Skip to main content

Describe the stages of spiral model. Distinguish it from the incremental model of software development.

There are six phases in the "Spiral Model" which are: 

1.The customer communication task – to establish effective communication between developer and customer. 

2.The planning task – to define resources, time lines and other project related information.. 

3.The risk analysis task – to assess both technical and management risks. 

4.The engineering task – to build one or more representations of the application. 

5.The construction and release task – to construct, test, install and provide user support (e.g., documentation and training). 

6.The customer evaluation task – to obtain customer feedback based on the evaluation of the software representation created during the engineering stage and implemented during the install stage.

7.Incremental model generates working software quickly and early during the software life cycle as compare to spiral model. 

8.It is more flexible - less costly to change scope and requirements.


Comments

Popular posts from this blog

Explain process of setting up a NIC (Network interface card).

44.Explain process of setting up a NIC (Network interface card). Ans. 1. Network interface card (NIC) can be set-up by configuring the network card and internal network. 2. Before configuring network card we must check loopback (IP address 127.0.0.1) is working. 3. Even if the compute is not connected to outside network internet network configuration is required for some applications. This address is known as loopback device, and its IP address is 127.0.0.1 4. To check loopback device is configured or not, we use ‘ifconfig’ command it shows a device called ‘lo’ with the address 127.0.0.1, if this device and address is not shown there then loopback is not configured. 5. To configure it we can use command ifconfig lo 127.0.0.1 after that we need to use the ‘route’ command to give system a little more information about this interface for this ‘route add –net 127.0.0.0’ command is used, after this loopback is setup. 6. To configure a network card we will use ifconfig co...

List and explain all NFS server commands.

65.List and explain all NFS server commands. Ans. 1. exportfs: a) The exportfs command enables user to manipulate the list of current exports without editing /etc/exports. b) It also maintains the list of currently exported file system in /var/lib/nfs/etab. Example: The exportfs –a command initializes /var/lib/nfs/etab, synchronizes it with the contents of /etc/exports. c) To add a new export to etab and also /etc/exports the syntax is : #exportfs –o opts hostdir d) Example: #exportfs –o sync,rw 192.168.166.7:/demo The above command exports the directory /demo to client 192.168.166.7 with export option rw and sync. e) –v option of this command, lists currently exported filesystem. Example: #exportfs –v f) –u options unexports the filesystem as follow: Example: #exportfs –u 192.168.166.7:/demo 2. showmount: a) The showmount command provides information about clients and the file systems they have mounted. b) Syntax is : #showmount [-advhe] [host] ...

What are the disadvantages of Network file system (NFS)?

58.What are the disadvantages of Network file system (NFS)? Ans. 1. NFS is sensitive to network congestion/traffic which shows down NFS performance. 2. Busy disk activity on the NFS server badly affects NFS’s performance. 3. The performance enhancement incorporated in NFSv4 have increased NFS’s stability and reliability on high latency and heavily congested networks. 4. If user/client wants to mount some files which is not exported, then client’s system may get hang and this can be resolved with the help of mount option. 5. Is the disk or system exporting important data or application becomes unavailable, such as a disk crash or server failure, no one can access that resource. 6. NFS suffers from potential security problems because its designs assure a trusted networks. 7. The major weakness of most NFS implementation based on protocol’s other versions, that they are based on standard RPC which is unencrypted. 8. Sensitive information should never be exported f...