CS615 Assignment 2 Solution and Discussion


  • Cyberian's Gold

    Assignment No. 02
    Semester: Fall 2019
    CS615 Software Project Management
    Total Marks: 10

    Due Date: 28th Nov 2019

    Assignment no. 2 covers Lec#11 to Lec#15.

    Objectives of Assignment:

    • You will learn the project and its management along with software process models.

    Uploading instructions:

    • Your assignment must be in .doc format. (Any other formats like scan images, PDF, Zip, rar, bmp, etc. will not be accepted).
    • No assignment will be accepted through email.

    Rules for Marking:

    It should be clear that your assignment will not get any credit if:

    • The assignment is submitted after due date.
    • The submitted assignment does not open or file is corrupted.
    • Your assignment is copied from internet, handouts or from any other student
    (Strict disciplinary action will be taken in this case).

    Assignment
    Question 1:
    You have studied software analysis, concepts and principles. You are required to find suitable answers of these guidelines mentioned in the below table from the below list:

    List

    1. System Engineering
    2. Requirement Analysis
    3. Customer
    4. To assess clarity and completeness
    5. Project Manager
    6. System Engineering Team
    7. Follow a set of underlying concepts and principles
    8. Software Engineer
    9. System Analyst
    10. Relevant Experience
    11. Software Solution may solves the wrong problem. Wasted time and money.
    Analysis Concepts and Principles Answer
    Example: What will be the output if no analysis performed? Example Answer: 11
    In which phase, role of software is identified.
    Bridges the gap between system level requirements engineering and software design.
    Data, functions and behavioral requirements are identified by eliciting information gathered from….
    Why requirements are refined and analyzed?
    Who will take care of all the user needs and requirements?
    Who will interact the customer to elicit requirements?
    What is required to perform job properly?
    Who perform requirements analysis generally?
    Who may perform requirement analysis task in complex business application?
    What is required to system analyst to perform duties successfully in chemical industry while his past experience in banking sector?

    Note: One example answer has been given in the table. You are required to write only index numbers against each row in the table as shown in the example.

    NOTE: Submit “.doc” file only. Every student should provide his/her own work, exact copying of the assignment (or some portion of the assignment) from the internet or other students will lead to copy case and zero marks will be awarded. Do not put any query on MDB about this assignment, if you have any query then email at [email protected]

    Deadline:
    Your assignment must be uploaded/submitted on or before 28th Nov 2019.


  • Cyberian's Gold

    Solution:

    Analysis Concepts and Principles Answer
    Example: What will be the output if no analysis performed? Example Answer: 11
    In which phase, role of software is identified. 1
    Bridges the gap between system level requirements engineering and software design. 2
    Data, functions and behavioral requirements are identified by eliciting information gathered from…. 3
    Why requirements are refined and analyzed? 4
    Who will take care of all the user needs and requirements? 5
    Who will interact the customer to elicit requirements? 6
    What is required to perform job properly? 7
    Who perform requirements analysis generally? 8
    Who may perform requirement analysis task in complex business application? 9
    What is required to system analyst to perform duties successfully in chemical industry while his past experience in banking sector? 10

  • Cyberian's Gold

    Solution:

    Analysis Concepts and Principles Answer
    Example: What will be the output if no analysis performed? Example Answer: 11
    In which phase, role of software is identified. 1
    Bridges the gap between system level requirements engineering and software design. 2
    Data, functions and behavioral requirements are identified by eliciting information gathered from…. 3
    Why requirements are refined and analyzed? 4
    Who will take care of all the user needs and requirements? 5
    Who will interact the customer to elicit requirements? 6
    What is required to perform job properly? 7
    Who perform requirements analysis generally? 8
    Who may perform requirement analysis task in complex business application? 9
    What is required to system analyst to perform duties successfully in chemical industry while his past experience in banking sector? 10


Jan
27
(2 Views / 0 Upvotes)
0 Replies

10. COGNITIVE | CLOUD COMPUTING
709a4b58-3423-4963-9e29-bd995cadb5fc-image.png
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.

Aug
19
(33 Views / 0 Upvotes)
2 Replies

Dear Students if you have any query regarding Final Term Exam
Please Feel Free to Ask Cyberian’s

Sep
18
(29 Views / 0 Upvotes)
0 Replies

یہ ۵ جی کیا ہے؟
دوسرے سیلولر نیٹ ورکوں کی طرح ، 5 جی نیٹ ورک سیلولرکلز کرنے کے انتظامات کو استعمال کرتے ہیں جو اپنے ڈومین کو علاقوں میں الگ کرتے ہیں اور ریڈیو لہروں کے ذریعہ انکوڈڈ معلومات بھیجتے ہیں۔ ہر سیل سائٹ کو سسٹم کی ریڑھ کی ہڈی سے وابستہ ہوتا ہے، اس سے قطع نظر کہ وائرڈ یا ریموٹ بیک ہاؤل ایسوسی ایشن کے ذریعے۔ 5 جی نیٹ ورک ایک قسم کی انکوڈنگ کا استعمال کریں گے جسے آف ڈی ایم کہتے ہیں ، جو انکوڈنگ کی طرح ہے جس میں 4 جی ایل ٹی ای کام کرتا ہے۔ تاہم ، ہوائی انٹرفیس کا مقصد...

Dec
17
(15 Views / 0 Upvotes)
21 Replies

Live Updates:
Pakistan’s former dictator Pervez Musharraf was on Tuesday sentenced to loss of life in the excessive treason case by way of a special court docket here, turning into the first navy ruler to get hold of the capital punishment in the country’s history.
567e9088-009d-47b4-a689-988ca233129e-image.png
A three-member bench of the special courtroom, hea...

Sep
6
(44 Views / 0 Upvotes)
0 Replies

فیس بک ڈیٹنگ اپنی پسند کی چیزوں کے ذریعہ پیار تلاش کرنا آسان بناتا ہے - اپنی مشترکہ چیزوں ، جیسے مفادات ، واقعات اور گروہوں کے ذریعہ معنی خیز تعلقات شروع کرنے میں مدد کرتا ہے۔ یہ ڈیٹنگ پروفائل بنانے میں کام کرتا ہے اور آپ کو زیادہ مستند نظر دیتا ہے کہ کوئی کون ہے۔
a5068e0f-944c-4e27-b28d-bec69b167543-image.png
آج ، ہم امریکہ میں فیس بک ڈیٹنگ کا آغاز کر رہے ہیں۔ ہم لوگوں کو انسٹاگرام ...

Aug
22
(101 Views / 1 Upvotes)
1 Replies

I’d say as a blogger and a IT student that it’s a great achievement for a local operator. As we know, communication is expanding globally and we do need faster networks to communicate.
IMG_20190822_194412.jpg

I’d say as a blogger and a IT student that it’s a great achievement for a local operator. As we know, communication is expanding globally and we do need faster netwo...

Sep
6
(15 Views / 0 Upvotes)
0 Replies

b244dd88-39a0-47bb-95f5-5af7cf1991c7-image.png

Image: justin sullivan / Getty Images

کمپنی نے منگل کو اعلان کیا کہ فیس بک اپنی چہرے کی شناخت کی خصوصیات کو بند کرنے میں آسان تر بنا رہا ہے اور اب وہ خود بخود نئے صارفین کو فیس ٹیگنگ کا انتخاب نہیں کرے گا۔

فیس بک اپنے صارفین کے اپ لوڈ کردہ فوٹو میں چہروں کی شناخت کے لئے چہرے کی پہچان کا استعمال...

Aug
6
(22 Views / 0 Upvotes)
0 Replies

Join the celebration at the all-new Apple Aventura.
Our new location opens Saturday, August 10 at 10:00 a.m.
Join us for the grand opening of our new store - located in a bigger space right across from the Aventura Slide Tower. Come celebrate your creativity during opening weekend with free Today at Apple sessions in music, photography, art, and more. And enjoy our vibrant Latin Music Fridays happening throughout the month of August.

Sep
6
(21 Views / 0 Upvotes)
0 Replies

آئی فونز اور ہیکرز پر حالیہ ہیک حملے کی وجہ سے جس کو دنیا میں سب سے زیادہ محفوظ فون سمجھا جاتا تھا اس کی سیکیورٹی کو نظرانداز کیا جارہا ہے۔ کیا آپ کو ایسی کوششوں سے بچایا گیا ہے؟ آپ خود کو ڈیجیٹل طور پر کیسے محفوظ کرسکتے ہیں؟

آئی فون ہیکنگ آپریشنوں کی ایک حالیہ لہر جنہوں نے جنوری تک “ایک ہفتے میں ہزاروں صارفین” کو متاثر کیا ، گوگل کے پروجیکٹ زیرو سیکیورٹی ٹیم کے محققین نے انکشاف کیا ہے۔ ایپل کے آئی فونز کو بڑے پیمانے پر وہاں کے سب سے محفوظ آلات سمجھا جاتا ہے۔ واقع...

Jul
31
(143 Views / 0 Upvotes)
1 Replies

To register your device, go to this link and create your account as an individual user. Select your user type International traveler
On submission of Signup form, a confirmation link will be received in your provided email address. Cl...

    Recent Topics


  • 1
  • 9
  • 1
  • 4
  • 1
  • 2
  • 4
  • 1
| DMCA.com Protection Status