tutorbin

software engineering homework help

Boost your journey with 24/7 access to skilled experts, offering unmatched software engineering homework help

tutorbin

Trusted by 1.1 M+ Happy Students

Recently Asked software engineering Questions

Expert help when you need it
  • Q1:Need to do the complete coding in python This is the starting codeSee Answer
  • Q2:A Palindrome is a word that is the same when written forwards and when written backwards. For example, the word "refer" is a Palindrome. The Dafny program ex3errors.dfy, which you will find on the website, contains a method PalVerify that is supposed to verify whether a word is a Palindrome, where the word is represented as an array of characters. The method was written by a novice software engineer, and contains many errors. i Without changing the signature or the code in the while loop, fix the method so that it veriifes the code. Do not add any Dafny predicates or functions: keep the changes to a minimum. ii Write a tester method (you may call it anything you like) that verifies that the testcases refer, z and the empty string are Palindromes, and ry and 123421 are not. The tester should not generate any output. See Answer
  • Q3: Students are requested to write a report of-maximum five pages on the followings: 1- Elaborate on how design is a problem-solving Use examples in your narrative discipline. 2- What is design thinking process (DTP) and how can it help resolving design problems 3- Search for two architecture case studies where you highlight the design problem and how the DTP can help having better design outcomesSee Answer
  • Q4: Consider the System Administration Management system that we studied for our first homework.1. Class Model for System User Given: CRC Cards for ModifyUserGUI, SystemUserManager, SystemUser Derive: Model these classes based on attributes and operations assigned using our MVC stereotype patterns. Hand-draw the Class Model with Class Diagrams for ModifyUserGUI,SystemUserManager, SystemUser. The diagrams must include: Stereotype in the Name Compartment Attributes Operations Associations See Answer
  • Q5: 2. Class Model for Product Given: Class Diagram for SystemUser Derive: Class Model for SystemUser, SystemAdministrator, and GeneralUser showing Inheritance and Polymorphism along with Compartments for Class Name, Attributes, and Operations. Assumptions:o SystemAdministrator has the same attributes as SystemUser, but adds an attribute for a Super Password for accessing administrative parts of the system.GeneralUser has the same attributes as SystemUser.See Answer
  • Q6:1. State the problem briefly; what software are you proposing and why?See Answer
  • Q7:2. Write down the proposed product specification: an initial list of requirements (not yet analysed) that the customer wants and needs in the software to be developed. Include some functional, non-functional & technical requirements.See Answer
  • Q8:3. Do a preliminary requirements analysis: analyse the initial requirements you listed in Question 2, discussing e.g. potential conflicts or interactions between the requirements and considering development constraints, resources, risks, etc... You may wish to use a MOSCOW list as part of the analysis. (If relevant, note down also any changes to initial requirements from this analysis.) See Answer
  • Q9:4. List some key deliverables of the project (e.g. user documentation...)See Answer
  • Q10:7. Suggest and briefly justify an appropriate version/revision control strategy for the product's source code, to allow your team of 5 developers to collaborate while tracking/ controlling changes. See Answer
  • Q11:8. Discuss various measures of quality, in specific relation to your software.See Answer
  • Q12:9. Suggest and justify either prototyping, or testing/validation, strategies which can be shown to be appropriate for your product. See Answer
  • Q13:10. Briefly discuss the scope for further developments, enhancements etc. as part of the anticipated software maintenance after delivery. See Answer
  • Q14:Task one: add socket io Adding sockets to NodeJs ApplicationSee Answer
  • Q15:Task Two: Once you have completed listening to the lecture, and the audio is attached and the slide as following, write down a 100 words summary of your reflection about the lectureSee Answer
  • Q16:This Competency Assessment assesses the following outcome(s): IT232M1: Explore various software process models. GEL-8.03: Apply critical thinking to formulate a logical solution to a problem. Software Design and Modeling Purpose Given a requirement, you will examine various software design and modeling techniques by diagramming and analyzing a solution. You will create an IPO chart, pseudo-code, flowchart diagram and perform a desk-check analysis to help formulate your solution to the problem posed. Assessment Instructions Note: For this assessment, you will not be writing any actual code. You are just going through the design and modeling of this scenario. Using an IPO chart, a flowchart diagram, and pseudocode, you will design a routine that will accept a Fahrenheit temperature and convert that temperature to its Celsius and Kelvin equivalents. Hint. The term routine can mean function, subroutine, procedure, etc., depending on the language in question. Assessment Requirements A user enters in a Fahrenheit temperature, and gets back two values: Celsius temperature Kelvin temperature The code routine will accept one argument, tempFahrenheit and will calculate two values, tempCelsius and tempKelvin. It will call two routines internally: • ConvertFahrenheitToCelsius will be a routine to convert a Fahrenheit temperature to Celsius • ConvertFahrenheit ToKelvin will be a routine to convert a Fahrenheit temperature to Kelvin. Use these variable and routine names in your solution. Research and find the formulas to convert Fahrenheit temperature to Celsius and Kelvin and then apply critical thinking skills to formulate a logical programmatic solution to convert the user-entered value of Fahrenheit temperature to Celsius and Kelvin equivalents.See Answer
  • Q17:Then design the two routines that will implement the formulas you found in your research. We do this by examining how the routines should behave and walk ourselves through the design using the following tools. 1. Create your IPO chart. This is where you determine your inputs-processes- outputs. 2. Create a flowchart diagram showing the flow of logic for the solution to these problems. 3. Create your pseudo-code. Hint: Pseudocode is a mix of simple syntax from real programming languages and English. When modeling your full routine or program you will show every aspect of it in the pseudocode. In the case of adding your algorithms or processing to IPO charts or flowcharts, you can use snippets of the pseudocode to only show the pertinent processing. How can you prove that your algorithm is correct? You will perform an experiment and then analyze your results to determine if your algorithm is correct. We must follow the scientific method to ensure repeatable results in our experiment. First, we determine a hypothesis: "What value is computed for an input of 3"? We note the expected result from our hypothesis. It will later be compared to the actual results from our experiment to determine if the experiment passed or failed. The process we use to perform our experiment is called a desk check. A desk check is when you identify all the variables used in the routine and place them in a table. You then examine a potential input value, step through the code, and fill out the table at each step in the code. So, when a variable in your code has its value changed, be sure to update that new value in your desk checking table. At the end of the table you will have calculated your actual result. This investigation will identify if you have designed the correct logic to realize a correct result. The actual result should match the expected result. You must desk check each routine at least three times. After you have completed your experiment, you need to analyze your results. Did you prove or disprove your hypothesis?See Answer
  • Q18:Discuss the results of your experiment in a Word document. Show your analysis and your data then explain your conclusions. EXAMPLE: Here is an example scenario using the square algorithm. The square routine will take a number in as a parameter, perform calculations to determine the square of the number and return the result. You will examine the routine and determine the variables of interest. Then experiment with different input values as you build your desk check tables. Sample Desk Check: Using your pseudo-code algorithm. This routine has three variables of interest: num-the input parameter • i-the value of the counter Value - the result of the calculation Our hypothesis will be: If you call the square routine with an input number, the calculated result returned by the square routine will be that number squared. The input value times itself (number X number). 1. Hypothesis: If you call the square routine with an input of 3, the calculated result should be 9. Experiment Desk check using 3 as input parameter Expected Result: square(3) = 9 2. num, value 033 136 239 Actual Result 2 3. Hypothesis: If you call the square routine with an input of 7, the calculated result should be 49.See Answer
  • Q19:4. Experiment Desk check using 7 as input parameter Expected Result square(7) = 49 i numvalue 077 17 14 27 21 37 28 47 35 5 7 42 6 7 49 Actual Result 49 Directions for Submitting Your Assessment Submit one document that contains your IPO chart, flowchart, pseudocode and analysis, and conclusions. Name your assessment document according to this convention: The file should be saved as: IT232_YourLastName_M1. Submit your completed assessment to the Dropbox. Review the checklist rubric before beginning this activity.See Answer
  • Q20:For this project, you can form a group and the maximum number of members in one group is 2. You should find your teammate by yourself. You can also work on it individually. In this project, you will implement Spectrum-Based Fault Localization (SBFL) for real-world Java programs with unit tests. Specifically, you will calculate suspiciousness values of source code elements by using the 4 formulae in Page 9 of Module 6 slides. The program you will analyze is JFreeChart (https://github.com/jfree/ifreechart) and you don't need to collect its coverage information. Instead, the coverage data has been provided in D2L. You just need to write your own program by using any programming language (e.g., Java, Python, C++, etc.) to process the coverage data and calculate the suspiciousness values based on the 4 SBFL formulae. Explanation of the coverage data: 1. The coverage data (CoverageData.tar) is in the module "Course Project" in D2L as follows. Course Project - Add dates and restrictions... Print Settings/n1. The coverage data (CoverageData.tar) is in the module "Course Project" in D2L as follows. Course Project. Add dates and restrictions... Add a description... Upload / Create Project Instructions PDF document CoverageData.tar GZ File Existing Activities ✓ Bulk Edit Print A+ Settings 2. You need to uncompress the .tar file firstly and then you will find multiple .gz files. For each .gz file, you will find that the first line represents one test case and other lines represent the source code methods covered by this test. The example is as follows, and “true” just represents that the test case is a passed test. Please note that the tests and source code methods are represented by Java bytecode. You can learn Java bytecode by yourself if you are interested (https://www.irebel.com/blog/java- bytecode-tutorial). However, it is not required for this project. You just need to view them as unique tests and source code elements (source code methods)./nTest case org.jfree.chart. annotations.TextAnnotationTest.testEquals true org/jfree/chart/event/ChartChangeEvent:<init>:(Ljava/lang/Object;}V org/jfree/chart/event/ChartChange Event:<init>: (Ljava/lang/Object; Lorg/jfree/chart/JFreeChart; Lorg/jfree/chart/event/ChartChange Event Type;) org/jfree/chart/annotations/TextAnnotation:<init>:(Ljava/lang/String;)V org/jfree/chart/annotations/TextAnnotation:getText: ()Ljava/lang/String; org/jfree/chart/annotations/TextAnnotation: setText: (Ljava/lang/String; )V org/jfree/chart/annotations/TextAnnotation:getFont: () Ljava/awt/Font; org/jfree/chart/annotations/TextAnnotation: setFont: (Ljava/awt/Font; )V org/jfree/chart/annotations/TextAnnotation:getPaint: ()Ljava/awt/Paint; org/jfree/chart/annotations/TextAnnotation:setPaint: (Ljava/awt/Paint; )V org/jfree/chart/annotations/TextAnnotation:getTextAnchor: ()Lorg/jfree/ui/TextAnchor; org/jfree/chart/annotations/TextAnnotation: setTextAnchor: (Lorg/jfree/ui/TextAnchor;)V org/jfree/chart/annotations/TextAnnotation:getRotationAnchor:()Lorg/jfree/ui/TextAnchor; org/jfree/chart/annotations/TextAnnotation:setRotationAnchor: (Lorg/jfree/ui/TextAnchor;)V org/jfree/chart/annotations/TextAnnotation:getRotationAngle: ()D org/jfree/chart/annotations/TextAnnotation: setRotationAngle: (D)V Source code method 3. You should write code to read all .gz files and convert the data required for SBFL. 4. There are no failed tests in the data. But you should manually set some tests as failed tests. Final Submission 1. Your code to process coverage data and to implement the 4 SBFL formulae in Page 9 of Module 6 slides. Please note that you should also provide one command to execute your program. The input of your program should be the coverage data and the output should be the ranking list of source code methods with the suspiciousness values. 2. The final list of source code methods with the suspiciousness values 3. One-page report to describe how you complete this project.See Answer

TutorBin Testimonials

I got my Software Engineering homework done on time. My assignment is proofread and edited by professionals. Got zero plagiarism as experts developed my assignment from scratch. Feel relieved and super excited.

Joey Dip

I found TutorBin Software Engineering homework help when I was struggling with complex concepts. Experts provided step-wise explanations and examples to help me understand concepts clearly.

Rick Jordon

TutorBin experts resolve your doubts without making you wait for long. Their experts are responsive & available 24/7 whenever you need Software Engineering subject guidance.

Andrea Jacobs

I trust TutorBin for assisting me in completing Software Engineering assignments with quality and 100% accuracy. Experts are polite, listen to my problems, and have extensive experience in their domain.

Lilian King

I got my Software Engineering homework done on time. My assignment is proofread and edited by professionals. Got zero plagiarism as experts developed my assignment from scratch. Feel relieved and super excited.

Joey Dip

I found TutorBin Software Engineering homework help when I was struggling with complex concepts. Experts provided step-wise explanations and examples to help me understand concepts clearly.

Rick Jordon

TutorBin helping students around the globe

TutorBin believes that distance should never be a barrier to learning. Over 500000+ orders and 100000+ happy customers explain TutorBin has become the name that keeps learning fun in the UK, USA, Canada, Australia, Singapore, and UAE.