answersLogoWhite

0

📱

Software Engineering

Software engineering is the process of applying well-developed techniques and practices in order to create new software products. Questions about everything from design patterns to requirements and specification belong here.

1,663 Questions

What is the difference between array linklist?

Linked list consists of data nodes each pointing to next in the list .An array consist of contiguous chunk memory of predetermined size

You want the code of Discrete fourier transform in C language for your image processing program using a filter function to enhance the tiff image.?

/* Discrete Fourier Transform and Power Spectrum Calculates Power Spectrum from a Time Series Copyright 1985 Nicholas B. Tufillaro */ #include #include #define PI (3.1415926536) #define SIZE 512 double ts[SIZE], A[SIZE], B[SIZE], P[SIZE]; main() { int i, k, p, N, L; double avg, y, sum, psmax; /* read in and scale data points */ i = 0; while(scanf("%lf", &y) != EOF) { ts[i] = y/1000.0; i += 1; } /* get rid of last point and make sure # of data points is even */ if((i%2) == 0) i -= 2; else i -= 1; L = i; N = L/2; /* subtract out dc component from time series */ for(i = 0, avg = 0; i < L; ++i) { avg += ts[i]; } avg = avg/L; /* now subtract out the mean value from the time series */ for(i = 0; i < L; ++i) { ts[i] = ts[i] - avg; } /* o.k. guys, ready to do Fourier transform */ /* first do cosine series */ for(k = 0; k <= N; ++k) { for(p = 0, sum = 0; p < 2*N; ++p) { sum += ts[p]*cos(PI*k*p/N); } A[k] = sum/N; } /* now do sine series */ for(k = 0; k < N; ++k) { for(p = 0, sum = 0; p < 2*N; ++p) { sum += ts[p]*sin(PI*k*p/N); } B[k] = sum/N; } /* lastly, calculate the power spectrum */ for(i = 0; i <= N; ++i) { P[i] = sqrt(A[i]*A[i]+B[i]*B[i]); } /* find the maximum of the power spectrum to normalize */ for(i = 0, psmax = 0; i <= N; ++i) { if(P[i] > psmax) psmax = P[i]; } for(i = 0; i <= N; ++i) { P[i] = P[i]/psmax; } /* o.k., print out the results: k, P(k) */ for(k = 0; k <= N; ++k) { printf("%d %g\n", k, P[k]); } }

What is an example of how an embedded object in software works?

For example, a spreadsheet object can be brought into a word-processing document. Any time the spreadsheet object is updated in the original spreadsheet software, the object is automatically updated in the destination document.

What OSS does Sprint use?

OSS is the Apple processing unit found in iPhones, Macs, and other apple devices. Sprint doesn't carry for Apple products so it does not have an OSS version.

A passive threat to computer security is?

passive threat of a data or information processing system, a threat of disclosureof information without changing the state of the system.For example of a passive threat is one that could result in the recoveryof sensitive information through the unauthorized interception of a data transmission.

Draw functional decomposition diagram with an example?

Functional is another word for workable. Decomposition is another word for falling apart. diagram is another word for drawing. I hope you can find someone who understands your question better than I have

Top 50 universities in UK?


UniversityofCAMBRIDGE









University of OXFORD









IMPERIAL College London









UCL (University College London)









KING'S College London









University of EDINBURGH









University of MANCHESTER









University of BRISTOL









LONDON School of Economics and Political...









University of WARWICK









University of GLASGOW









University of BIRMINGHAM









University of SHEFFIELD









University of YORK









University of ST ANDREWS









University of NOTTINGHAM









University of SOUTHAMPTON









University of LEEDS









DURHAM University









University of SUSSEX









University of LIVERPOOL









CARDIFF University









University of BATH









University of ABERDEEN









QUEEN MARY, University of London









NEWCASTLE University, NEWCASTLE Upon Tyn...









University of LANCASTER









University of LEICESTER









University of READING









QUEEN'S University of Belfast









University of DUNDEE









University of SURREY









LOUGHBOROUGH University









University of EXETER









School of Oriental and African Studies, ...









University of ESSEX









University of STRATHCLYDE









BRUNEL University









University of EAST Anglia (UEA)









ROYAL HOLLOWAY University of London









ASTON University









SWANSEA University









University of BRADFORD









GOLDSMITHS, University of London









BANGOR University









HERIOT-WATT University









ABERYSTWYTH University









University of KENT









The OPEN University









University of HULL

Why do you use a b c d e f in hexadecimal number system why don't p q r s t u or anything else?

The use of a b c d e f, along with 0 1 2 3 4 5 6 7 8 9, in representing hexadecimal numbers is simply a matter of accepted convention. You could certainly use p q r s t u, or something else, but you would need to understand the rules of arithmetic when doing so, and you would be flying in the face of established convention.

How is a context diagram used by software engineers?

System context diagrams (SCD) are used by software engineers to show how software based systems act as a whole and what the input and output factors would be. SCDs are used early in a project to show users what is available and the scope of the project.

Which command displays amount of total and available memory?

You can use the DOS command MEM to show total and available memory, but it only shows the memory for the process that is running the command shell. It will not show the memory in terms of Windows, nor will it work at all for Windows 7.

What is a good example of a software development management?

Software development management is the process of overseeing work that encompasses five areas. These areas are risk, requirement, change, software configuration, and release.

What is the diffference between waterfall model and modified waterfall model?

Modified waterfall model verified and validate the user requirements for every phase. Meanwhile, waterfall did not, it only verify and validate user requirement at the end of the phase.

6 What is the role of a Micro sequencer in Microprogramming Control Unit?

In computer architecture and engineering, a sequencer or microsequencer is a part of the control unit of a CPU. It generates the addresses used to step through themicroprogram of a control store.

Usually the addresses are generated by some combination of a counter, a field from a microinstruction, and some subset of the instruction register. A counter is used for the typical case, that the next microinstruction is the one to execute. A field from the microinstruction is used for jumps, or other logic.

Since CPUs implement an instruction set, it's very useful to be able to decode the instruction's bits directly into the sequencer, to select a set of microinstructions to perform a CPU's instructions.

Most modern CPUs are considerably more complex than this description suggests. They tend to have multiple cooperating micromachines with specialized logic to detect and handle interference between the micromachines.

When was Steam - software - created?

Steam - software - was created on 2003-09-12.

Blood bank management system-UML diagram?

The UML are behavioral diagram used to describe a set of actions that some systems(s) should or can perform in collaboration with one or more external users of the system. In this case, blood bank management systems.

Discuss the advantages of waterfall model?

Advantage: -

1-You get the software according to your demand.

2-It is best for small projects.

3-It is very much sequential & systematic.

What is information hiding in software engineering?

The Modules should be designed specifically so that no information(Algorithm and data) contained within the module is not accessible to the other module that have no need of that information.

Hiding implies that Effective modularity can be achieved by defining a set of independent modules that communicate with one another only through information necessary to achieve software function.

What ways can object oriented systems be considered cure to the software crisis?

It isn't clear what you mean by the "software crisis". The benefits of object oriented systems are usually in the re-use of code (not having to write the same type of code over and over again), which leads to a better ROI (return on investment).

This means you can leverage what you already have done to get a product to market faster.

What are the four p's of software engineering?

There four p's in software engineering. The four p's are people , product, process, project.

Why do you think software development is risky?

Not all models of software engineering are risky. The spiral model takes care of risk in every phase.

Provide three examples of software development projects that would be amenable to prototyping?

  1. Mobile App Development: Creating a new mobile app could benefit from prototyping to quickly test user interfaces and gather feedback on functionality before finalizing the design.
  2. E-commerce Website: Developing an e-commerce platform allows for prototyping to validate the user experience and checkout processes, ensuring they meet customer expectations before full implementation.
  3. Enterprise Software Solutions: Prototyping can be effective in enterprise software projects to demonstrate workflows and gather stakeholder input, ensuring that the final product aligns with business needs and requirements.

What is meant by a well-engineered software product?

A well-engineered software product is one that is designed and developed with a focus on quality, performance, maintainability, and scalability. It adheres to best practices in software development, including proper architecture, coding standards, and thorough testing. Additionally, it is user-friendly, meets the needs of its target audience, and is adaptable to future changes. Overall, it strikes a balance between functionality and reliability, ensuring a positive user experience.

As part of the overall systems engineering process there are a variety of software development methods but the three most common at DoD are the Waterfall Approach the Incremental Approach and the Appr?

The three most common software development methods used by the Department of Defense (DoD) are the Waterfall Approach, the Incremental Approach, and Agile development. The Waterfall Approach is a linear and sequential model where each phase must be completed before the next begins, making it suitable for well-defined projects. The Incremental Approach allows for partial implementation and delivery of software in stages, enabling early testing and feedback. Agile development emphasizes flexibility, iterative progress, and collaboration, accommodating changes throughout the project lifecycle.