Skip to main content

Software Engineering page with popular questions

Popular question:
(Find your question and click to view)


7.What is a critical system? Describe the types of a critical systems. 
8.What is CASE? Write about any two CASE tools which aid in Software Engineering process. 
9.Describe the design and testing phase of software development life cycle. 
10.What is a prototype model? Illustrate with a diagram. 
11.Write about the disadvantages of a waterfall model. 
12.Write about the various responsibilities a project manager should handle. 
13.Describe the Unified process of software development. Write about the best practices it follows. 
14.Distinguish between functional and nonfunctional requirements of software. 
15.Illustrate the process of risk identification with the help of a risk table. 
16.Describe the stages of spiral model. Distinguish it from the incremental model of software development. 
17.Describe the tools used to reduce risk during software development. 
18.Illustrate incremental model with a diagram. Write about its advantages over the waterfall model. 
19.Describe the process how the schedule of a project can be planned with a Gantt chart. 
20.Describe the techniques of observation and survey which helps in gather requirements during the early stage of SDLC. 
21.Explain legal and operational feasibility. 
22.What is feasibility study? Describe the types of feasibility studies available. 
23.Explain the rules of drawing a context diagram. Illustrate the symbols used in DFD. 
24.Write a short note on technical and economic feasibility. 
25.Write about the do’s and don’ts of a Data flow diagram (DFD). 
26.Write the characteristics of a language processing system. 
27.Write the characteristics by which the user interface can be evaluated. 
28.Explain the meaning of the terms Cross functional and self-organizing with respect to agile modeling. 
29.Write the characteristics of agile development. 
30.Illustrate with examples resource allocation and Event processing system. 
31.Discuss the different styles of interaction available in user interface design. 
32.Distinguish between data processing system and transaction processing system. 
33.Explain the characteristics of Graphical User Interface
34.List the drawbacks of RAD model. 
35.Describe the core values of Extreme programming. 
36.What is a component? Write the advantages of COM technology. 
37.Differentiate between verification and validation. 
38.Write short notes on alpha and beta testing. 
39.Explain the advantages and disadvantages of component based software engineering. 
40.Write a short note on the types of white box testing. 
41.What is CBSE? Write the advantages of COM technology. 
42.Distinguish between white box and black box testing. 
43.What is meant by the term misuse cases? Discuss its types. 
44.What is size oriented metrics? Illustrate with an example. 
45.Discuss the levels of protection which should be implemented in quality software. 
46.What is a service? Explain the benefits of service oriented architecture. 
47.What is security engineering? Describe the different phases of security management. 
48.What is function oriented metrics? How it is used to calculate the effort required for software development. 
49.Write the characteristics of a web service.

Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Absolute Links vs. Relative Links – SEO Value

Absolute Links vs. Relative Links – SEO Value The debate between  absolute links and relative links  continues to live on in the SEO world. The individual significance of each has been contested, but it is widely regarded that absolute links provide better SEO value on the whole than relative links. Many believe that absolute links have less potential for getting messed up when search engines index your page. It shouldn’t really make a difference, but many conclude that this is reason enough. Read more...

What are the server and client security considerations?

72.What are the server and client security considerations? Ans. Server security considerations: 1. Always use the root_squash option in /etc/exports. 2. Enabled by default so do not disable it. 3. With root squashing clients root account can’t even access or change files that only server’s root account can change or access. Client security considerations: 1. Disable SUID (set UID) programs on NFS mounts using nosuid option. 2. Prevents server’s root account from creating an SUID root program on an exported FS, logging in to the clients as a normal user, and then using the UID root program to become root on the client.