) Estimating Blas
It is a type of error that occurs at stage when estimates
‘are made, If the estimate is done early, there are less
chances of inaccuracy, The greater the chance there are
more chances of inaccuracy.
(il) Estimating Contingencies
Contingency is a technique wherein the programmer
‘can estimate the desired code inorder to implement a function.
It deals with resource estimate scheduling and increased cost.
‘To.estimate contingency prior knowledge of programmer about
new product must be made and its range should be selected.
Each software size should include the concept of estimating
contingencies with product code.
Q30, Explain about scheduling and project tracking.
Answer: Model Paper-t, Q2(b)
Scheduling
Project scheduling is determined based on the resources
that are encountered over planned product development phase.
This estimation is done by analyzing the data depending
on the historical experience organization. If such data is not
available then factors like resource and time that are publicity
available are used for determination. The conditions that should
be consider. for scheduling are,
1. Various project phase definitions
Various resource categories included
Different software methods used
‘Various product types being developed
‘Various levels of programmes skills
a rns
Degrees of project.
The conditions can vary among organization and
projects. As the.organization must focus on gathering the
resource distribution data. After this, the overall project schedule
is followed. This is as follows,
1, Develop asstaffing plan.
“2, Establish/create a preliminary schedule by performing
comparison among cumulative resource needs and
expected needs,
3. _ Review the preliminary plan sos to ensure that there is
a consistent assignments of staffing based on schedule
and resource profile.
The process of scheduling is done based on work
breakdown structure which is dependent on the current project
phase as well as previous experience.
Project Tracking
Project tracking is a projéct ptocess that focuses on
schedule and checkpoints. This process is referred to as earned-
value project scheduling that focuses on following,
‘SPECTRUM ALLIN-ONE JOURNAL FOR ENGINEERING STUDENTS
t1.22 SOFTWARE PROCESS AND PROJECT MANAGEMENT [JNTU-HYDER Ay
3.
Determine checkpoints for each project phase to perform tasks like, ;
(Creation of module based on specification that are completed and approved
Gi) Creation of module that has complete design, inspected and corrected
(iii) Creation of unit plan module that is complete, reviewed and approved
(iv) Creation of module that is complete and clean
(¥) Creation of code module that is inspected completely and corrected
(i) Creation of module that is unit tested, delivered to SCM with baseline integration.
Determine the resources that are needed to complete each checkpoint based on total project.
Plot the plan as shown below, ;
90
Complete
percentage
Were
hown in the dotted line.
‘Actual performance ofthe project is tracked as the project progress. This is s
As ee is applied Sealed project, the overall status ofthe project is. specified to users. Project tracking fay i
projects can be done based on the following key points, :
i Each checkpoint must be measurable and specific.
2 A detailed plan must be created that allows the checkpaints to
(i) Complete 50% of the module design, conduct reviews make corrections
(i) Complete 25% of test cases without errors.
- (iii) Complete: 15% of test program without error.
3, The project plan helps in determining the percentage of that is complete.
Q31, List and explain the basic configuration management functions.
4.
Answer :
Basic Configuration Management Functions
In basic configuration management system initially a baseline is developed, after the initial product gets stabilized on eas
successive set of increase (of a baseline) a new baseline in developed.
Each baseline is then maintained within a database, at one place with all the changes that produced it.
Thus, it can be said that a baseline is the official repository of the product and it holds the most current version,
A baseline includes the approved changes and the tested code which is fully protected,
‘A baseline act as a soutce that helps the programmers to ensure that/their task is performeid consistently,
‘The main SCM tasks are,
(Configuration control
(ii) Change management :
(iii). Revisions : :
(iv) Versions,
(v) Deltas
(vi) Conditional code.
oe ee
WARNING: Xerox/Phot6vopiying ofthis bdciieé WIORIMINAL act. ‘Anjbrie fdtitid-qlitty.isLIABLE to face LEGAL. proceedings.
é-
ynitt Software Process Maturity, Process Reference’ Mod
ration Cont
1.23
‘The task of configuration can revolves throughout an official copy of code.
‘The eariest way to protect each system revision is to Keep a separate official copy at ever revision level.
° r
Initial Establishing [Baseline
development baseline update validation
Authorize
change :
Change
implementation
‘Approve Change
change validation
Figure (ik: Overview of Change Management
g This would take a let of storage space, one of the issue is with code division,
‘When more than one group work on different copies ofthe same or similar versions of common code, sometimes different
unl ciges areiiede to cocrect Gi see problems,
{} Thefinal cost ofthis can be understood by considering system drivers.
Example, one programmer may require a copyiof the ‘system control program for unit test.
Although the control program may not completed, the functions this programmers required may be unstable.
*
Hence, its helpful to provide a control program copy with this function rather than write the developers time.
Revisions .
Revisions is one of the significant task of configuration management.
Inthis large systems, some prograim such as control system, provides essential function for all others.
+ Ifthe component's module have been combined into a testable unit, then it can be tested with the latest control program
level.
% These previous tests can be re-run to find the problem source, if further problem are found.
+
% Ian early driver is produced again, using the latest versions of the control program modules, some of these module will
likely be changed, so the previous tests are not exactly produced.
One of the key feature is to keep track of all the changes that have’ been made to module and test cases,
Always there is only one latest official version and all previous versions are identified and maintained, such that these
copies can be used in tracing problem. 3 a:
— Cofttinuous process of revision, integration and test is nothing but the development.
Derivations
One of the powerful software testing feature can be used to find what has changed.
Example: Ifa program works on day the and not in the next day, then the first step isto find what are the changes.
vessvoy, ns SPECTRUM ALLAN-ONE JOURNAL FOR ENGINEERING STUDENTS 0 ertySOFTWARE PROCESS AND PROJECT MANAGEMENT [JNTU-HYDE|
201 Level 226
Module TestA
201 Level 227
: Ml Rerun test A
Jule
Fase Dont .d the rerun was attempted
: \e rerun was
4 Dereon data would sh thea was un ont ogame 16 : onlevel ny,
Changes x and y can be identified.
} Data then might be maintained in such derivation record is,
1. Revision level of every module. !
and tests.
2, Revision level of the tools used to assemble compile link, Joad and exeeute the program
3. Tie test cases used and the test information employed.
4, Thefiles used. siogasons, nla
5, Software ahd hardware system configuration along with peripherals, features, options and hardvang
change levels
6. The operational steps. :
7. record of job streams being executed when there is no stand along test.
Versions :
fa module changes then there canbe other potential issues. Mi
‘with few small coding differences.
Example q
‘The folowing figure shows tha, the standard memory
mode switch would hold the larger memory siz. i
“The dierent programs would have the different designation, like MEMS and MEML forthe standard and lage memory
ore different tasks can be implements by the same modal,
nanagement would be wed blow S12K andthe other sng
ey .
management modules.
Lage Standard,
; memory memory
Figure (i): Versions
Deltas
% Execution of deltas is another test of configuration management.
‘+ On one hand, the versions solves the problem of different functional requirement for the same module but on the other
hand creates multiple copies of the same code.
* — Toovercome this problem of multiple copies of same code use case deltas.
WARNING: Xerox/Photocopying-ofthig Bobs & CRIMINAL ‘act: Anyone fouiid guity is LIABLE to face LEGAL proceedings.
g ra-1, Sofware Process Maturity, Process Reference Models
1.25
:
MEM
| MEM
Large memory Standard memory
Figure (iv): Dottas
ample: The above igure illustrates that saving the base medule like MEM, along with the changes required o makeitinto MEML.,
When the changes are required on MEM then the changes canbe made diretl, with interface will the delta code,
» The changes are only made to the MEML code and the MEM code is left unchanged.
-pnditional Code
*
°
soe
Conditional program construction is used to han
dle the small changes between modules,
Consider an example, .
Billing Billing Billing
Program program program
NY cr PA
Newyork Connecticut Pennsylvania
Figure (vi: Conditional Code Scenario
The above example shows the billing program which include different functions depending on the,requirement of a state
‘on sales tax.
‘The program includes different sales tan versions, but they would not be included in final system unless called for a system
installation.
This requirement of conditional code is fulfilled by using system generation options.
Based on the conditional code, one of the many available optional modules is selected depending on the specific state
‘where the program was used, i
One usage of conditions, case the code control as there is only one official copy if every module.
Another advantage of the conditional code is that providing one complete copy of the complete program.
All the code would be available, and users have to select the specific combination required for installation.
Once conditional code is ready, this requires that all the program options and features be provided to the end users, but it
is dificult to control unauthorized distribution and use. ‘i 4
soibesoe SPECTRUM ALLINGONE JOURNAL FOR ENGINEERING STUDENTS, «3 :cnuen
\ ,1.26
Q32, Explain in detail about SQA.
Answer:
Software Quality Assurance (SQA)
Quality is used to determine ifthe software meets all the
requirements that were specified during design phase, Software
quality assurance is used to monitor the: software processes and
methods for ensuring its quality, By using audits of quality
management system, SQA improves the software quality:
SQA is very much related to quality assurance in product
manufacturing. There are some noticeable differences between
a software product and a manufactured ‘Amanulactured
product is something that is physica entity which can be ee?»
‘Whereas software product is invisible and temporary: roe
cof this nature functions, benefits and costs sat pear i
‘measured easily. When # manu
shipping. It vendo bea complete, Finished Prod bsnl
software products intangible and can Pe"
: aware i expensive :
ws 1 es gacato develoring and executing
test cases.
tree ta because the
ee wor as per users commands, lence Here