2023年-软件工程课后习题答案.docx
《2023年-软件工程课后习题答案.docx》由会员分享,可在线阅读,更多相关《2023年-软件工程课后习题答案.docx(13页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、软件工程课后习题答案1.1) The definition for software presented in Section 1.2 applies to the Web sites. There are, however, subtle differences between a Web site and conventional software. Among the most important are that the content that a Web site presents is considered to be part of the Web Application wh
2、ile that data processed by conventional software is often considered to be separate fiom the processing functions delivered.1.4) Who would have thought that software would lead to: (1) a change in the dating habits of many young people (Internet dating); (2) the way people communicate (cell phones);
3、 (3) methods of warfare (cyberweapons); (4) the diagnosis of diseases (MRIs and related computer-based diagnostic devices), and (5) the manner in which people acquire and enjoy media (music, DVDs, etc.).1.6) The Law of Conservation of Familiarity: As the system evolves the users engineers, developer
4、s all those associated must have the complete knowledge of the content and behavior to achieve satisfactory results. Increase in growth may diminish that knowledge (mastery); hence the average increase in growth remains invariant as the system evolves.1.7) Many modern applications change frequently
5、before they are presented to the end user and then after the first versions have been used. A few ways to build software to stop deterioration due to change would be: Make sure that software is designed so that changes in one part of a program do not create side-effects in another part of the progra
6、m. Make sure that software is designed so that it does not depend on external devices or systems that are likely to change with time. Make sure test cases and results are archived and available so that the software can be retested when changes are made. Make sure you spend time understanding what th
7、e customer wants.1.8) The two broadest categories encompass risks associated with economic loss and risks to the well being of people. It might be a good idea to select five risks (culled from the sources noted) and present them to the class. Look for humorous as well as serious risks.1.9) The same
8、approach to software engineering can be applied for each of the six categories, but it must be adapted to accommodate the special requirements of each category.1.10) There are literally dozens of real life circumstances to choose from. For example, software errors that have caused major telephone ne
9、tworks to fail, failures in avionics that have contributed to plane crashes, computer viruses (e.g., Michelangelo) that have caused significant economic losses and attacks on major e-commerce sites.1.11) The Law of Declining Quality: The quality of systems will decline unless they are maintained by
10、various procedures to adapt to the environmental changes. This concept is similar to the deterioration” discussed in Problem 1-5.1.12) The Law of Conservation of Organizational Stability: The average effective global activity rate is invariant over the lifetime of a product.Pattern:CommunicationInte
11、nt:To establish a collaborative relationship with the customer in an effort to define project scope, business requirements and other project constraints.,Type:Initial context:Stage pattern(1) Appropriate stakeholders have been identified and are willing to participate in communication (2) Stakeholde
12、rs agree that a problem exists and that software may provide a solutionProblem:Requirements must be elicited from stakeholders and organized in a way that can be used by software engineers. All stakeholders must collaborate to define requirements and to identify those areas where requirements are un
13、certain.Solution: Each stakeholder must develop a description of the functions, features, information and behavior that are exhibited by the software. To accomplish this, a structured, facilitated meeting is conducted. For more details, see Sections 7.3, 7.4 and 7.5.Resulting Context:When this patte
14、rn has been successfully completed, basic information required for thedevelopment of an analysis model has been acquired and documented in some manner. Use-cases (user scenarios) have been developed, along with basic descriptions of system function and behavior and the data objects that are to be ma
15、nipulated and/or produced/Related Patterns: Conducted a meeting; requirement gathering; developing use-cases; building a mini-spec; negotiating requirements, prioritization.Known Uses/Examples: Communication is mandatory at the beginning of every software project; is recommended throughout the softw
16、are project; and is mandatory once the deployment activity is underway.1.5) ) Hierarchical: dataflow, call return, layerNon-hierarchical: data centered, object-orientedNon-hierarchical architectures are probably best implemented using object-oriented and event driven programming techniques.1.6) ) A
17、compete design of the PHTRS system can be accomplished the architectural design model elements discussed in this chapter, Because the application is driven by the data architecture that is chosen, you should begin with a detailed data design. Following that, design classes and related architectural
18、information should be represented.1.9) ) When transform mapping is used where transaction mapping should be used, two problems arise: (1) the program structure tends to become top heavy with control modules-these should be eliminated; (2) significant data coupling occurs because information associat
19、ed with one of many processing actions* must be passed to an outgoing path. Classic examples include: many engineering analysis algorithms, many process control applications, some commercial applications. Look for a well-developed DFD and correct mapping to program structure.1.10) ) Many people defi
20、ne architectural style and architectural pattern as being one in the same (a general system model used as the starting point for system design). A framework might be defined by some people as a set of classes providing a general solution to a problem that can be refined to create an application or s
21、ubsystem.1.11) ) Data centered architecture: airline reservation system; library catalog system; hotel booking system Data flow architecture: any engineering/scientific application where computation is the major functionCall and return architecture: any I-P-0 applicationObject-oriented architectures
22、: GUI-based applications; any OO application Layered architecture: any application in which the application functions must be decoupled from the underlying OS or network detail. Client server software is often layered.1.12) ) The concepts of styles and patterns occur for buildings and software at bo
23、th macroscopic and microscopic levels. For example, overall styles (center-hall colonial, A-frame) can be found in a house. These represent macroscopic styles. Lower-level microscopic patterns (for a house) can be found in categories of wood molding, fireplace designs, windows, etc.11.1) Guard-condi
24、tion is written in Object Constraint Language (OCL) and specifies a condition that must be met before the event can occur, and action expression defines an action that occurs as the transition takes place.11.2) Like object-oriented components, traditional software components are derived from the ana
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2023 软件工程 课后 习题 答案
限制150内