Software Engineering Answers

Questions: 639

Answers by our Experts: 505

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

What famous person sent an e-mail in 1976?
What food could you order through the Internet in 1994?

Suppose that a software engineer decides to use the insertion sort to (ascending) sort the addresses of the residents of the city of Toronto. Briefly explain why this is a bad idea


Consider the Facebook social networking application. User can logs in to the system, browse their notifications, views updates, sends message to friends, add/ remove friends. This is a single page application interface where all the operations are performed through a unified web page. For the various architectural style you have studied, which one will you use for face book. Provide reasons and well grounded justifications. Draw the a neat and clean architecture.



Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property?
A project has been awarded to you by one of your client related to design and host a web portal for online buying and selling of pets. This platform will act as a bridge between sellers and buyers where both the parties can negotiate regarding selling and purchasing of pets and their accessories. The payment options will be both online secure payment and cash on delivery (COD). This project requires you to pay some visits to pets’ buying and selling markets for information gathering and analysis. Keeping in mind the recent pandemic has just subside and lockdown is over. Your client is asking you to complete this portal in 15 days’ time.

List at least three risks (schedule, cost, requirements, quality or operational risks) that could
cause the project to be late, over budget or a failure.

What mitigation techniques you will followed for the risks you have identified in part 1?

Rate each of risks (identified in part 1) for their potential impact and likelihood. Use high,
medium, and low.

I need to make a project for my software testing class. I have a working website which runs locally on a web browser (it is not hosted anywhere). I need to explain in the form of reports and ppts, the Software development life cycle. I am not able to make a Pipeline to deploy my website. Do you know how to build a pipeline using Jenkins? Thanks.


Suppose that you have to build a product to determine the inverse of 3.546784 to four decimal places. Once the product has been implemented and tested, it will be thrown away. Which life cycle mode would you use? Give reasons for your answer. 


SUBJECT: HUMAN COMPUTER INTERACTION

Q.No.2. (a)

You must have visited the official website of your University of Arid agriculture Rawalpindi Now your task is to evaluate the website by using Heuristic Evaluation, and if you think there are some flaws you can suggest some improvements?

Q.No.2. (b)

In above question you have done Heuristic Evaluation of the website of university University of Arid agriculture Rawalpindi. now consider the same website of same university University of Arid agriculture Rawalpindi and make a cognitive walkthrough. When you have completed the evaluation, compare your findings from the cognitive walkthrough technique with those from heuristic evaluation.
The Rawalpindi police authorities has been plan to automate their crime Analysis system. This management information system is used in police stations. The daily Crimes Registered on Police Station are logged in database with detail. Furthermore, this data is analyzed to predict the crimes in Different cities. The Data is visualized with different aspects like

• The Area with Highest Car Theft/Murder
• The Worst Area by Crimes
• The Crime Trends and Movement of Gang
• Crime Wise similar Areas.

You need to answer following questions
(a) Prepare test case for Crime Trends and Movement of Gang.
(b) Prepared the one Bug Report for Registration log issue with system.
(c) Identify Absolute correctness from above mentioned crime analysis systems.
LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS