0% found this document useful (0 votes)
22 views3 pages

SDT24

QP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views3 pages

SDT24

QP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Question Paper

Exam Date & Time: 30-Apr-2024 (02:30 PM - 05:30 PM)

MANIPAL ACADEMY OF HIGHER EDUCATION

DEPARTMENT OF I&CT, MIT, Manipal


SUBJECT: SOFTWARE DESSIGN TECHNOLOGY -(ICT 2228)
BTech(Computer and Communication Engineering), IV semester
SOFTWARE DESIGN TECHNOLOGY [ICT 2228]
Marks: 50 Duration: 180 mins.

Des
Answer all the questions. Section Duration: 180 mins
ANswer ALL the Questions. Missing data, if any, may be suitably assumed

1A) Imagine you are tasked with designing a chat tool, focusing on the following key features: (5)

a. One-on-one chat with low delivery latency

b. Small group chat capability (up to 100 people)

c. Online presence indication

d. Multiple device support allowing simultaneous logins

e. Push notifications

Your design should address scalability and interoperability requirements. Elaborate on the design
guidelines / principles you would consider or adapt to create this chat application.
1B) A software test engineer is assigned the job of doing black box testing. He comes up with the (3)
following test cases given in Q1B, many of which are redundant. Identify the set of non-redundant
test cases which can be selected using equivalence class partitioning approach from input
perspective for black box testing?

Figure Q1B
1C) When Drivers and Stubs are used in software testing? Which types of software testing approach (2)
leads to creating more stubs?

2A) Suppose a software company has developed an application that needs to be tested for the (5)
following issues: Datatype errors, Boundary value violations, Functional errors, Nonconformity with
requirements, Architectural and component-level design errors.
Page 1 of 3
Outline a general testing strategy, highlighting the testing technique that is most appropriate for
ensuring the product's quality.
2B) Create a state diagram that represents the operational states and transitions of an elevator system. (3)
The elevator system consists of multiple elevators that serve different floors in a building. The
diagram should effectively illustrate the possible states and transitions that each elevator can go
through, taking into account states like "Idle," "Moving," "Opening Doors," and "Closing Doors." The
transitions should capture the logic of how elevators respond to calls from passengers, move
between floors, and manage the opening and closing of doors.

2C) A textile organization wants to develop an Inventory Control System for its internal use. The (2)
requirements are well understood and scope is well constrained. However the project is required to
be delivered within short period of time (as soon as possible). Propose a life cycle model for this
scenario and provide reason for justification of your answer.

3A) Identify a suitable software architectural style suitable for design of database applications and (5)
Explain the architecture style in detail.

3B) The PQR Institute has developed a system for assessing programming assignments submitted by (3)
students. The system receives the number of correct answers (out of 50) and the number of bonus
points (out of 10). It calculates the total score and provides a grading as follows:

Greater than or equal to 40 - "Excellent"

Greater than or equal to 30 and less than 40 - "Good"

Less than 30 - "Needs Improvement"

In addition, if the total score is less than 0 or greater than 60, an error message ("Invalid Score") is
displayed. Design test cases using equivalence class partitioning and boundary value analysis for
this programming assessment system.
3C) Give two examples of information about a problem domain that can be captured in UML Activity (2)
Diagrams, and two ways in which these diagrams can be useful for Requirements Analysis

4A) Design the test cases for the following code snippet using path testing. You are expected to follow (5)
the following steps to design an effective test case with a high probability of revealing defects.

i) Draw the CFG (Control Flow Graph)

ii) Find the Cyclomatic Complexity using three methods.

iii) Identify the independent paths (Basic Path Set)

iv) Derive test cases

int average (int[ ] value, int min, int max, int N)

int i, totalValid, sum, mean;

i = totalValid = sum = 0;

while ( i < N && value[i] != -999 ) {

if (value[i] >= min && value[i] < = max){

totalValid += 1; sum += value[i];

i += 1;

Page 2 of 3
if (totalValid > 0)

mean = sum / totalValid;

else

mean = -999;

return mean;

}
4B) Examine the steps involved in risk identification and their importance in the early stages of project (3)
planning. Illustrate how using a risk item checklist, questionnaire, risk components, and drivers can
contribute to a comprehensive risk identification process.

4C) What are reviews in the context of software engineering? List the types of software reviews. (2)

5A) Summarize the tasks in the inception, elaboration, negotiation, specification, and validation phases (5)
of requirements engineering. Emphasize the importance of each phase in creating a solid
foundation for software development.

5B) Evaluate the effectiveness of the Call and Return architectural Style in achieving modifiability and (3)
scalability. Analyze its strengths and weaknesses.

5C) Translate the piece of java code given below into a sequence diagram. (2)

public class classA

private classB B = new ClassB();

public void m1(){

B. ma();

B.mb();

-----End-----

Page 3 of 3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy