VU Projects Video Lectures Handouts Past Papers Quizzes Assignments & GDB border= Members Free SMS Service FB Page
VU Projects Video Lectures Handouts Past Papers Quizzes Assignment,GDB Members SMS Service FB Page

Software Process Improvement – CS724

Assignment No. 1

MS (CS), Spring 2016

Due Date: May 11, 2016

Instructions

  • The assignment is of 50 points in total and contains 1 question.
  • Cheating/copying from any source will result in “F” grade in the course.
    • No assignment will be accepted after the due date.

Question 1                                                                                                                  [25 + 25]

Suppose you are a software developer in a software development company. You are assigned to a team developing a product that belongs to a very well established product line. The project relies heavily on reuse of the existing code base. Mostly, the modules will be reused from the existing code base as it is. A few modules will be modified and then reused in the product while a very few will be developed from scratch.

a)      You are scheduled to modify the module “XYZ” during the third iteration of the project. You are assigned user name and password to access the code base immediately after the start of the first iteration. You try to access the module “XYZ” using your user name and password during the second iteration, but you have only read-only access to it. You try again at the start of the third iteration and now it is accessible and you can modify it as well. At the end of third iteration, the module “XYZ” is inspected and baselined. You again try to access the module after a week of baselining the module, but you could not even see it. At the end of the project, the management has complete details of your accesses (successful/unsuccessful) as well as modifications to module “XYZ”.

Please develop the “A” level model for the Access Control process (a software configuration management activity) your company is following.

b)      You and Mr. Ali are scheduled to modify the module “XYZ” during the third iteration of the project. Mr. Ali has also been assigned user name and password to access the code base right after the start of iteration 1. Ali gets some free time during the second iteration and requests to access the module “ABC”, a copy of the module is copied to his local machine. When requests to edit it, the request is turned down. You request to access the module immediately after the start of iteration 3 and get its copy. Then you request to modify it, the request is granted and you start modifying the module. Next day, Ali also requests to access the module and is provided with a local copy. But when he requests to modify it, the request is again denied. You signal the completion of your modifications on 4th day of iteration 3. Ali against requests to modify the module on 5th day of third iteration. He is provided with the fresh copy of the module (including the modifications made by you) and his modification request is granted. He modifies the module and signals completion of his modifications on 6th day of iteration 3.

Please develop the “A” level model for the Synchronization Control process (a software configuration management activity) your company is following.

 

Views: 48

Attachments:

© 2017   Created by Muhammad Anwar Tahseen.   Powered by

Badges  |  Report an Issue  |  Terms of Service