Professional Documents
Culture Documents
University of Zimbabwe: B.Sc. Electrical Engineering (Honours) Part 2
University of Zimbabwe: B.Sc. Electrical Engineering (Honours) Part 2
University of Zimbabwe: B.Sc. Electrical Engineering (Honours) Part 2
UNIVERSITY OF ZIMBABWE
QUESTION 1
c) Explain with examples the design goals and the layer functions of multi-tiered
system architectures [8 marks]
QUESTION 2
a) What are the advantages of the Rational Unified Process over the traditional
Waterfall software process model . [6 marks]
b) Describe with the assistance of a diagram, describe the dynamic phases of the
Rational Unified Process Model and associated workflow activities.
[14
marks]
2
QUESTION 3
a) An online system requires a user to fill in Full Name, Date of Birth, and a 10 digit
phone number. For each data entry item ,suggest equivalent classes for valid and
invalid data and determine the boundary values of the classes
[12 marks]
b) List the steps that you would recommend for a software inspection meeting
[ 8 marks]
QUESTION 4
The cruise control function of a vehicle Cruise Control and Monitoring System can be
viewed as a process control problem as illustrated below
The speed control algorithm is enabled and disabled as a result of inputs received from
the driver via the car sensors.
Speed Control has a set point, the desired cruising speed, and a controlled variable, the
current speed of the car. The control algorithm compares the set point with the controlled
variable with the goal of increasing or decreasing the current speed as necessary to make
it approximately equal to the desired speed. The control algorithm achieves this by
making positive or negative adjustments to the throttle, which is an input to the engine.
The engine increases (or decreases) the speed of the car by increasing or decreasing the
shaft (wheel) rotation. The shaft triggers a pulse every time it completes a full rotation.
The system determines the current speed of the car from the shaft rotation.
QUESTION 5
Draw possible UML class diagrams from the following use case:
Use Case: Authenticate ATM Customer
Brief Description: The Customer wants to identify him/herself to the System.
A project constraint states that identification is made with a card and a
personal identification number (PIN). The ATM System uses the service of a Bank
Authentication Server (BAS) to verify PIN.
Precondition: Connection to Bank System is available.
Precondition: All transactions are logged .Each Log includes transaction result (success
failure), date,. time,card details
Primary Actor: Customer
Main Success Scenario:
1. Customer inserts card; System reads card details.
2. System validates card type.
3. Customer provides PIN to System.
4. System requests BAS to verify identification information.
5. BAS informs System that identification information is valid, and System
informs Customer.
6. Use case ends
Alternative Flows:
(1-5)a. (at any time) Customer cancels the authentication process.
(1-5)a.1. System ejects the card.
(1-5)a.2. Use case ends in failure (ATM produces a prompting sound and display
appropriate message)
1b. System is out of service:
1b.1. System ejects the card and informs Customer that it is currently out of service.
1b.2. Use case ends in failure.
5b.1a. System ascertains that Customer entered an incorrect PIN for the third time.
5b.1a.1. System swallows card and informs Customer to see Bank for further details.
5b.1a.2. Use case ends in failure.
[20 marks]
4
QUESTION 6
QUESTION 7
Car parking payment uses a bank card swipe system which lifts or closes road barrier