answersLogoWhite

0

📱

Software Engineering

Software engineering is the process of applying well-developed techniques and practices in order to create new software products. Questions about everything from design patterns to requirements and specification belong here.

1,663 Questions

When rad model of software development is used?

rad model is used when there is a time constraint............ this model is suitable for big projects where the customer requirements are clear

Briefly summarize the test-driven development process?

§Test-Driven Development (TDD) = Refactoring + TFD

§TDD is a just-in-time (JIT) specification activity

§TDD is a continuous confirmatory validation activity

§TDD via Customer/Acceptance Tests

4Specification of requirements

§TDD via Developer Tests

4Specification of design

§TDD is also called Behavior Driven Development (BDD)

What is scm repository?

SCM repository systems are based on a simple idea: the definitive copies of your files are kept in a central repository. People check out copies of files from the repository, work on those copies, and then check them back in when they are finished. SCM systems manage and track revisions by multiple people against a single master set.

Why is silver used for making contact points in electric switches?

A: Because it is a very good conductor has many electrons 27 if I can remember correctly. There is a draw back to using silver that is because has the tendency to oxidize with oxygen as tarnish which occasionally must be eliminated to provide a good connection

What is requirement validation?

Requirements validation is a critical step in the development process, usually after requirements engineering or requirements analysis. Also at delivery (client acceptance test).

Is it possible to be agile and still maintain a quality focus?

Yes. You need to have good documentation and a thorough understanding of the relationship between modules.

How paper presentation in IEEE format on ethical hacking?

You will need to explain some of the points of ethical hacking. These can sometimes help a business to learn where weaknesses are.

What are the arguments for and against considering system engineering as a profession and its own right such as electric engineering or software engineering?

²Communication difficulties

§Different disciplines use the same terminology to mean different things. This can lead to misunderstandings about what will be implemented.

²Differing assumptions

§Each discipline makes assumptions about what can and can't be done by other disciplines.

²Professional boundaries

§Each discipline tries to protect their professional boundaries and expertise and this affects their judgments on the system.

What is procedural design?

Procedural design is when the programmer specifies what must be done and in what sequence. It is based on the concept of the modularity and scope of program code.

Can air cards be traced?

Yes. They are, for all practical purposes, a cell phone. If you had one stolen, report it to the police and the carrier, giving them the ESN and phone number.

Why digital modulation is not enough for radio transmission and what are the general goals for digital modulation?

Worldwide regulation always uses FDM for separating different systems (TV, WLAN, radio, satellite …). Thus, all radio systems must modulate the digital signal onto a carrier frequency using analogue modulation. The most prominent system is the traditional radio: all music and voice use frequencies between, e.g., 10 Hz and 22 kHz. However, many different radio stations want to transmit at the same time.

Therefore, all the original signals (which use the same frequency range) must be modulated onto different carrier frequencies. Other motivations for digital modulation are antenna and medium characteristics. Important characteristics for digital modulation are spectral efficiency, power efficiency and robustness. Typical schemes are ASK, PSK, FSK.

How UltraSurf bypass the proxy?

WikiAnswers does not give information about illegal acts, such as bypassing a proxy server.

What is post compiler?

A compiler translates anything that is a structured syntax, generally a computer language, into machine code or code that an interpreter will execute on a computer. Machine code actually executes on a machine, interpreted code is pure data for the execution engine of the interpreter.

Post compilers, sometimes called post processors, take the compiled code as input and make changes to the code to provide functionality beyond that of the original language.

Examples are:

  • The original C++ language used a C compiler to process most of the file and a post compiler to add the object-oriented extensions
  • Aspect Oriented Programming (AOP) functionality is generally added by a post compiler

What is input -output bound program?

input output bound program is a program (or process in precise way), which spends most of time allocated to it for execution, on input/output devices and need very small CPU time for it.

What is use of Decision Tree?

A decision making tree is essentially a diagram that represents, in a specially organized way, the decisions, the main external or other events that introduce uncertainty, as well as possible outcomes of all those decisions and events.

D. Ghosh Roy

What is background of software engineering and how software engineering evolved?

Software engineering was spurred by the so-called software crisis of the 1960s, 1970s, and 1980s, which identified many of the problems of software development. Many software projects ran over budget and schedule. Some projects caused property damage. A few projects caused loss of life.[3]The software crisis was originally defined in terms of productivity, but evolved to emphasize quality. Some used the term software crisis to refer to their inability to hire enough qualified programmers.

Peter G. Neumann has kept a contemporary list of software problems and disasters.[4]The software crisis has been fading from view, because it is psychologically extremely difficult to remain in crisis mode for a protracted period (more than 20 years). Nevertheless, software - especially real-time embedded software - remains risky and is pervasive, and it is crucial not to give in to complacency. Over the last 10-15 years Michael A. Jackson has written extensively about the nature of software engineering, has identified the main source of its difficulties as lack of specialization, and has suggested that his problem frames provide the basis for a "normal practice" of software engineering, a prerequisite if software engineering is to become an engineering science. {Michael Jackson, "Engineering and Software Engineering" in S Nanz ed, The Future of Software Engineering, Springer Verlag 2010; Michael Jackson, Problem Frames: Analyzing and Structuring Software Development Problems; Addison-Wesley, 2001}.

An RF amplifier amplifies the incoming signal by 200 times Calculate the power gain of this amplifier in dB?

If an RF amplifier amplifies the incoming signal by 200 times, the power gain of the amplifier is +25.9 dB. Power is proportional to voltage squared, so the power gain is 400. The decibel scale is 3 times log2 of the power change.

Which of the following increases the collision resistance of a hash?

The collision resistance of a hash is proportional to the number of hash values that are stored, relative to the number of items that can be hashed, and it is proportional to the adequacy of the hash. The latter means that the hash should usually be of cryptographic quality.

Why do you spend so much time and effort maintaining existing programs?

Because not maintaining them would lead to unfixed bugs and security flaws. If you release buggy software and make no effort to fix them, you will not have any return customers.

How critical is validation when it comes to program performance?

Validation should always be considered in a software program. The amount of validation depends on what the program is doing, and how it is doing it. If the validation is a small percentage of the overall program then it doesn't matter much how efficient it is in terms of performance.

There are good and bad ways (actually inefficient ways) to do validation. If you instrument a program and find that a significant portion of the time is spent in validation you may want to visit the algorithms used in the validation to see if there is a more effective way to do this.

In some cases the performance of validation of data is very important; in other cases it is a side-effect.

What is incremental positioning in cnc machining?

A machine can measure either from the zero point, or from the last position that was. For example, when you say "X10", you mean 10mm from the zero point of the axis X, or you may mean 10mm further than the last position the machine was on the X axis. The way of measuring is decided from the G codes G90 and G91. Running the G90 command, the machine will start to measure using absolute coordinates (measuring from the zero point of the axis) and running the G91 command will set the machine into "incremental measuring".

For making matters more clear, see the following two examples. They generate both exactly the same thing, a rectangle as shown in file p7.jpg. The first code example uses absolute measurements and the second uses incremental measurements. At this point it should be said that almost all machines measures by default using G90 (absolute coordinates). For the following example, we suppose that somehow, the machines start from point 10,10 and not 0,0

REM --- a rectangle drawn using absolute coordinates ---

G90 ; Set absolute measurement

G1 Y80

G1 X80

G1 Y10

G1 X10

REM --- a rectangle drawn using incremental coordinates ---

G91 ;Set incremental measurement

G1 Y70

G1 X70

G1 Y-70

G1 X-70