Examen Software Engineering 2010-2011 05/09/2011



Similar documents
Sample test Secretaries/administrative. Secretarial Staff Administrative Staff

HOE WERKT CYBERCRIME EN WAT KAN JE ER TEGEN DOEN? Dave Maasland Managing Director ESET Nederland

Assuring the Cloud. Hans Bootsma Deloitte Risk Services +31 (0)

Special Interest Group Oracle WebCenter

Specification by Example (methoden, technieken en tools) Remco Snelders Product owner & Business analyst

Object Oriented Design

GMP-Z Annex 15: Kwalificatie en validatie

How To Understand And Understand Universtitie Mls 2.2.2

~ We are all goddesses, the only problem is that we forget that when we grow up ~

Lean Six Sigma Assessment Tool

Research Report. Ingelien Poutsma Marnienke van der Maal Sabina Idler

IT-waardeketen management op basis van eeuwenoude supply chain kennis

Maximizer Synergy. BE Houwaartstraat 200/1 BE 3270 Scherpenheuvel. Tel: Fax:

Risk-Based Monitoring

Business Process Automation

AANMELDING. International student - Berkeley College

Public. Big Data in ASML. Durk van der Ploeg. ASML System Engineering Product Industrialization, October 7, 2014 NTS Eindhoven

MAYORGAME (BURGEMEESTERGAME)

CO-BRANDING RICHTLIJNEN

employager 1.0 design challenge

Chapter 24 - Quality Management. Lecture 1. Chapter 24 Quality management

Java: Learning to Program with Robots. Chapter 11: Building Quality Software

Virtualisatie. voor desktop en beginners. Gert Schepens Slides & Notities op gertschepens.be

Data Driven Strategy. BlinkLane Consul.ng Amsterdam, 10 december Ralph Hofman Arent van t Spijker

Oversight Management: een zinvolle aanvulling!

How To Test A Website On A Web Browser

OGH: : 11g in de praktijk

Software product management. Inge van de Weerd

Relationele Databases 2002/2003

101 Inspirerende Quotes - Eelco de boer - winst.nl/ebooks/ Inleiding

Design Document. Developing a Recruitment campaign for IKEA. Solve-

Asking what. a person looks like some persons look like

IP-NBM. Copyright Capgemini All Rights Reserved

COOLS COOLS. Cools is nominated for the Brains Award! Coen Danckmer Voordouw

Vibe OnPrem 3.x Makes the Business work!

Shopper Marketing Model: case Chocomel Hot. Eric van Blanken 20th October 2009

IMPLEMENTING AN EFFECTIVE INFORMATION SECURITY AWARENESS PROGRAM

A Central examinations and testing conceptual knowledge in economic contexts

Starten met ARLearn Het leren van toekomst

Storage in Microsoft Azure Wat moet ik daarmee? Bert

Hoorcollege marketing 5 de uitgebreide marketingmix. Sunday, December 9, 12

How To Design A 3D Model In A Computer Program

12/17/2012. Business Information Systems. Portbase. Critical Factors for ICT Success. Master Business Information Systems (BIS)

Tuesday, February 26, Unit testen in de praktijk

Inhoudsopgave. Vak: Web Analysis 1 Vak: Web Information 1 Vak: Web Science 2 Vak: Web Society 3 Vak: Web Technology 4

Abstraheren van modellen

The information in this report is confidential. So keep this report in a safe place!

THE EMOTIONAL VALUE OF PAID FOR MAGAZINES. Intomart GfK 2013 Emotionele Waarde Betaald vs. Gratis Tijdschrift April

Digitale muziekbewerking en productie

IT Works check. December 12th, 2012

GMP-Z Hoofdstuk 4 Documentatie. Inleiding

Engineering Process Software Qualities Software Architectural Design

Load Balancing Lync Jaap Wesselius

Corporate Universities Aanjagers van de lerende organisatie

The Importance of Collaboration

How to deliver Self Service IT Automation

Vermenigvuldig en Afdeling (Intermediêre fase)

IC Rating NPSP Composieten BV. 9 juni 2010 Variopool

Department of Mathematics and Applied Mathematics Departement Wiskunde en Toegepaste Wiskunde

Energy Awareness Displays! Making the Invisible Visible!!! Dirk Börner!!! SURFnet Innovatieregeling Duurzaamheid & ICT! Symposium Groene ICT: Daar

The network serves as a medium for new media art. This does not comprise a

The Top Ten Most Commonly Asked Questions About VN T Vision Inspiration Navigation

Verticale tuin maken van een pallet

Definitions. Software Metrics. Why Measure Software? Example Metrics. Software Engineering. Determine quality of the current product or process

Network Assessment Client Risk Report Demo

Peer Assessment. Measuring & Monitoring Team Performances. Ir. Vincent Brugemann and Robert-Vincent de Koning Bsc. Challenge the future

Information technology specialist (systems integration) Informatietechnologie specialist (systeemintegratie) Professional activities/tasks

Vragen en opdracht. Complexity. Modularity. Intra-modular complexity measures

NL VMUG UserCon March

Copyright 2015 VMdamentals.com. All rights reserved.

Help! Financiële planning PDF

12 1 Food. 1 Welk eten vind je lekker? 2 You have seen the film.

CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed.

Daan & Rembrandt Research Wendelien Daan By Willemijn Jongbloed Group D October 2009

EEN HUIS BESTUREN ALS EEN FABRIEK,

Requirements Lifecycle Management succes in de breedte. Plenaire sessie SPIder 25 april 2006 Tinus Vellekoop

Port4Growth Masterclass Philips Innovation Services: Hoe innovatief ben je eigenlijk?

Patiënten met Onverklaarde Lichamelijke Klachten: Aanzet tot een persoonlijkheidsprofiel

Hoofdstuk 2 Samenwerking en afstemming in de zorgketen

Met je hoofd in de wolken. Ard-Jan Glas

ISACA Roundtable. Cobit and 7 september 2015

IJkdijk: June :33:06

HR Transformation and Future of HR Brussel, 25 april 2013 Material part 1/2

Cisco Small Business Fast Track Pricing Initiative

VR technologies create an alternative reality in

Security Assessment Report

Workshop(TestNet(( Najaarsevemenent(2014(

Spread. B&R Beurs. March 2010

Univé customer survey: Pay-As-You-Drive (PAYD) insurance

Inhoud. Xclusief Verzekeringen 4. Xclusief Auto 7. Xclusief Wonen 8. Xclusief Jacht 11. Xclusief Evenementen 12. Contact 15

CMMI version 1.3. How agile is CMMI?

ITCulinair Cisco InterCloud

How To Use Social Media Effectively

RO&RC : ISAF regels over reclame - Richtlijnen KBYV

Uw partner in system management oplossingen

Corporate Security & Identity

Logging en Monitoring - privacy, beveiliging en compliance Enkele praktijkvoorbeelden

Cloud. Transformatie. Cases.

AANMELDING. Zorg ervoor dat je alle velden van het aanmeldingsformulier invult. Lees de onderstaande tips voordat je het formulier invult:

Private Equity Survey 2011

Transcription:

Belangrijk: Schrijf je antwoorden kort en bondig in de daartoe voorziene velden. Elke theorie-vraag staat op 2 punten (totaal op 24). De oefening staan in totaal op 16 punten. Het geheel staat op 40 punten. Vraag 1. Introduction [.../2] Geef de 6 principes van Extreme Programming. Fine scale feedback Continous process Shared Understanding Programmer welfare Coding -> first unit test then code Testing -> all code must have tests, acceptance tests are run often Vraag 2. Project Management [.../2] Wat is een known known, een unknown known en een unknown unknown? Known knowns: The things you know you know, you can safely make assumptions here. Unknown knowns: The things you know, you don t know. You can prepare for these during planning. Unknown unknowns: The things ou do not know, you don t know. These you cannot prepare for during planning. The best you can do is being aware and spot opportunities and do a thorough risk analysis. Vraag 3. Use Cases [.../2] Geef twee voor- en twee nadelen van het gebruik van Use Cases. Voordelen: - requirements more understandable (actors provide end users perspective) - requirements more precise. (scenarios are sufficiently detailed to test) - requirements open. (Actors perspective emphasizes the what (and much less the how) - Helps to validate solution against requirements - Helps to verify the requirements against users needs Nadelen: - requires close interaction with various stakeholders - needs iterations to improve earlier misconceptions - a lot of hard work - Use cases tend to result in hard to maintain systems - Identifying actors and use cases may omit requirements (Completeness not guaranteed) - Focus on scenarios restricts evolving requirements. Pagina 1/5

Vraag 4. Domain Models [.../2] Kan je uitleggen hoe role-playing werkt? Denk je dat dit helpt bij creatief denken? - Role-playing is a way to achieve common understanding between all parties involve(domain experts, analysts,...). It helps in creative thinking due to non-strict setting of the role-playing and the interaction between individuals. - Basic Steps - Create list of scenarios - Assign Roles - Each member receives a number of CRC Cards - Repeat - Rehearse Scenarios + Script = Responsibilities on CRC Cards - 4.2 Correct CRC Cards and revise scenarios + Rehearsals will make clear which parts are confusing - Until scenarios are clear - Perform final scenario Vraag 5. Testing [.../2] Wat is het verschil tussen stress-testing en performance testing? Stress-Testing: Tests extreme conditions - tries to break the system. Performance testing: Test run-time performance in normal conditions, time consumption memory consumtion. Checks if the system is performant enough according to the requirements... Vraag 6. Design by Contract [.../2] Wat is het Liskov substitutie principe? Replacing an instance of a superclass by each of its subclasses is allowed........ Waarom speelt dit een belangrijk rol binnen het object georiënteerde paradigma en voor design contracten? It defines the rules for inheritance and therefore subcontracts... Vraag 7. Formal Specifications [.../2] Wat heeft cleanroom development te maken met Formele Specificaties? Cleanroom development tries to reduce cost and time by eliminating errors in specification and design and by ensuring that the implementation does not introduce defects. This can be done with formal specification and verification: assertions, pre and post conditions...... Pagina 2/5

Vraag 8. Software Architecture [.../2] Wat is een component? En wat is een connector? Component: An encapsulated part of a software system with a designated interface. Components may be represented as modules (packages), classes, objects or a set of related functions... Connector: A connection between components. There are static connectors that appear directly in source code (e.g., use or import keywords) and dynamic connectors that deal with temporal connections (e.g., method invocations)... Vraag 9. Quality Control [.../2] Hoe zou je een review meeting organiseren? Review meetings should: typically involve 3-5 people require a maximum of 2 hours advance preparation reviewers use checklists to evaluate products last less than 2 hours The review minutes should summarize: What was reviewed Who reviewed it? What were the findings and conclusions? Decision Accepted without modification Provisionally accepted, subject to corrections (no follow-up review Rejected, subject to corrections and follow-up review Vraag 10. Software Metrics [.../2] Wanneer voldoet een coupling metriek niet aan de representation condition? Geef ook een voorbeeld. If the metric doesn t measure what we understand as coupling. vb1: high LCOM value (high cohesion) by accessor methods vb2: classes with low coupling but nevertheless high CBO value, because there is no difference between data, method or inheritance coupling Vraag 11. Refactoring [.../2] Geef 4 code smells die met refactoring kunnen opgelost worden. Duplicated code Nested conditionals Large classes/methods Pagina 3/5

Abusive inheritance Vraag 12. Conclusion [.../2] Als je het Silver Bullet artikel hebt gelezen: Wat is het verschil tussen essentie (essence) en ongelukken (accidents? essence: the difficulties inherent in the nature of software accidents: those difficulties that today attend its production but are not inherent. Als je het Killer Robot artikel hebt gelezen: Geef de drie belangrijkste redenen waarom het fout ging en leg uit waarom je dit de belangrijkste vindt. Developers of Killer Robot worked under enormous stress => bad planning Killer Robot Programma was prima Donna, co-workers claim => makes verification impossible Silicon Techtronics Employee Admits Faking Software Tests Pagina 4/5

Pagina 5/5