 21
Marks
WW
W.v
uja
nnat
.nin
g.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
WW
W.vu
jann
at.n
ing.C
OM
Question No: 1 ( Marks: 1 ) - Please choose one
Every task should be assigned to a specific team -------------.
► Member
► Manager
► Organizer
► None of the given
Question No: 2 ( Marks: 1 ) - Please choose one
Which one is not the Software project planning activity carried out by the project manager for
estimation?
► Software scope estimation
► Resources requirements
► Time requirements
► Product Quality
Question No: 3 ( Marks: 1 ) - Please choose one
The
higher the Error Index, the higher will be the Defect Removal Efficiency
► True
► False
Question No: 4 ( Marks: 1 ) - Please choose one
While performing risk analysis, the impact of risk can not be measured quantitatively
► True
► False
Question No: 5 ( Marks: 1 ) - Please choose one
Degree of uncertainty that the product will meet its requirements and be fit for its intended use is the
► Cost risks
WW
W.v
uja
nnat
.nin
g.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
WW
W.vu
jann
at.n
ing.C
OM
► Schedule risks
► Performance risks
► None of the given choices
Question No: 6 ( Marks: 1 ) - Please choose one
Proactive risk management philosophy is also some times termed as Indiana Jones school of risk management
► true
► false
Question No: 7 ( Marks: 1 ) - Please choose one
The
number of people required for a software project is determined
► after an estimate of the development effort is made.
► from an assessment of the technical complexity of the system.
► by the size of the project ► all of the given
Question No: 8 ( Marks: 1 ) - Please choose one
Defect Removal Efficiency (DRE) can be measured by where E is Errors found delivery and D is error found after delivery (typically within the first year of operation)
► DRE= E/(E+D) ► DRE= E - (E+D) ► DRE= E * (E+D) ► None of the given
Question No: 9 ( Marks: 1 ) - Please choose one
Integrity means that the software should
WW
W.v
uja
nn
at.n
ing.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
WW
W.vu
jann
at.n
ing.C
OM
► help the users to enjoy usability
► none of the given
► withstand the attack from a hacker ► help the hacker to hack the system
Question No: 10 ( Marks: 1 ) - Please choose one
In
function point analysis technique EO stands for
► Export operation
► Export output
► External output
► None of these
Question No: 11 ( Marks: 1 ) - Please choose one
Which of these software characteristics are used to determine the scope of a software project?
► context,lines of code, function
► context, function, communication requirements
► information objectives, function, performance
► communications requirements, performance, information objectives
Question No: 12 ( Marks: 1 ) - Please choose one
In
____________a team is structured loosely and depends on individual initiative of the team
members
► random paradigm
► closed paradigm
WW
W.v
uja
nnat
.nin
g.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
WW
W.vu
jann
at.n
ing.C
OM
► synchronous paradigm
► open paradigm
Question No: 13 ( Marks: 1 ) - Please choose one
In
_________________ a team is structured along a traditional hierarchy of authority ► closed paradigm
► synchronous paradigm
► random paradigm
► open paradigm
Question No: 14 ( Marks: 1 ) - Please choose one
______________ is the first stage of waterfall lifecycle model
► Requirement definition ► Operation
► Unit testing
► Implementation
Question No: 15 ( Marks: 1 ) - Please choose one
___________ is not the part of software development loop.
► Status Quo
► Problem definition
► Technical development
► Task set
Question No: 16 ( Marks: 1 ) - Please choose one
__________ is not the management part of software development activities.
► Coding
WW
W.v
uja
nn
at.n
ing.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
WW
W.vu
jann
at.n
ing.C
OM
► Configuration Management
► Quality Assurance
► Project planning
Question No: 17 ( Marks: 2 )
How can we decide about the degree of rigor for a project, give the parameters those are considered before a decision is made?
Question No: 18 ( Marks: 2 )
Differentiate between open paradigms vs. synchronous paradigms in team management? Question No: 19 ( Marks: 3 )
How Kraul and Steeter categorize the project coordination techniques?
Question No: 20 ( Marks: 5 )
Differentiate between the types of software engineering control chart techniques?
Question No: 21 ( Marks: 10 )
Briefly explain what we mean by law of diminishing return. Discuss this law in view of Cost vs. Efficiency?
WW
W.v
uja
nn
at.n
ing.C
OM
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study discussions and many more.
WW
W.V
IRT
UA
LIA
NS.
CO
M
What are the names of the five levels of the SEI Capability Maturity Model? In your own words, briefly describe each. [Marks 10]
Question No. 1 Marks : 10
Total Marks: 40 Total Questions: 6
**WARNING: Please note that Virtual University takes serious note of unfair means. Anyone found involved in cheating will get an `F` grade in this course.
3. A Note is added to some questions. Follow the instruction given in the note to give accurate answer.
c. Write all steps, missing steps may lead to deduction of marks.
b. If you believe that some essential piece of information is missing, make an appropriate assumption and use it to solve the problem.
a. If you think that there is something wrong with any of the questions, attempt it to the best of your understanding.
2. Do not ask any questions about the contents of this examination from anyone.
1. Attempt all questions. Marks are written adjacent to each question.
Please read the following instructions carefully before attempting any of the questions:
Time Allowed: 90 Minutes
Mid Term Examination – Spring 2005
CS605 Software Engineering II
www.vujannat.ning.com
Why is a feasibility assessment part of the planning process? [Marks 10] Question No. 6 Marks : 10
In the McCall's model, what are the quality factors related to operation? [Marks 10] Question No. 5 Marks : 10
(NOTE: Explain each reason in two or three lines.) What are the major reasons for project failure? Briefly explain. [Marks 10]
Question No. 4 Marks : 10
Define ILF and EIF. What is the difference between ILF and EIF? [Marks 10]
Question No. 3 Marks : 10
(NOTE: Give at least FOUR features with short explanation) What are the key features of eXtreme Programming model? Briefly explain. [Marks 10]
Question No. 2 Marks : 10