R20 Se Unit-2
R20 Se Unit-2
R20 Se Unit-2
Programming (XP), Other Agile Process Models, A Tool Set for the Agile Process,
Chapter 2:Software Engineering Knowledge, Core Principles, Principles That Guide
Each Framework Activity
Chapter 3: Requirements Engineering, Establishing the Groundwork, Eliciting
Requirements, Developing Use Cases, Building the Requirements Model,
Negotiating Requirements, Validating Requirements.
Chapter 1
Testing Principles. Glen Myers states a number of rules that can serve well as
testing objectives:
• Testing is a process of executing a program with the intent of finding
an error.
• A good test case is one that has a high probability of finding an as-yet
undiscovered error.
Davis suggests a set of testing principles that have been adapted for use
Principle 1. All tests should be traceable to customer requirements. The objective
of software testing is to uncover errors.
Principle 2. Tests should be planned long before testing begins.
• Test planning can begin as soon as the requirements model is complete.
• Therefore, all tests can be planned and designed before any code has been
generated.
Principle 3. The Pareto principle applies to software testing. In this
context the Pareto principle implies that 80 percent of all errors uncovered during
testing will likely be traceable to 20 percent of all program components.
Principle 4. Testing should begin “in the small”(Components-Unit Test) and
progress toward testing “in the large.”
First test the modules and then test the entire system(software).
Principle 5. Exhaustive testing is not possible.
it is impossible to execute every combination of paths during testing.
2.9.5 Deployment Principles
• The deployment activity encompasses three actions: delivery, support, and
feedback.
• For agile process model each delivery cycle provides the customer and end
users with an operational software increment that provides usable
functions and features.
• Principle 1. Customer expectations for the software must be managed.
the customer expects more than the team has promised to deliver,
and disappointment occurs immediately.
Principle 2. A complete delivery package should be assembled and
tested. A CD-ROM or other media (including Web-based downloads)
containing all executable software, support data files, support documents, and
other relevant information should be assembled and thoroughly beta-tested with
actual users.
Principle 3. A support regime must be established before the software
is delivered. An end user expects responsiveness and accurate information when
a question or problem arises.
Principle 4. Appropriate instructional materials must be provided to
end users. The software team delivers more than the software itself.
Appropriate training aids (if required) should be developed and troubleshooting
guidelines should be provided.
Principle 5. Buggy software should be fixed first, delivered later. Under time
pressure, some software organizations deliver low-quality increments with a
warning to the customer that bugs “will be fixed in the next release.”This is a
mistake.
Chapter 3
2.10.6 Validation:
• The work products produced during of requirements engineering are
assessed for quality during a validation step.
• Requirements validation examines the specification , all software
requirements have been stated unambiguously, inconsistencies, and
errors have been detected and corrected and that the work products
conform to the standards established for the process, the project, and the
product.
• The primary requirements validation mechanism is the technical review
2.10.7 Requirements management.:
• Requirements for computer-based systems change, and the desire to
change requirements persists throughout the life of the system.
• Requirements management is a set of activities that help the project team
identify, control, and track requirements and changes to requirements at
any time as the project proceeds.
2. The homeowner uses the keypad to key in a four-digit password. The password
is compared with the valid password stored in the system. If the password is
incorrect and reset itself for additional input. If the password is correct, the
control panel awaits further action.
3. The homeowner select the keys in stay or away to activate the system.
✓ Stay activates only perimeter sensors (inside motion detecting sensors are
deactivated).
✓ Away activates all sensors.
4. When activation occurs, a red alarm light can be observed by the homeowner.
The basic use case presents a high-level story that describes the interaction
between the actor and the system.
• These and other questions should be asked and answered to ensure that
the requirements model is an accurate reflection of stakeholder needs and
that it provides a solid foundation for design.