AMIETE –
CS/IT (OLD SCHEME)
NOTE: There are 9 Questions in all.
· Question 1 is
compulsory and carries 20 marks. Answer to Q.1 must be written in the space
provided for it in the answer book supplied and nowhere else.
· Out of the remaining
EIGHT Questions answer any FIVE Questions. Each question carries 16 marks.
· Any required data not
explicitly given, may be suitably assumed and stated.
Q.1 Choose
the correct or the best alternative in the following: (210)
a.
Requirements review process is carried
out to
(A) Spend time
in requirements (B) Improve quality
of SRS
(C) Document SRS (D) Analyse SRS
b. Estimation of size for a project is dependent on
(A)
Delay factor (B) Schedule
(C) Time (D) Cost
c. Program volume of a software product is
(A)
V= N (B) V= (N/2)
(C) V= N*N (D) V= N +
d. In which model, fixes are done without detailed analysis of the long term effects?
(A)
Iterative
model (B) Reuse
orientation model
(C) Quick fix
model (D) None of the
above
e. If user participation is available, which model is to be chosen?
(A)
Spiral model (B) Iterative
enhancement model
(C) RAD model (D) Waterfall
model
f. Inheritance and polymorphism belong to
(A)
Structural model (B) Object
oriented model
(C) Logical
model (D) Functional
model
g. For a
function of n variables, boundary value analysis yields
(A)
4n + 1 test cases (B) 4n + 2 test
cases
(C) n + 4 test cases (D)
n + 2 test cases
h. The module in which instructions are related through flow of control is
(A)
Functional cohesion (B) Procedural
cohesion
(C)
Logical cohesion (D) Temporal
cohesion
i. Cyclomatic complexity is denoted by
(A) V(G) = e –
n + 2P
(B) V(G) =
Number of regions in a graph
(C)
(i) and (ii)
(D)
V(G) = e + n - 2P
j. Reliability of a software is usually estimated at
(A) Design
phase (B) Testing
phase
(C) Coding
phase (D)
Analysis
Answer any FIVE
Questions out of EIGHT Questions.
Each question carries
16 marks.
Q.2 a. Explain the
following software life cycle models: (9)
(i) Prototyping model
(ii) Spiral
model
(iii) Iterative enhancement model
b. Explain key process areas and common feature attributes of
capability maturity models. (4)
c. Draw the
graphical plot to illustrate process improvement learning curve. (3)
Q.3 a. Give
characteristics of SRS. When can SRS lead to failure? (5)
b. Explain
various validation methods done during SRS. (4)
c. Consider railway reservation system. Design SRS. Draw necessary data flow diagrams. Give its structural analysis. (7)
Q.4 a. Explain the
following modularity techniques:
(i) Module
coupling
(ii) Module cohesion (6)
b. Explain dynamic modeling and functional modeling design
methodologies. Give an example for illustration. (6)
c. Explain
the following verification techniques used in software design: (4)
(i) Consistency
checkers
(ii) Walkthroughs
Q.5 a. Define the following software metric parameters: (6)
(i) Lines of code
(ii) Token count
(iii) Function count
b. Explain fan-in and fan-out parameters in information metrics. (4)
c. Consider a program to multiply two matrices, which takes
input from user, multiplies two matrices and displays the final output.
Calculate the following: (6)
(i)
Average number of live variables
(ii) Average life of variables
(iii)
Module weakness
Q.6 a. Explain
various risk assessment and risk control features of risk management
activities. Give an example. (5)
b. Define the
following terms concerned to software project planning:-
(i) Difficulty metric
(ii) Productivity versus difficulty
(iii) Development subcycle (6)
c. Explain in detail COCOMO model and give
its enhancements. (5)
Q.7 a. Explain how
failure intensity and reliability affect each other. (5)
b. Explain the following reliability
models and give their respective equations: (6)
(i)
Macro models
(ii) Logarithmic Poisson model
c. Consider basic reliability model. Assume that a program will
experience Vo =200 total failures with an initial failure intensity of λo=25
failure/CPU hr. Calculate the failures experience after 15 and 150 CPU hr of
execution. (5)
Q.8 a. Compare
functional testing and structural testing techniques. (5)
b. Consider a program for determining the
previous date. Its input is a triple of day, month and year with the values in
the range:
1 <= month <= 12
1
<= day <= 31
1800
<= year <= 2000
The
possible output would be previous date or invalid input date. Design the
boundary value test cases. (5)
c. Explain the
following testing techniques: (6)
(i) Unit testing
(ii) Integration testing
(iii)
System testing
Q.9 a. Explain the
following software maintenance techniques: (6)
(i) Corrective
maintenance
(ii) Adaptive maintenance
(iii)
Perfective maintenance
b. Define software reverse engineering.
Explain various levels of reverse engineering. (5)
c. Mention
various parameters in estimation of software maintenance costs. Give
mathematical equation for the following estimation models and explain each
term:
(i) Boehms’s
model
(ii) Reuse Oriented Model (5)