Skip to main content

Software Engineering page with popular questions

Popular question:
(Find your question and click to view)


7.What is a critical system? Describe the types of a critical systems. 
8.What is CASE? Write about any two CASE tools which aid in Software Engineering process. 
9.Describe the design and testing phase of software development life cycle. 
10.What is a prototype model? Illustrate with a diagram. 
11.Write about the disadvantages of a waterfall model. 
12.Write about the various responsibilities a project manager should handle. 
13.Describe the Unified process of software development. Write about the best practices it follows. 
14.Distinguish between functional and nonfunctional requirements of software. 
15.Illustrate the process of risk identification with the help of a risk table. 
16.Describe the stages of spiral model. Distinguish it from the incremental model of software development. 
17.Describe the tools used to reduce risk during software development. 
18.Illustrate incremental model with a diagram. Write about its advantages over the waterfall model. 
19.Describe the process how the schedule of a project can be planned with a Gantt chart. 
20.Describe the techniques of observation and survey which helps in gather requirements during the early stage of SDLC. 
21.Explain legal and operational feasibility. 
22.What is feasibility study? Describe the types of feasibility studies available. 
23.Explain the rules of drawing a context diagram. Illustrate the symbols used in DFD. 
24.Write a short note on technical and economic feasibility. 
25.Write about the do’s and don’ts of a Data flow diagram (DFD). 
26.Write the characteristics of a language processing system. 
27.Write the characteristics by which the user interface can be evaluated. 
28.Explain the meaning of the terms Cross functional and self-organizing with respect to agile modeling. 
29.Write the characteristics of agile development. 
30.Illustrate with examples resource allocation and Event processing system. 
31.Discuss the different styles of interaction available in user interface design. 
32.Distinguish between data processing system and transaction processing system. 
33.Explain the characteristics of Graphical User Interface
34.List the drawbacks of RAD model. 
35.Describe the core values of Extreme programming. 
36.What is a component? Write the advantages of COM technology. 
37.Differentiate between verification and validation. 
38.Write short notes on alpha and beta testing. 
39.Explain the advantages and disadvantages of component based software engineering. 
40.Write a short note on the types of white box testing. 
41.What is CBSE? Write the advantages of COM technology. 
42.Distinguish between white box and black box testing. 
43.What is meant by the term misuse cases? Discuss its types. 
44.What is size oriented metrics? Illustrate with an example. 
45.Discuss the levels of protection which should be implemented in quality software. 
46.What is a service? Explain the benefits of service oriented architecture. 
47.What is security engineering? Describe the different phases of security management. 
48.What is function oriented metrics? How it is used to calculate the effort required for software development. 
49.Write the characteristics of a web service.

Comments

Popular posts from this blog

Explain the tools used to monitor system security.

12.Explain the tools used to monitor system security. Ans. 1. People who, for purpose of larceny or to amuse themselves, like to break into computers, they are called ‘crackers’. 2. If there is a vulnerability in a system they will find it and use it against you. 3. Preventing use of your machine for nefarious purpose and guarding against intrusion are, in the end, your responsibility alone. 4. Red hat equips you with tools to detect and deal with unauthorised access of many kinds. 5. You need to configure those tools and understand how to sense the warning they provide. 6. Fortunately Linux is development community is quick to find potential exploits and to create ways of slamming the doors before crackers can enter in your system. 7. Red hat is careful enough to making available new, patched version in which potential exploits have been found. 8. You should make sure to download and install the repaired package. 9. This line of defence...

Explain the file systems supported by Linux.

21.Explain the file systems supported by Linux. Ans. 1. Linux can read/write to several file system that originated with other operating system much different from Linux. 2. One reason that Linux supports so many file systems is the design of its virtual file system (VFS) layer, its provides a fairly universal forms of file support, file systems supported by Linux are as follows: 3. ext3: • Ext3 stands for third extended file system. • Starting from Linux Kernel 2.4.15 ext3 was available. • The main benefit of ext3 is that it allows journaling. • Journaling has a dedicated area in the file system, where all the changes are tracked. • When the system crashes, the possibility of file system corruption is less because of journaling. (If no journaling, then fsck command (file system consistency check) is used to check for the corrupted file and to repair that file). • ext3 keeps a record of uncommitted file transactions and applies only those transactions when the sy...

Explain the boot process in Linux.

13.Explain the boot process in Linux. Ans. 1. When we turn on our PC, it runs a program called “Basic input/output System” (BIOS). 2. BIOS is the only way to communicate with the system components until the operating system is up and running and able to take over the system management functions. 3. BIOS is installed on Read only memory (ROM) chip physically attached to system board. 4. The ROM type of chip is usually referred as to as an EEPROM chip, meaning it’s not writeable by user. 5. After the BIOS loads, it performs some diagnostics on the hardware, checks the installed components to be sure they are functioning and checks the system RAM (Random access memory). 6. Next the BIOS tries to find system drives from which it can load the boot program to begin the process of starting the operating system/kernel. 7. We can specify the search order for drives by changing the setting in the system BIOS configuration. 8. Usually the first hard drive...