+971 55 359 3828 vuassassins@gmail.com
Select Page

## CS605 – Software Engineering – II

In CS605 Software Engineering – II we have you covered with Digitized Past Papers From Fall of Mid Term and Final Term.

## NOTE: Tab/Click on Preparation Tab to take the MCQ’s Tests.

CS605– Practice Quiz 1

CS605 – Practice Quiz 2

CS605 – Practice Quiz 3

FINAL TERM
CS605 Solved MCQS for MidTerm With Reference by Hinna (1)                    View     Download
MID TERM
CS605 Solved MCQS for MidTerm With Reference by Hinna (1)                     View     Download
##### POSTED DATE:23-01-2019       IDEA SOLUTION

Question No. 1
Suppose you are working as a project manager in a software company. The company assigns you the project for scheduling, for which you had already defined the Task network, the sequence of tasks which are needed to be performed for completing the project. Now among those paths which are defined inside the task network the project manager wants to find out which path in the task network will take the maximum/longer time to complete.
Which type of scheduling technique will be most feasible to use in the above mentioned scenario? Also write the reason for choosing the technique.
Solution:
The Critical Path Method (Reason write your own words)

Question No. 2
For a given project:
BCWS (Budget cost of work schedule) = 2
BCWP (Budget cost of work perform) = 3
Calculate the SV (Schedule Variance) and SPI (Schedule performance Index) of the project and provide answer in the given table.

 Calculation Answer SV=BCWP-BCWS =    3    –    2 SPI= BCWP/BCWS =         3/2 SV= 1SPI=1.5

1. #CS605 GDB IDEA SOL 2018-19
Don’t copy paste make ur own Solution otherwise you will get Zero 0 marks
Software testing metrics improves the efficiency and effectiveness of a software application trying out approach. Software program attempting out metrics or software program take a look at length is the quantitative indication of quantity, functionality, measurement, amount or size of a few characteristic of a device or product.
Bugs per Function point
Intuitively the quantity of most capacity defects is same to the quantity of attractiveness test cases that is 1.2 x function factors. The feature of bug monitoring software program software. computer virus tracking is a vital difficulty of keeping a pc system. bug monitoring can be very crucial to commercial enterprise because bugs can cause excessive issues which can motive lack of time, cash or even customers. Bug monitoring is dealt with through computer virus tracking software program. In laptop era, a Trojan horse is a coding error in a computer program. (Right here we take into account a software program to additionally include the microcode this is synthetic proper right into a microprocessor.) The system of locating insects earlier than software customers do is known as debugging. Debugging starts off developed after the code is first written and keeps in successive tiers as code is blended with different gadgets of programming to shape a software program product, which encompass an jogging gadget.

2. 1.Differentiate between fountain model and RUP. (2)
Fountain model is another object-oriented lifecycle model. In this model the circles representing the various
phases overlap, explicitly representing an overlap between activities.
In Rational Unified Process (RUP) model a software product is designed and built in a succession of
incremental iterations. The process emphasizes that during development, all activities are performed in parallel,
however, and at a given time one activity may have more emphasis than the other.
6
2.Formula for MTBF. (2)
MTBF = MTTF + MTTR
3.A student claims that requirement errors are most common type of software errors and are most costly to
fix. Do you agree? (2)
Yes, Agree.
Project success depends on good requirement management. It may be recalled that requirement errors are the
most common type of software development errors and the most costly to fix. It may also be recalled that
requirement errors are listed as one of the roots causes of software project failure.
4.Which one is the ad hoc level? Level-1 or Level-2 or Level-3? (2)
Level 1 – Initial is also called ad hoc level.
6.State the advantages of waterfall model that are helpful for project managers. (3)
Simple and easy to understand and use.
Easy to manage due to the rigidity of the model – each phase has specific deliverables and a review process.
Phases are processed and completed one at a time.
Works well for smaller projects where requirements are very well understood.
7. Write down the format of the compound number normally used for release versioning (3)
Although there is no industry standard, typically, a three field compound number of the format “X.Y.Z” is used.
The different fields communicate functionality information about the product release.
The first digit, X, is used for the major release number which is used to identify a major increase in the product
functionality.
The second digit, Y, stands for feature release number. The feature release number is iterated to identify when a
set of product features have been added or significantly modified from their originally documented behavior.
The third digit, Z, is called the defect repair number and is incremented when a set of defects is repaired.
8.Differentiate between organizational maturity and process capability. (3)