(A) Assume that you are the manager of a small software development project.What baselines would you define for the project and how would you control them?
(B) A software system consists of 20 modules,the average size of which is 4 KLOC.The counts of defects per KLOC detected during code inspection for these modules are tabulated below:
Module ID Defects/KLOC Module ID Defects/KLOC Module ID Defects/KLOC Module ID Defects/KLOC
1 8 6 21 11 15 16 13
2 30 7 12 12 29 17 24
3 9 8 7 13 37 18 19
4 13 9 28 14 21 19 7
5 36 10 19 15 6 20 26
Use an appropriate iterative technique to identify the defect-prone modules that will be given priority for improvement efforts.
(A) Name Three(3) generic quality attributes that differentiate Web applications from the more traditional software applications.Define each of these generic attributes.
(B) The “Customer problems Metric” in the measurement of software quality is defined as the total number of problems that customers report for a time period divided by a measure of usage.
(i) Give examples of customer reported problems to be covered in this metric.
(ii) Suggest an appropriate measure of usage in the denominator of the metric.
(iii) What might have caused a decreasing trend of the “Customer Problems Metric”?
(A) You have been given the responsibility for improving the quality of sofrware across your organization.What is the first thing that you will do?What is Next?
(B) Suggest approaches to:
(i) Enhancing fault tolerance of software,
(ii) Mitigating software risks,
(iii) Reducing risks of software driven systems.
(A) Select TWO(2) safety critical systems that are controlled by computer.List at least three hazards ofr each that can be directly linked to software failures
(B) Show,using a small example,that it is impractical to exhaustively test a program.
(C) Derive a set of test cases for the following software components:
(i) A routine which takes a line of text as input and counts the number of nonblank characters in that line
(ii) A routine which examines a line of text and replaces sequences of blank characters with a single blank character.
(A) “Make the user interface consistent” is one of the guidelines ofr interface design.
Give THERE(3) different examples that apply this principle.
(B) Suggest ways in which an online bookstore might be adapted for users who are physically challenged with some form of visual impairment or problems with muscular control.
(C) Explain why response time unpredictability can be an issue.
(D) what is the difference between a Software configuration management(SCM) audit and a formal technical review(FTR)?can their function be combined into one review?Justify your answer.
(A) Suggest two(2) proka-yoke devices that might be used to detect and/or prevent errors that users commonly make prior to “sending” an e-mail message.
(B) pest programs are common threats to information systems.Identify TWO(2) possible ways in which attacks made by such programs are triggered.Suggest approaches to prevent these attacks.
(C) Apart from pest programs,there are other forms of computer misuse or security breach that create risks to information systems.Give THREE(3) examples of these other forms of risk exposure.
(D) A lot of organizations do not have a system in place to manage information secutiry.Identify the common reasons for the lack of emphasis in addressing the issue.