Ans : As discussed on 3.3 which deal with security requirements, it has been stated that the conceptof CIA is very important. Further, security threats are inventive according to the newinformation technology launched. These security threats constantly evolve and are Read More …
Blog
Ques : Describe Software Metrices
Ans : Measurement is fundamental to any engineering discipline and software engineeringis no exception. Software metric is a quantitative measure derived from the attributeof software development life cycle [Fanton and Kaposi, 1987]. It behaves as softwaremeasures. A software measure is Read More …
Ques : Requirements Gathering Tools
Ans : The requirements gathering is an art. The person who gathers requirements shouldhave knowledge of what and when to gather information and by what resources. Therequirements are gathered regarding organisation, which include informationregarding its policies, objectives, and organisation structure, Read More …
Ques : Describe Problems in SRS
Ans : There are various features that make requirements analysis difficult. These arediscussed below: Complete requirements are difficult to uncover. In recent trends in engineering,the processes are automated and it is practically impossible to understand thecomplete set of requirements during Read More …
Ques : Describe Software Requirements Specification (SRS)
Ans : This document is generated as output of requirement analysis. The requirementanalysis involves obtaining a clear and thorough understanding of the product to bedeveloped. Thus, SRS should be consistent, correct, unambiguous & complete,document. The developer of the system can Read More …
Ques : Advantage & Disadvantage of Sequential File Organization
Ans : Advantages : It is fast and efficient when dealing with large volumes of data that need to beprocessed periodically (batch system). Disadvantages Requires that all new transactions be sorted into the proper sequence forsequential access processing. Read More …
Ques : Describe Database Errors
Ans : An error is said to have occurred if the execution of a command to manipulate thedatabase cannot be successfully completed either due to inconsistent data or due tostate of program. For example, there may be a command in Read More …
Ques : Describe Data Fragmentation
Ans : “Fragmentation involves decomposing the data in relation to non-overlappingcomponent relations”.Why do we need to fragment a relation? The reasons for fragmenting a relation are: Use of partial data by applications: In general, applications work with viewsrather than entire Read More …
Ques : Disadvantages of Data Distribution
Ans : The primary disadvantage of distributed database systems is the added complexityrequired to ensure proper coordination among the sites. This increased complexitytakes the form of: Higher Software development cost: Distributed database systems arecomplex to implement and, thus, more Read More …
Ques : Describe Advantages of Data Distribution
Ans : The primary advantage of distributed database systems is the ability to share andaccess data in a reliable and efficient manner. Data sharing and Distributed ControlThe geographical distribution of an organization can be reflected in the distribution ofthe data; Read More …