You are on page 1of 4

Homework Title / No.

2_____

Course Code: CSE314_________ Course Tutor (if applicable) : ____________

Course Instructor : Mrs. RAJDEEP KAUR

Date of submission : _______23/02/2011____________

Students Roll No.___b2805b31__ Section No. : ____b2805____________________


Declaration: I declare that this assignment is my individual work. I have not copied from any other students work or from any other source except where due acknowledgment is made explicitly in the text, nor has any part been written for me by another person. Students Signature : SAJAN

Q1. Develop a procedural design for an interactive user interface that queries for basic income tax information. Derive your own requirements. Ans: Q2. Before the project can begin, the manager and the software team must estimate the work to be done, the resources that will be required, and the time that will elapse from start to finish. Ans: Manager and the software team must estimate the work to be done
Estimate the size of the product: - As size increases, the interdependency among various elements of the

software grows rapidly. Thus size estimation is very important. Size increases, the interdependency among various elements of the software grows rapidly. Estimation gives you a fair idea of the size of the project.
The availability of historical information has a strong influence on estimation risk. Risk is measured by the degree of uncertainty in the quantitative estimates established for resources,

cost, and schedule.


About size to estimate the cost, effort, and duration of the project. This further helps plan for resources

and schedule the project.


Estimate the effort: - It tells about how many man per month are required for the development of

software Estimate the resources required. Estimate the time required to complete the project.

Q3. Discuss the various methods for verifying a design . Which of these in your opinion is likely to be most effective in revealing design errors ? Take an example to answer this question Ans: various methods for verifying a design:
1. Design reviews or inspection: purpose of design reviews is to ensure that the design satisfies the

requirements and is of good quality. If errors are made during decision process, they will ultimately reflect themselves in the code and the final system. Detecting errors is the purpose of the design reviews. This process is similar to inspection process.

The most effective method in revealing design errors is checklist. Checklist of frequently occurring risks: most organizations prepare a list of commonly occurring risks for projects, prepared from the survey of previous projects. Lists are prepared on the basis of survey.

Part B Q4. Explain why maximizing cohesion and minimizing coupling in the design of a software system improves the system maintainability. What other attributes of design might influence system maintainability ? Ans: Coupling between modules is the strength of interconnections between modules or the measure of interdependence among modules. While cohesion represents how tightly bound the internal elements of the modules to each another. Coupling and cohesion are completely related. Greater the cohesion of each module in the system, the lower the coupling between modules is. Loosely coupled modules means the two modules are independent. For example, if there are two modules, A and B we need to study both modules if we need to understand any one of the module in highly coupled technique. We therefore prefer loosely coupled. Cohesion strengthens the bond between the elements of the same module by maximizing the relationship between the elements of same module and therefore we maximize cohesion.

Q5. Why is risk Management important? How risks can be identified? what is risk exposure and how it Can be calculated Ans: A risk is any anticipated unfavorable event of circumstance that occur when a project is underway. If risk becomes real, it can adversely affect the project and hamper the successful and timely completion of the project. Therefore, it is necessary for the project manager to anticipate and identify the different risks that are susceptible to, so that contingency plans can be prepared to contain each risk. Risk management consists of three main activities: 1. Risk identification 2. Risk assessment 3. Risk containment

Risks can be identified using risk identification, which identifies all the different risks for a particular project. Identifying risks: 1. Checklist of frequently occurring risks: most organizations prepare a list of commonly occurring risks for projects, prepared from the survey of previous projects. Risk exposure Also known as risk impact. A problem when we have a number of possible risks is that it can be difficult to decide which risks are worth putting effort into addressing. Risk Exposure is a simple calculation that gives a numeric value to a risk, enabling different risks to be compared. RE=prob (UO) * loss (UO) Where, Lists are prepared on the basis of survey.

Prob (UO) =prob of undesirable outcome. Loss (UO) = total loss incurred due to unsatisfactory outcome.

Q6. Name the various system design methodologies and describe in brief the data design methodology. Ans: Various system design methodologies are: 1. Dynamic modeling: aims to specify how the state of various objects occurs when event occurs. 2. Functional modeling: specifies how the output values are compared in the system from the input values. 3. Defining internal classes and operations 4. Optimize and package 5. Data modeling Data modeling The information flow defined as part of the business modeling phase is refined into a set of data objects that are needed to support the business. The characteristics (called attributes) of each object are identified and the relationships between these objects defined. Data modeling answers a set of specific questions that are relevant to any data processing application.
What are the primary data objects to be processed by the system? What is the composition of each data object and what attributes describe the object? Where do the objects currently reside? What are the relationships between each object and other objects? What are the relationships between the objects and the processes that transform them?

Data modeling methods make use of the entity relationship diagram.ER diagram enables a software engineer to identify data objects and their relationships using a graphical notation. In the context of structured analysis, the ERD defines all data that are entered, stored, transformed, and produced within an application. The ERD is especially useful for applications in which data and the relationships that govern data are complex.

You might also like