Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1) Give the two orthogonal views of software.

b) With the help of suitable diagram describe the analysis phase of unified approach.

c) Compare Rumbaugh, Booch and Jacobson methodologies.

problem 2)a) Describe encapsulation and information hiding with an ex.

b) What do you understand by common class pattern approach?

problem 3) Draw a use case diagram for a library management system (Show relationship between use cases)

problem 4) List out and describe the four types of prototypes with their application.

b) What do you understand by component based development and rapid application development?

problem 5)a) Develop the simple business process model using the activity diagram based on the following narrative. The purchasing department handles purchase requests from other departments in the company. People in the company who initiate the original purchase request are the "customers" of the purchasing department. A case worker within the purchasing department receives that request and monitors it until it is ordered and received. Case workers process the requests for purchasing products under $1,500, prepare a purchase order, and then send it to the approved vendor. Purchase requests over $1,500 must first be sent out for a bid from the vendor that supplies the product. When the bids return, the case worker chooses one bid. Then, case worker prepares a purchase order and sends it to the approved vendor.

b) Distinguish between collaboration/communication diagram and sequence diagram with diagrams.

problem 6) A token-ring based local-area-network (LAN) is a network consisting of nodes, in which network packets are sent around. Every node has a unique name within the network, and refers to its next node. Various kinds of nodes exist: workstations are originators of messages; servers and printers are network nodes that can receive messages. Packets contain an originator, a destination and content, and are sent around on a network. A LAN is a circular configuration of nodes.

(i) Identify classes for the above scenario using noun phrase approach. Group the appropriate, irrelevant and fuzzy classes separately.

(ii) Identify the relationships and responsibilities of the classes using CRC.

b) List the different corollaries that are used in OOD phase and describe corollary 1: Uncoupled design with less information content.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96629

Have any Question? 

Related Questions in Computer Engineering

Describe a phenomenon that you think it would be

Describe a phenomenon that you think it would be interesting to model using ABM. What are the agents in this model? What properties do they have? What kind of actions can the agents take? What kind of environment do the ...

1 a file contains 2 million bytes how long does it take to

1. A file contains 2 million bytes. How long does it take to download this file using a 56-Kbps channel? 1-Mbps channel? 2. A computer monitor has a resolution of 1200 by 1000 pixels. If each pixel uses 1024 colors, how ...

1 what is security assessment why is it important2 discuss

1. What is security assessment? Why is it important? 2. Discuss the necessary steps in analyzing the security state of an enterprise. 3. What is security assurance? How does it help in enterprise security? 4. What is sec ...

1 suppose you are doing a random walk see previous problem

1. Suppose you are doing a random walk (see previous problem) on the blocks of a city street. At each "step" you choose to walk one block (at random) either forward, backward, left or right. In n steps, how far do you ex ...

Design and implement a left and right justification

Design and implement a left and right justification algorithm that inserts extra spaces after the longest word first, then after the second longest word and so on. In your implementation by making certain assumptions, tr ...

Austins commonplaces of lawbased on your reading of the

Austin's Commonplaces of Law Based on your reading of the Introduction, describe the three commonplaces of law and create examples to illustrate the meaning of each commonplace.

Computer security system security assignment objectivesthe

COMPUTER SECURITY (SYSTEM SECURITY) ASSIGNMENT Objectives: The main objective of this assignment is for the students to understand the security mechanisms in Unix-like operating systems and their interplay with software ...

How could an evolutionary process like ge be used to

How could an evolutionary process, like GE be used to evolve 1. Neural networks? 2. Production systems? Describe in some detail. In particular, how would the crossover operation be implemented? Comment on whether or not ...

Your project is executed with a globally spread virtual

Your project is executed with a globally spread virtual team. The project progress has been found to be too slow. Which measure is most likely to immediately speed up the project? Answer in 4-5 sentences.

Design and implement list insertion and deletion algorithms

Design and implement list insertion and deletion algorithms that use arrays to store both the names and the pointers. Unused (either initially unused or deleted) storage should be maintained as a free list. That is, all ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen