Virtual University of Pakistan Study forum !
Software Process Improvement – CS724
Assignment No. 1
MS (CS), Spring 2016
Due Date: May 11, 2016
Question 1 [25 + 25]
Suppose you are a software developer in a software development company. You are assigned to a team developing a product that belongs to a very well established product line. The project relies heavily on reuse of the existing code base. Mostly, the modules will be reused from the existing code base as it is. A few modules will be modified and then reused in the product while a very few will be developed from scratch.
a) You are scheduled to modify the module “XYZ” during the third iteration of the project. You are assigned user name and password to access the code base immediately after the start of the first iteration. You try to access the module “XYZ” using your user name and password during the second iteration, but you have only read-only access to it. You try again at the start of the third iteration and now it is accessible and you can modify it as well. At the end of third iteration, the module “XYZ” is inspected and baselined. You again try to access the module after a week of baselining the module, but you could not even see it. At the end of the project, the management has complete details of your accesses (successful/unsuccessful) as well as modifications to module “XYZ”.
Please develop the “A” level model for the Access Control process (a software configuration management activity) your company is following.
b) You and Mr. Ali are scheduled to modify the module “XYZ” during the third iteration of the project. Mr. Ali has also been assigned user name and password to access the code base right after the start of iteration 1. Ali gets some free time during the second iteration and requests to access the module “ABC”, a copy of the module is copied to his local machine. When requests to edit it, the request is turned down. You request to access the module immediately after the start of iteration 3 and get its copy. Then you request to modify it, the request is granted and you start modifying the module. Next day, Ali also requests to access the module and is provided with a local copy. But when he requests to modify it, the request is again denied. You signal the completion of your modifications on 4th day of iteration 3. Ali against requests to modify the module on 5th day of third iteration. He is provided with the fresh copy of the module (including the modifications made by you) and his modification request is granted. He modifies the module and signals completion of his modifications on 6th day of iteration 3.
Please develop the “A” level model for the Synchronization Control process (a software configuration management activity) your company is following.