Software Eng Notes
Software Eng Notes
Software Eng Notes
Exams Preparation
Msbte Diploma
Exam Papers
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Winter – 19 EXAMINATION
Subject Name: Software Engineering Model Answer Subject Code: 22413
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in
the model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner
may try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components
indicated in the figure. The figures drawn by candidate and model answer may vary.
The examiner may give credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
constant values may vary and there may be some difference in the candidate’s
answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of
relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based
on equivalent concept.
1|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
2|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
3|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
4|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Data Store: A set of parallel lines shows a place for the collection of data
items. A data store indicates that the data is stored which can be used at a
later stage or by the other processes in a different order. The data store
can have an element or group of elements.
Source or Sink: Source or Sink is an external entity and acts as a source
of system inputs or sink of system outputs.
5|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
6|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
7|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
8|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
9|2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
10 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
11 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
12 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
13 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
14 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
b Explain the concept of black box testing and white box testing. 6M
Ans Black Box Testing: Black box
testing
It is a way of software testing in which the internal structure explanation -3M
or the program or the code is hidden and nothing is known and white box
about it. testing
It also known as data-driven, box testing, data-, and functional explanation- 3M
testing.
This type of testing is ideal for higher levels of testing like
System Testing, Acceptance testing.
It is mostly done by software testers.
No knowledge of implementation is needed.
It is functional test of the software.
Testing can start after preparing requirement specification
document.
15 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Techniques used:
o Equivalence partitioning: Equivalence partitioning
divides input values into valid and invalid partitions
and selecting corresponding values from each partition
of the test data.
o Boundary value analysis:
checks boundaries for input values.
Advantages of Black Box Testing
Efficient when used on large systems.
Since the tester and developer are independent of each
other, testing is balanced and unprejudiced.
Tester can be non-technical.
There is no need for the tester to have detailed functional
knowledge of system.
Tests will be done from an end user's point of view,
because the end user should accept the system. (This
testing technique is sometimes also called Acceptance
testing.)
Testing helps to identify vagueness and contradictions in
functional specifications.
Test cases can be designed as soon as the functional
specifications are complete.
Disadvantages of Black Box Testing
Test cases are challenging to design without having clear
functional specifications.
It is difficult to identify tricky inputs if the test cases are
not developed based on specifications.
It is difficult to identify all possible inputs in limited
testing time. As a result, writing test cases may be slow
and difficult.
There are chances of having unidentified paths during the
testing process.
There is a high probability of repeating tests already
performed by the programmer.
White Box Testing:
It is a way of testing the software in which the tester has
knowledge about the internal structure r the code or the
program of the software.
It is also called structural testing, clear box testing, code-based
testing, or glass box testing.
16 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
17 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
2. Project duration:
TDEV= c (E) d
E = effort
= 29 months
SS = 626/29 = 22 staffs
18 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
19 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Cardinality:
In the case of Data Modeling, Cardinality defines the number of
attributes in one entity set, which can be associated with the number of
attributes of other set via relationship set.
Example: One-to-one, One-to-many, Many-to-one, Many-to-many.
b Compare CMMI and ISO for software w.r.to 6M
i)scope
ii)Approach
Iii) Implementation.
Ans Difference between CMMI and ISO based on Difference
based on Scope-
SCOPE: CMMI is rigid and extends only to businesses developing 2M
software intensive systems. ISO is flexible and applicable to all
Approach-2M
manufacturing industries. CMMI focuses on engineering and project
and
management processes whereas ISO’s focus is generic in nature. Implementation
2M
CMMI mandates generic and specific practices and businesses have a
choice of selecting the model relevant to their business needs from 22
developed process areas. ISO requirements are same for all companies,
industries, and disciplines.
20 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
IMPLEMENTATION:
Inception: The question why you want to do this will be answered and
analyses to identify business need, a potential new market with breadth
and depth and services to be provided. The above points establish a basic
understanding of the problem, the people who want a solution, the nature
of the solution that is desired to understand the scope of the project.
Elicitation: This answers for what are things need to do by asking the
customer, the users, and others what the objectives for the system or
product are, what is to be accomplished, how the system or product fits
into the needs of the business, and finally, how the system or product is
to be used on a day-to-day basis
21 | 2 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Describe how the end user (and other actors) will interact
with the system.
Business domain entities that is visible to the end user.
The attributes of each analysis class are defined, and the
services that are required by each class are identified.
The relationships and collaboration between classes are
identified, and a variety of supplementary diagrams are
produced.
Negotiation: It answers for is it actually required? Through which
Customers, users, and other stakeholders are asked to rank requirements
and prioritized the same. Using an iterative approach that prioritizes
requirements, assesses their cost and risk, and addresses internal conflicts,
requirements are eliminated, combined, and/or modified so that each
party achieves some measure of satisfaction.
22 | 2 2