SE CHS Sample Midterm

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Cairo University CMP(N)203

Faculty of Engineering Software Engineering


Computer Eng. Dept.

Sample Midterm Exam


1. True or False with justification (not correction):
a. Safety control systems are better developed through a series of prototypes.
b. In customized products, the specification is owned by the software developer.
c. Accommodating change in waterfall model is difficult after the process is underway.
d. Ethnography can identify new features to be added to the system.
e. Experienced staff leaving the project is a risk that affects the business.

2. Choose the best answer:


a. Ensuring that a system conforms to its specification is called
i. verification
ii. validation
b. Essential attributes of good software include
i. maintainability
ii. efficiency
iii. acceptability
iv. all of the above
c. The quality of the software system tends to degrade over time when using
i. the waterfall model
ii. incremental development
d. More rapid delivery and deployment of useful software to the customer is possible
when using
i. the waterfall model
ii. incremental development
e. Who could benefit from a requirements document?
i. Managers
ii. Testers
iii. Customers
iv. All of the above
f. Software requirements should be consistent. This means that
i. they should be written as complete sentences
ii. they should include all the required functionalities.
iii. there should be no conflicts among the requirements.
iv. they should be consistent with the intentions of the stakeholders
g. "The response time of the system shall be less than 0.5 seconds." is considered a
i. usability requirement
ii. performance requirement
iii. space requirement
iv. dependability requirement
h. "The space user shall be able to use the space system without problems after a 5-
hour training." is considered a
i. usability requirement
ii. performance requirement
iii. space requirement
iv. dependability requirement

3. Complete the following:


a. ……..………………………… model is appropriate when the requirements are well-
understood and changes will be fair limited during the design process.
b. ……..………………………… testing is concerned with testing the individual functions of
the system.
c. Requirements validation is important because …………………..……..…………………………
d. The four main software engineering activities are ……..…………………………,
……..………………………… , ……..………………………… and ……..…………………………
e. ………………………………………. and ………………………………… are examples for management
activities.
f. GoF patterns are ………………………………, ……………………………….. and
…………………………….

4. Use a design pattern to develop the classes (in complete code) to store a string of data
(class Data) as is or stored after being encrypted by any possible combination of DES or AES
algorithms. The data might be encrypted using only one of them or using both in any
possible order.
5. University portal systems can include many portals to serve multiple areas. In this problem,
we are concerned with the educational portal. The users for this system are of three types;
teaching staff (TS), students (ST) and administrative staff (AS).
a. List 10 functional requirements for the given system related to the different types of
users. Clarify in the requirement which of the three types of users are concerned
with this requirement. Each user type should appear in at least 3 functional
requirements.
b. Draw the use case diagram for part (a) showing the three types of users.
c. List 5 non-functional requirements for the given system.

You might also like