Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
What is the last thing you learned regarding algorithms from a book, magazine or the web site?
Can you describe what Test-Driven Development is? Can you name some of the principles of Extreme Programming?
Do you know regarding design patterns? Which design patterns have you used and in what conditions?
What are the metaphors employed for in functional design? Can you name some successful illustrations?
Can you name a number of various methods for specifying the requirements?
Name the 3 major approaches to dealing with possible threats, when planning with partially instantiated operators. Describe what is “back-jumping” and “dependency-directed backtracki
IPSec uses two protocols for security: Authentication protocol (AH) and the Encapsulated Security Header Protocol (ESP). Why is AH used with ESP although ESP provides some authentication?
What is the major weakness of key distribution using KDC? List 2 ways how this can be overcome. Provide two examples of modern block cipher other than DES.
Describe two limitations of steganography. Describe the operation of Trojan horse program. How can we protect our computer from such a program?
What could be the consequences if there is mismatch between the business process model and the software or system design?
Describe in detail regarding the software Maintenance.
Describe iterative waterfall and spiral model for software life cycle and different activities in each and every phase.
Describe the integration testing. Write down all the steps for top-down integration and bottom-up integration? Compare and contrast the top-down and bottom-up integration testing?
What are the characteristics of good design? Explain different kinds of coupling and cohesion. How design evaluation is functioned?
Describe in detail the Requirement Engineering Process. What is the main difference between user requirements and system requirements?
What is the main criterion for deciding whether (or) not to use waterfall model in software development project? Describe. How do we define software engineering? Describe.
What is the function of middleware in distributed system? Illustrate why a multi-threaded server may not qualify as a state machine.
Intermediary services can be classified as stateless services that bridge technical inconsistencies or design gaps in an architecture. They act as both clients and servers in a Service Oriented Arch
We identified three expansion stages that signify the different levels of maturity of an SOA in the enterprise: the fundamental SOA, the networked SOA and the process-enabled SOA.
A service is a software constituent of distinctive functional meaning which typically encapsulates a high-level business concept, and is basically made up of three parts. Illustrate the three sub-co
Draw 1st level DFD (Data Flow Diagram) and ERD (Entity Relationship Diagram) diagrams for network based course registration system for any university?
What is the purpose of using a functional model? Give suitable example of functional model. Draw and describe a DFD for ATM Machine? Also describe the basic notations of DFD?
Define and describe data modelling, function modelling and behaviour modelling in detail? Describe the various notations used in DFD? Develop the DFD for library management system?
Define and describe software engineering? How software engineering is different from conventional engineering?
Explain elements and notation use to build an activity diagram in UML. Draw a communication diagram for 'schedule a seminar' in hypothetical college system for seminarmanagement. Make appropriate ass