Starting from:

$25

ECE322-Midterm Solved

Answer the following questions – please be concise.

(a)  Is it possible to have high-quality and low reliability software? What might be a possible example of such software?  Provide an illustrative example. 

(b)  Give some reasons why you would not recommend the use of operational profiles.

(c)  Why would you consider the use constraints in the development of causeeffect graphs. In which sense are they useful?

(d)  What is the difference between software validation and software verification?

(e)   Explain a concept of coincidental correctness.

(g)             What is the relationship between Petri nets and finite state machines? Under which condition Petri net becomes a finite state machine?

(h)             In realizing testing for a given configuration problem considered are the following  components:  printers -2,   plug ins -3, browsers -3, operating systems -3, servers -3, monitors -2, e-mail systems-3, software packages of numeric optimization-3. How much improvement is achieved when running combinatorial testing over testing all possible combinations?


2.  Given is the following psuedocode

begin  program domain_test var  a, b, x, y: real;

read(x,y)

if y<=5 then  (P1) a:= x-y-2 else a:=x+y-2;

if a<-3.0 then (P2) b:=a+x+2y+3; else b:=a-7y+3;

if b 7  then      (P3) print(x); else print (y);

end program

Draw a control flow graph for this pseudocode and determine its cyclomatic complexity.


3. Consider a program that solves the following system of linear equations with a vector of unknown variables x Ax = b

é b1 ù            é x1 ù ê      ú                    ê                 ú ê b2 ú     ê x2 ú where A =[aij], i=1,2,.., n, j=1, 2,…, n,   b =ê ú   and x =ê            ú ê ... ú     ê ... ú êë bn úû          êë xn úû

 

(a)             Discuss a testing strategy using equivalence classes. Elaborate on the valid and invalidequivalence classes. 

(b)             how can you proceed with testing when the number of equations is larger than thenumber of variables, namely dim(b) =n and dim(x) =m and  m<n.


4. The subdomain is described by the following relationships

| x1 |+| x2 |³K1 | x1 |+| x2 |£K2

where 0  < K1< K2.

(a)     plot the subdomain

(b)    is the subdomain open or closed

(c)     Propose an EPC strategy to complete testing here; show the test cases on the plot

(d)    Show test cases produced by the weak n x 1 strategy

More products