CMT 311: FUNDAMENTALS OF SOFTWARE ENGINEERING QUESTIONS & ANSWERS.
| Institution | Catholic University of Eastern Africa |
| Course | BACHELOR OF COMPUTER... |
| Year | 1st Year |
| Semester | Unknown |
| Posted By | stephen oyake rabilo |
| File Type | |
| Pages | 7 Pages |
| File Size | 90.37 KB |
| Views | 281 |
| Downloads | 0 |
| Price: |
Buy Now
|
Description
Q1.
a) The Software Development Life Cycle (SDLC) is a process used to design, develop, test, and maintain software applications. It consists of several stages including planning, analysis, design, development, testing, deployment, and maintenance. During each stage, the development team performs various
activities such as gathering requirements, creating a design, coding, testing, and documenting the software.
b) Two important documents in software engineering process are:
Software Requirements Specification (SRS): It is a document that captures the requirements for a software application. It includes details such as user requirements, functional requirements, performance requirements, and other specifications. Software Design Document (SDD): It is a document that describes the architecture, design, and
implementation details of a software application. It includes details such as system architecture, data flow, user interface design, and other technical specifications.
Below is the document preview.
CMT 304 :DATA STRUCTURE AND ALGORITHM
Write a structured C program with an algorithm to Swap two
numbers using third variables and execute the code on the
code blocks. (5 marks)
ii) Create an executable structured code to delete an element between two
items. (5 marks)
b) Discuss THREE basic primary operations of a Graph. (6 marks)
c) Define the following terms:
i) Queue (2 marks)
ii) State and explain THREE time complexities (3 marks)
iii) Below is call the function findIndex with array and number to
be searched.
17 Pages
243 Views
0 Downloads
1.86 MB
CMT 438: ETHICAL HACKING
Q1.
a) Define the following terms as used in Ethical Hacking (5 Marks)
i. Hacking
ii. Ethical Hacking
iii. Ping Sweep
iv. Inverse TCP Flag Scanning
v. Footprinting
b) What is the overall purpose of the footprinting and reconnaissance and list the
major objectives of this phase (5 Marks)
c) List any three skills that a good ethical hacker should possess (3 Marks)
d) List and Explain the Vulnerability Score system as applicable in Ethical Hacking
(4 Marks)
2 Pages
214 Views
0 Downloads
124.29 KB
CMT 311:Fundamentals of Software Engineering
Software Crisis
Software Myths
What is Software Engineering
Evolution of Software Engineering
State-of-art in Software Engineering
567 Pages
273 Views
0 Downloads
11.52 MB
CMT 311: FUNDAMENTALS OF SOFTWARE ENGINEERING QUESTIONS & ANSWERS
Q1a. Explain any TWO advantages of sketching a proposed user interface as opposed to using a drawing program or building a prototype. (4 Marks)
A: Two advantages of sketching a proposed user interface are that it is quick and inexpensive. Sketching allows for easy ideation and exploration of different design options without the need for specialized software or technical skills. It also provides an opportunity to get feedback early in the design process, helping to identify and address potential issues before investing significant resources in building a prototype.
9 Pages
134 Views
0 Downloads
96.14 KB
CMT 316: HUMAN COMPUTER INTERFACE
This course is an introduction to the fundamentals of human-computer interaction, user interface design, and usability analysis.
Students will learn principles and guidelines for usability, quantitative and qualitative analysis methods, and apply them through critiques of existing interfaces and development of new ones.
Topics covered will also include cognitive models, task analysis, psychology, experimental design, and prototyping and evaluating methods.
493 Pages
260 Views
0 Downloads
11.54 MB
GS 101: COMMUNICATION SKILLS PAST PAPER
Institution: Catholic University of Eastern Africa
Year: 2016/2017
Semester: 1st Year, 2nd Semester (1.2)