Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) Describe any eight activities related to software metrics that involve some degree of software measurement.

b) describe following terms:

i) Emperical relations.

ii) Predictions.

c) Describe the process of selecting an experimental design.

problem 2)a) Define the term 'data'. How to collect, store and extract the data, describe with suitable ex.

b) With ex discuss

i) Ratio and interval scales of measurement.

ii) Correlation of data statistical approach.

problem 3)a) Describe Halstead's major Equations for following:

i) Total Vocabulary

ii) Length

iii) Volume

iv) Level

v) Difficulty

vi) Efforts

Compute estimated program length and efforts required by taking appropriate ex?

b) Describe following terms:

i) Modularity

ii) Morphology

iii) Information flow.

problem 4)a) Describe various types of structural measures.

b) What is cyclomatic complexity? How to compute it?

c) What is software size and what is functionality?

problem 5)a) Describe with appropriate ex developer / tester support for defect repository.

b) Enumerate all components of a Test Plan. Describe test scheduling and test environment planning in details.

problem 6) What is defect? Give defect classification and definition. List and describe different metrics used for defect prevention. What is additional value of plotting weighted defects?

problem 7)a) Describe equivalence partitioning and boundry value analysis with appropriate ex.

b) Describe positive and negative testing concepts.

problem 8)a) State and describe test adequacy criterias for white box testing methodology.

b) prepare a brief note on domain testing. Give some sample test cases for same.

problem 9)a) prepare a brief note on:

i) Test execution and reporting.

ii) GUI Testing.

b) Describe Ad-voc testing with suitable ex.

problem 10)a) What is specification based testing? Describe in detail.

b) prepare a brief note on:

i) Scenario Testing.

ii) Regression Testing.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95635

Have any Question? 


Related Questions in Computer Engineering

Welcome to the pen testing firm of bodgit and run we hope

Welcome to the Pen Testing firm of Bodgit and Run, we hope you will find your work with our company both entertaining (for you) and profitable (for us). To this end we have a client who wants us to do a risk assessment o ...

1 again based on 1 above is it possible to continue

1. Again based on 1 above, is it possible to continue operating a sensor network with a selected number of sensors taken out? Is it possible to identify those nodes? 2. Devise ways (some cryptographic) of securing wirele ...

Think about a time when you were required to accomplish a

Think about a time when you were required to accomplish a new or nonroutine task at work that had the potential to cause injury or illness. Discuss how a management of change process could be used to reduce the risks. Wh ...

1 please provide a brief answera what are the components of

1. Please provide a brief answer: a. What are the components of a Local Area Network (LAN) and common protocols? b. What are the components of Wireless Local Area Network (WLAN) and common protocols? c. How do they diffe ...

1 show why the table size must be a prime number in order

1. Show why the table size must be a prime number in order for double hashing to visit every entry during the probe. 2. Design a hash function that can be used to map the two-character state abbreviations (including the ...

Write a program that produces random permutations of the

Write a program that produces random permutations of the numbers 1 to 10. To generate a random permutation, you need to fill an array with the numbers 1 to 10 so that no two entries of the array have the same contents. Y ...

1 if you were setting up an encryption-based network what

1. If you were setting up an encryption-based network, what size key would you choose and why? 2. What is the average key size of a strong encryption system in use today?

Show that the real and imaginary parts of the unitary dff

Show that the real and imaginary parts of the unitary DFf matrix are not orthogonal matrices in general. Show that the N x N cosine transform matrix C is orthogonal. Verify your proof for the case N = 4. Show that the N ...

The cashregister class has an unfortunate limitation it is

The CashRegister class has an unfortunate limitation: It is closely tied to the coin system in the United States and Canada. Research the system used in most of Europe. Your goal is to produce a cash register that works ...

1 why is antivirus software always developed after the

1. Why is antivirus software always developed after the virus has stricken? 2. Describe the similarities between biological viruses and computer viruses. 3. What are the difficulties faced by a community that wants to fi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro