Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Activity Lesson 13 Software Reuse

1. What major technical and nontechnical factors hinder software reuse? Do you personally
reuse much software and, if not, why not? 
2. List the benefits of software reuse and explain why the expected lifetime of the software
should be considered when planning reuse. 
3. Explain what is meant by “inversion of control” in application frameworks. Explain why
this approach could cause problems if you integrated two separate systems that were
originally created using the same application framework. 
4. Most desktop software, such as word processing software, can be configured in a
number of different ways. Examine software that you regularly use and list the
configuration options for that software. Suggest difficulties that users might have in
configuring the software. Microsoft Office (or one of its open-source alternatives) is a
good example to use for this exercise. 
5. Why have many large companies chosen ERP systems as the basis for their
organizational information system? What problems may arise when deploying a large-
scale ERP system in an organization? 
6. What are the significant benefits offered by the application system reuse approach when
compared with the custom software development approach? 
7. The reuse of software raises a number of copyright and intellectual property issues. If a
customer pays a software contractor to develop a system, who has the right to reuse the
developed code? 
8. What is the difference between Design Time Configuration and Deployment Time
Configuration?
ANSWER:
1. The number of technological problems revolve around the software's reusability. This
applies to the software's ability to adapt. How a project is organized and financed are
examples of non-technical problems.
2. A. Accelerated development
B. Effective use of specialists
C. Increased dependability
D.  Lower development costs 
E. Reduced process risk
F. Standards compliance
As software is reused, it requires fewer lines of code to be written. Method risk has been
reduced. The cost of current software is established, while the cost of production is still a
judgement call. This is a crucial aspect of project management since it lowers the margin
of error in project cost estimates.
3. The Inversion of Control (IoC) and Dependency Injection (DI) patterns are all about
removing dependencies from your code. To use a framework to construct a structure,
you create concrete classes that inherit operations from the framework's abstract
classes. You also describe "callbacks," which are methods that are invoked when the
system senses an occurrence. Control in the method is managed by framework objects
rather than application-specific objects. This is referred to as "inversion of authority."
When two or more systems call the application code at the same time, each assumes
possession of the application's main event loop, this is known as inversion of control.
4. 1. Preferences screen
2. Customization screen
3. Organizer screen
4. Definition of templates
5. Definition of styles
6. Definition of macros
7. Inclusion of add-ins (e.g. Endnote)
In MS-Word 2007 there are difficulties to set a password to the document. It is not like
previous versions where a menu bar is included.
MS-Word 2007 has settings with all options (paragraphs, page layouts etc) embedded in
the relative tool but difficult to find.
For example word option is included in circular office button on upper left corner. The
Options dialog box used to be accessible by choosing Options from the Tools menu in
previous versions.
It is impossible to see or print the settings of all system preferences on a single screen.
5. The procedures and activities of an enterprise must be articulated in the device
configuration language when deploying a large-scale ERP system in an organisation,
and there may be a discrepancy between the concepts in the corporation and the
concepts defined in the configuration language.
6. Increase the efficiency of the apps. Reduce the time it takes to create apps. Improve the
interoperability of information systems. Reduce the number of employees working on
app development. Personnel can be transferred more quickly from one mission to the
next. Reduce the cost of software creation and maintenance.
7. Since he controls the established code, a client who hires a software contractor to build
a product has the right to reuse it. The contractor is actually billed for the work he has
done. Despite the fact that he wrote the code, he cannot reuse it because he is not the
owner of the code.
8. Deployment-time configuration An administrator or deployer configures the application
before deploying the application into the target environment. Deployment-time
configuration may use: The same WebLogic Server deployment
configuration and deployment plan created during development. The design time
configuration is developed basing on java code. Hence JDBC parameters are required to
configure. Where as run time adapter is completly developed on native code (C/C ).
Hence it requires ODBC parameter(DNS) to connect to data base at run time.

You might also like