Examination cover sheet
|
|
- Erica West
- 5 years ago
- Views:
Transcription
1 Student name: Student number: Examination cover sheet (to be completed by the examiner) Course name: Software specification and architecture Course code: 2IW81 Date: Start time: 09:00 End time : 12:00 Number of pages: 11 Number of questions: 5 Maximum number of points/distribution of points over questions:100 Method of determining final grade: divide total of points by 10 Answering style: multiple choice questions; open questions Exam inspection: With your instructor Other remarks: It is not allowed to use study materials or a computer during the exam. The examination questions have been inspected by Julien Schmaltz, Kees Huizing, Anton Wijs, Loek Cleophas, and Serguei Roubstov. Instructions for students and invigilators Permitted examination aids (to be supplied by students): Notebook Calculator Graphic calculator Lecture notes/book One A4 sheet of annotations Dictionar(y)(ies). If yes, please specify: Other: Important: examinees are only permitted to visit the toilets under supervision it is not permitted to leave the examination room within 15 minutes of the start and within the final 15 minutes of the examination, unless stated otherwise examination scripts (fully completed examination paper, stating name, student number, etc.) must always be handed in the house rules must be observed during the examination the instructions of examiners and invigilators must be followed no pencil cases are permitted on desks examinees are not permitted to share examination aids or lend them to each other During written examinations, the following actions will in any case be deemed to constitute fraud or attempted fraud: using another person s proof of identity/campus card (student identity card) having a mobile telephone or any other type of media-carrying device on your desk or in your clothes using, or attempting to use, unauthorized resources and aids, such as the internet, a mobile telephone, etc. using a clicker that does not belong to you having any paper at hand other than that provided by TU/e, unless stated otherwise visiting the toilet (or going outside) without permission or supervision Associated with the Central Examination Regulations
2 TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science Examination Software specification and architecture Tuesday, April 12th 2016, 09h00 12h00. Your answers must be formulated and written down clearly. First read ALL questions once! This examination consists in two parts: the first part is composed of 20 multiplechoice questions. Each question gives you 2 or 0 points. The second part is composed of 4 exercises worth 20 points each. You need to complete at least 3 of these exercises. Students following 2IHS10 need to address questions 1 to 12 and the first two exercises (exercise A and exercise B). Multiple Choice Questions (40 points) Answer the following multiple-choice questions. Each question has only one correct answer. You should encircle your answer. For each question, you will get 2 points if you circled the correct answer; 0 point otherwise. Question 1 Consider the statement "The system shall be able to process up to 40 executing jobs at a time". Among the four options below, select the best formulation for this statement as a requirement: a. The system shall not be able to process more than 40 jobs at a time. b. The system shall process jobs up to 40 simultaneous jobs. c. The system shall be able to process jobs up to 40 simultaneous jobs. d. The system shall process typically 40 jobs at a time. Question 2 Select from the requirements below, the one that is S.M.A.R.T. a. The system shall start quickly. b. The system shall start in a few seconds. c. The system shall start within 4 seconds. d. The system shall start as fast as possible. 1
3 Question 3 Select the answer below that best describes the relation between the three use-cases A, B, and C below: a. Use-case A always executes use-case B and always executes use-case C. Question 4 b. Use-case A always executes use-case B and sometimes executes use-case C. c. Use-case A sometimes executes use-case B and always se-case executes C. d. Use-case A sometimes executes use-case B and sometimes executes use-case C. Which of the following statements pertaining to actors in use-cases is "FALSE"? a. In presence of generalization a more general actor can always replace the specialized one. b. One user might be represented by multiple actors in the same use-case. c. Actor is a class of entities falling beyond the system boundaries and interacting with the systems. d. One use-case might involve multiple actors. Question 5 Consider the class diagram below composed of 3 classes, namely, A, B, and C. Which of the following statements about this class diagram is "TRUE": a. When an instance of A is deleted, all instances of B are deleted. Instances of C are unchanged. b. When an instance of A is deleted, all instances of B created by A are deleted. Instances of C are unchanged. c. When an instance of A is deleted, all instances of B created by A are deleted. Instances of C are deleted as well. d. When an instance of A is deleted, instances of B and C are unchanged. 2
4 Question 6 Consider the class diagram below composed of 3 classes, namely, company, role, and contract. Note that no multiplicity means a multiplicity of 1. Which of the following statements about this class diagram is "TRUE": a. Every company can have only one contract. Question 7 b. Every company can play only one role per contract. c. Every contract can be associated to only one company. d. Every company can have multiple roles within one contract. Consider the class diagram below composed of 2 classes, namely, A and B. Which of the following statements about this class diagram is "TRUE": a. A is a generalization of B. b. A is a composition of B. c. B is an implementation of A. d. B is a generalization of A. Question 8 Consider the class diagram below composed of 2 classes, namely, plane and flight. Which of the following statements about this class diagram is "TRUE": a. One flight can be assigned only to zero or one planes. b. One flight can be assigned to any number of planes. c. One plane can be assigned only to zero or one flight. d. One plane must be assigned to at least one flight. Question 9 Consider the sequence diagram below composed of 2 instances of classes A and B. Which of the following statements about this class diagram is "TRUE": 3
5 a. Method1 must be implemented by class B. b. Method1 must be implemented by class A and B. c. Method1 must not be implemented by A nor by B. d. Method1 must be implemented by class A. Question 10 Consider the sequence diagram below composed of 3 class instances, namely, A, B, and C. Which of the following statements is not enforced by the sequence diagram: a. m1 is received before m2 is sent. b. m2 is received before m3 is sent. c. m1 is sent before m2 is sent. d. m2 is sent before m3 is sent. Question 11 In the activity diagram below, which one of the executions (to completion) is not possible? a. A completes then C completes. B starts but is killed. b. B completes then C completes. A starts but is killed. c. A and B complete, C completes once. d. A and B complete, then C completes twice. Question 12 Consider the UML state machine below. Consider the sequence of events: e1, e3, e4, e5, e2. What state is reached at the end of this sequence? 4
6 H 1 e1 e2 2 a. 1 b. 2 c. 3 e3 e5 d. 4 3 e4 4 Question 13 Consider a traffic light. Whenever the light becomes green, it remains green until it becomes orange. It might remains orange for some time before it eventually becomes red. Which of the following LTL formulas expresses this statement? a. G(green green U (orange U red) b. G(green U orange U red) c. G(green X(green U (orange U red)) d. G(green X(green U (orange (orange U red))) Question 14 Consider a printer. A user can access the printer by sending a req signal to the printer. The printer will grant access to its services by responding with an ack signal. A requirement of the printer is to be fair, that is, it eventually serves all requests. Which of the following LTL formulas expresses this statement? a. G(req U ack) b. G(req Fack) c. G(req ack) d. GF(req ack) 5
7 Question 15 Consider the Labelled Transition System (LTS) below over atomic propositions a and b. Which of the following LTL properties holds for this LTS? a. GFb b. FGb c. Ga d. Gb Question 16 Which statement about the notion of "Time convergent sequences" of Timed Automata is "TRUE"? a. Time convergent sequences are flaws in model. b. Time convergent sequences come from zeno paths. c. Time convergent sequences cannot be avoided. d. Time convergent sequences are only present in models with timelocks. Question 17 Which statement defines the notion of "Timelock" in the theory of Timed Automata? a. A Timed Automaton has a timelock in state s if and only if there are no zeno paths starting from state s. b. A Timed Automaton has a timelock in state s if and only if there are no infinite sequences starting from state s. c. A Timed Automaton has a timelock in state s if and only if there are no time divergent sequences starting from s. d. A Timed Automaton has a timelock in state s if and only if there are no time convergent sequences starting from s 6
8 Question 18 Consider the Timed Automaton below over atomic propositions start and stop and clock x. The initial state is state number 0. Select the statement below that holds for this Timed Automaton a. This timed automaton has a timelock. b. This timed automaton has a zeno path. c. The time spent in state 1 is at least 2 time units and at most 5 time units. d. When in state 1, a stoptransition always takes place when clock x equals 2. Question 19 Which stakeholders are addressed by the process view of the 4+1 Views model of Kruchten: a. end-users b. programmers c. system integrators d. system engineers Question 20 The Gnutella protocol is an open decentralized group membership and search protocol. Gnutella has been designed to operate in a dynamic environment, where hosts can join and leave the network frequently. Furthermore, Gnutella is expected to be scalable and reliable, that is, external attacks should not cause significant data or performance loss. Which one of the following architectural styles would you apply if you would be designing Gnutella? a. Blackboard b. Client-server c. Peer-to-peer d. Mobile code 7
9 Exercises (60 points) The second part of the examination consists in four exercises, 20 points each. You should answer at least three of these exercises. Please read all exercises first, choose the ones you are most comfortable with. Should you decide to answer four exercises, we will consider the three best solutions. Please, keep in mind that three correct solutions will give you more points than four wrong ones! Exercise A (Class Diagram) An internet shop sells items via shopping carts. Customers have a name, delivery address, address, and preferred payment strategy (see below). A customer has at most one shopping cart to which he/she can add and remove items. When finished with shopping, the customer takes the cart to checkout. There are several payment strategies (credit card, Paypal, ideal) that can be chosen (or changed) at checkout. After successful checkout, an order is created that is kept in a list of standing orders, until the order is delivered. Write a class diagram that models the internet shop described above. Pay attention to multiplicities. Do not add attributes for references that are drawn as relations (arrows representing association, etc.). Do not add getter and setter methods for attributes. Exercise B (General UML diagrams) Consider a software system supporting the work process of the TU/e Bureau for Computer Facilities (BCF). This bureau handles purchase laptop requests from employees. A case worker within BCF receives that request and monitors it until it is ordered and received. Case workers process the requests for laptops under Euro s, write a purchase order, and then send it to the approved vendor. Purchase requests over Euro s must first be sent out for a bid from the vendor that supplies the product. When the bids return, the case worker selects one bid. Then, the case worker writes a purchase order to be sent to the approved vendor. Once a laptop is received, BCF workers need to register it for easy network access and administrative purposes (who has which laptop). BCF also creates a special BCF account on every laptop for remote maintenance. It might happen that a laptop is given to its user before it is properly registered (say, the MAC address has not been registered). In that case, the software system will automatically send reminders to BCF workers to complete the laptop registration. a. (6 points) Draw a use case diagram for the BCF software system. In addition, give a detailed scenario (pre-condition, trigger, post-condition, main scenario, alternatives) of one of the use cases of your use case diagram. 8
10 b. (6 points) Based on the description of your scenario, draw an activity diagram for it. c. (6 points) Based on the description of this scenario, draw a sequence diagram for it. d. (2 points) informally argue about the consistency between the different diagrams. 9
11 Figure 1: Paper producer machine. Exercise C (LTL and TA) Consider the system shown in Figure 1. It is composed of a Machine, a coffee craving Person, and an Observer. The Machine is a coffee machine accepting coins as input and producing coffee. As you can see from the Timed Automaton of the Person, the Person repeatedly (tries to) insert a coin, (tries to) extract coffee after which (s)he will make a publication. Between each action the person requires a suitable time-delay before being ready to participate in the next one. The machine takes some time for brewing the coffee and will time-out if coffee has not been taken before a certain upper time limit. As a requirement we want the overall behaviour to ensure that the indicated Observer experiences a constant flow of publications from the system. In particular we want the Observer to complain if at any time more than 8 time-units elapse between two consecutive publications. a. (8 points) Create a Timed Automaton modelling the Machine and a Timed Automaton modelling the Observer. The objective is to insert state labels to all these models so that it is possible to express the following properties. You must also formalise those properties in LTL: (a) The Observer never complains. (b) If a coin has been inserted and next coffee has been received, a publication will eventually follow. (c) If a coin has been inserted, coffee is eventually produced. 10
12 b. (2 points) Do the models have timelock or zeno paths? Motivate your answer. c. (10 points) In the previous you formalised three properties. Do they hold? If yes, justify your answer. If not, please provide a counter-example to each property. A counter-example is a finite trace so that at the end of the trace the property is violated. If the properties do not hold, correct your models. Explain the motivation for your changes. 11
13 Exercise D (Architecture) (David Parnas, 1972) The KWIC ("keyword in context") index system accepts an ordered set of lines, each line is an ordered set of words, and each word is an ordered set of characters. Any line may be "circularly shifted" by repeatedly removing the first word and appending it at the end of the line. The KWIC index system outputs a listing of all circular shifts of all lines in alphabetical order. For example, given the following lines as the input: Programming methods Software specification and architecture Software engineering KWIC can be expected to produce the following output: and architecture Software specification architecture Software specification and engineering Software methods Programming Programming methods Software engineering Software specification and architecture specification and architecture Software While full-text search is possible these days instead, a KWIC index system may still be used in e.g. a search engine to show the context of a queried keyword in a search results. Your goal is to define a software architecture for the KWIC system. a. (5 points) Decide on the functional blocks needed for this system. b. (5 points) Select an architecture style to map these functional blocks to an architecture. Why and how would you use this style? c. What are the advantages and the disadvantages of your architecture? Consider how your architecture accommodates (a) (2 points) changes in data representation (e.g., circular shifts are stored as separate entities or lines are stored only as they have been entered and shifts are indicated using an index), (b) (2 points) changes in the algorithm (e.g., lines can be shifted as they are read or after all lines have been read and sorting can be done incrementally), 12
14 (c) (2 points) new functionality being added (e.g., removal of so-called stop words such as "and" or "the", or adding/removing case-sensitivity), (d) (2 points) huge amounts of data to process, (e) (2 points) the need to reuse some of the KWIC components as building blocks for a different system? 13
Software Specification and Architecture 2IW80
Software Specification and Architecture 2IW80 Julien Schmaltz Recapitulation Session Exam» April 12.04.2016 09:00 12:00» Location: check OASE» Part I. 40 multiple choice questions (4 options)» 1 point
More informationCPSC 410 Advanced Software Engineering Mid-term Examination (Term I ): Solution Instructor: Gail Murphy
CPSC 410 Advanced Software Engineering Mid-term Examination (Term I 2003-2004): Solution Instructor: Gail Murphy Do NOT start until you are informed you can start! This examination has 6 questions. The
More informationFrequently asked questions on the Exam Period
Frequently asked questions on the Exam Period - Autumn 2018/2019-1. What can I do if I passed the exam, but I am not satisfied with my mark? You can take a grade improvement examination: retaking a successful
More informationInformatics 1 - Computation & Logic: Tutorial 5
Informatics - Computation & Logic: Tutorial 5 Computation: Introduction to Finite State Machines Week 7: 3 October - 4 November 206 Please attempt the entire worksheet in advance of the tutorial, and bring
More informationUniversity of Virginia Department of Computer Science. CS 4501: Information Retrieval Fall 2015
University of Virginia Department of Computer Science CS 4501: Information Retrieval Fall 2015 2:00pm-3:30pm, Tuesday, December 15th Name: ComputingID: This is a closed book and closed notes exam. No electronic
More informationTest 2 Version A. On my honor, I have neither given nor received inappropriate or unauthorized information at any time before or during this test.
Student s Printed Name: Instructor: CUID: Section: Instructions: You are not permitted to use a calculator on any portion of this test. You are not allowed to use any textbook, notes, cell phone, laptop,
More informationdownload instant at The Relational Data Model
3 The Relational Data Model EXERCISES 3.1 Define data atomicity as it relates to the definition of relational databases. Contrast data atomicity with transaction atomicity as used in a transaction processing
More informationAlgorithms, Probability, and Computing Midterm Exam HS17
Institute of Theoretical Computer Science Mohsen Ghaffari, Angelika Steger, David Steurer, Emo Welzl, Peter Widmayer Algorithms, Probability, and Computing Midterm Exam HS17 Candidate First name:...................................................
More informationChapter 10. Object-Oriented Analysis and Modeling Using the UML. McGraw-Hill/Irwin
Chapter 10 Object-Oriented Analysis and Modeling Using the UML McGraw-Hill/Irwin Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Objectives 10-2 Define object modeling and explain
More informationITS310: Introduction to Computer Based Systems Credit Hours: 3
ITS310: Introduction to Computer Based Systems Credit Hours: 3 Contact Hours: This is a 3 credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact
More informationThe University of British Columbia Final Examination - December 02, 2014 Mathematics 308. Closed book examination. No calculators.
The University of British Columbia Final Examination - December 02, 2014 Mathematics 308 Closed book examination. No calculators. Time: 2.5 hours Last Name First Signature Student Number No books, notes,
More informationInstructions to Examination Invigilators
Instructions to Examination Invigilators APMP APMP for registered PRINCE2 Practitioners Introductory Certificate Risk Level 1 Risk Level 2 Invigilator Guidance Notes v1.3 Page 1 of 9 Introduction.....
More informationModel checking and timed CTL
Chapter 6 Model checking and timed CTL Ah! What did I tell you? 88 miles per hour! The temporal displacement occurred at exactly 1:20am and *zero* seconds! [Dr Emmett Brown] 6.1 Timed CTL Page 86 Formal
More informationLesson 3: Identifying Key Characteristics of Workgroups and Domains
1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users
More informationWord Processor Procedure
Document Control Appendix 4 Word Processor Procedure Version Number: 1 Applicable To: Committee: All Secondary Academies Achievement for All Approved By Committee On: November 2016 Review Cycle: Bi-annually
More informationCPSC 121 Some Sample Questions for the Final Exam Tuesday, April 15, 2014, 8:30AM
CPSC 121 Some Sample Questions for the Final Exam Tuesday, April 15, 2014, 8:30AM Name: Student ID: Signature: Section (circle one): George Steve Your signature acknowledges your understanding of and agreement
More informationSoftware Specification and Architecture 2IW80
Software Specification and Architecture 2IW80 Julien Schmaltz (slides partly from M. Mousavi and A. Serebrenik) Lecture 02: Requirements Requirements specification» Textual description of system behaviour»
More informationEECS 3214 Final Exam Winter 2017 April 19, 2017 Instructor: S. Datta. 3. You have 180 minutes to complete the exam. Use your time judiciously.
EECS 3214 Final Exam Winter 2017 April 19, 2017 Instructor: S. Datta Name (LAST, FIRST): Student number: Instructions: 1. If you have not done so, put away all books, papers, and electronic communication
More informationCourse Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen
Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen Harsh Beohar LF 265, harsh.beohar@uni-due.de Harsh Beohar Course Modelling of Concurrent Systems 1 Course handler
More informationConfined Space Entry (CSE) Certification Training Standard
Confined Space Entry (CSE) Certification Training Standard The Newfoundland and Labrador Occupational Health and Safety Regulations, Section 511 (3) states that a person shall not work in a Confined Space
More informationCriteria to Participate as an ACE Authorized Test Provider
Criteria to Participate as an ACE Authorized Test Provider Overview of the Authorized Test Provider Program Organizations with ACE credit-recommendation sometimes distribute or sell their courseware to
More informationAutomated Formal Methods for Embedded Systems
Automated Formal Methods for Embedded Systems Bernd Finkbeiner Universität des Saarlandes Reactive Systems Group 2011/02/03 Bernd Finkbeiner (UdS) Embedded Systems 2011/02/03 1 / 48 Automated Formal Methods
More informationCLAN: A Tool for Contract Analysis and Conflict Discovery
CLAN: A Tool for Contract Analysis and Conflict Discovery Stephen Fenech 1, Gordon J. Pace 1, and Gerardo Schneider 2 1 Dept. of Computer Science, University of Malta, Malta 2 Dept. of Informatics, University
More informationDiscrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Midterm 1
CS 70 Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Midterm 1 PRINT Your Name:, (last) SIGN Your Name: (first) PRINT Your Student ID: CIRCLE your exam room: 1 Pimentel 141 Mccone
More informationJoint Entity Resolution
Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute
More information2014 Proctor's Guide for the Certified Public Finance Officer Examinations
What's Your Next Move? Get ready for a move up by earning designation as a Certified Public Finance Officer! 2014 Proctor's Guide for the Certified Public Finance Officer Examinations Government Finance
More informationASOPE PROCTOR TRAINING AND GUIDELINES
ASOPE ASOPE PROCTOR TRAINING AND GUIDELINES Produced By ASOPE Overview The American Society of Power Engineers, Inc. (ASOPE) testing modules are executed in testing locations by Proctors who are assigned
More informationCourse Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen
Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen Harsh Beohar LF 265, harsh.beohar@uni-due.de Harsh Beohar Course Modelling of Concurrent Systems 1 Course handler
More informationAdministration and Examination Guidelines for Holding ISEB BSD Written Examinations
1. New BSD Modules Administration and Examination Guidelines for Holding ISEB BSD Written Examinations Examination Guidelines Providers who are eligible to hold an examination for the first time must submit
More informationWord processor policy 2016/17. Approved by. Name: Title:
Word processor policy 2016/17 Approved by Name: Title: Date of next review January 2018 Contents Introduction... 3 Principles for using a word processor... 3 The use of a word processor... 4 Word processors
More informationFUJAA GENERAL EXAMINATION REQUIREMENTS & PROCEDURE
FUJAA GENERAL EXAMINATION REQUIREMENTS & PROCEDURE Please read and understand the following requirements of Part/CAR 66 Examination before completing the application / registration form. Part/CAR Examinations
More informationWord Processor policy 2016/17
Appendix E Word Processor policy 2016/17 This policy is reviewed annually to ensure compliance with current regulations Completed by Exams/Data Manager Approved by SLT Date of next review January 2018
More informationGUIDELINES FOR EXAM CANDIDATES AT UNIVERSITY OF NORDLAND
GUIDELINES FOR EXAM CANDIDATES AT UNIVERSITY OF NORDLAND These guidelines are supplementary provisions to The Regulations Concerning Studies and exams at University of Nordland. Decided upon by The Board
More informationRenewal Registration & CPE for CPAs in Iowa
1. When must I renew my certificate? Renewal Registration Process You must renew your certificate annually with the Iowa Accountancy Examining Board (IAEB). Online renewal is typically available May 15
More informationWriting Diploma Exams Using Computers Humanities Part(ie) A, Mathematics 30-2 and Science 30
Writing Diploma Exams Using Computers Humanities Part(ie) A, Mathematics 30-2 and Science 30 BACKGROUND Examinees are permitted to use computers when writing some diploma exams. The principles, directives,
More informationHigher Reach Online Registration
Higher Reach Online Registration July 12, 2013 (Version 1) kc This procedure guide contains information for students and administration. QUICK ADMIT Define three roles that someone can use to log in to
More informationOverview. Discrete Event Systems - Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for?
Computer Engineering and Networks Overview Discrete Event Systems - Verification of Finite Automata Lothar Thiele Introduction Binary Decision Diagrams Representation of Boolean Functions Comparing two
More informationObject Oriented Programming
Binnur Kurt kurt@ce.itu.edu.tr Istanbul Technical University Computer Engineering Department 1 Version 0.1.2 About the Lecturer BSc İTÜ, Computer Engineering Department, 1995 MSc İTÜ, Computer Engineering
More informationFurther Topics in Modelling & Verification
Further Topics in Modelling & Verification Thursday Oct 09, 2014 Philipp Rümmer Uppsala University Philipp.Ruemmer@it.uu.se 1/34 Recap: Timed automata (TA) 2/34 Recap: Properties 3/34 Questions about TA
More informationTHE UNIVERSITY OF BRITISH COLUMBIA CPSC 121: MIDTERM 2 Group March 12, 2014
THE UNIVERSITY OF BRITISH COLUMBIA CPSC 121: MIDTERM 2 Group March 12, 2014 Important notes about this examination 1. You have 40 minutes to complete this exam. 2. No electronic aides (e.g., phones or
More informationHome Inspection 2014
Home Inspection 2014 Home Inspection A fifteen hour continuing education course approved by the California Bureau of Real Estate (CalBRE) to meet the requirements of the Business and Professions Code Section
More informationFormal Methods for Software Development
Formal Methods for Software Development Model Checking with Temporal Logic Wolfgang Ahrendt 21st September 2018 FMSD: Model Checking with Temporal Logic /GU 180921 1 / 37 Model Checking Check whether a
More information(a) Assuming the server is up, do stockholders receive price quotes within 3 seconds even if 200 stockholders request quotes simultaneously?
Name: CS3733: Software Engineering B00 Midterm Exam Question Poss. Points Grade 1 15 2 20 3 20 4 15 5 15 6 15 Total Answer all questions in the spaces provided on this exam. If you need additional space,
More informationIS 263 Database Concepts
IS 263 Database Concepts Lecture 4: Normalization Instructor: Henry Kalisti 1 Department of Computer Science and Engineering Limitations of E- R Designs Provides a set of guidelines, does not result in
More informationSoftware Life-Cycle Models
Software Life-Cycle Models CMPSC 487 Lecture 03 Topics: UML Class Diagram Rosenburg Chap 2. Domain Modeling A. UML: Unified Modeling Language UML is a general-purpose, developmental, modeling language
More informationSoftware Engineering Fall 2014
Software Engineering Fall 2014 (CSC 4350/6350) Mon.- Wed. 5:30 pm 7:15 pm ALC : 107 Rao Casturi 10/01/2014 Class Announcements Grading is done for the Deliverable #2 (Requirement Elicitation) Will be posed
More informationcourse 3 Levels of Database Design CSCI 403 Database Management Mines Courses ERD Attributes Entities title 9/26/2018
3 Levels of Database Design CSCI 403 Database Management 13 Database Modeling with Entity-Relationship Diagrams Conceptual (this lecture) Understand data entities & relationships between them Communication
More informationIntroduction to Software Engineering. 6. Modeling Behaviour
Introduction to Software Engineering 6. Modeling Behaviour Roadmap > Use Case Diagrams > Sequence Diagrams > Collaboration (Communication) Diagrams > Activity Diagrams > Statechart Diagrams Nested statecharts
More informationSalesforce Enterprise Edition Upgrade Guide
Salesforce Enterprise Edition Upgrade Guide Salesforce, Spring 16 @salesforcedocs Last updated: February 11, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationIntroduction to Algorithms May 14, 2003 Massachusetts Institute of Technology Professors Erik Demaine and Shafi Goldwasser.
Introduction to Algorithms May 14, 2003 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Practice Final Practice Final Do not open this exam booklet until
More informationWeek 8: The fundamentals of graph theory; Planar Graphs 25 and 27 October, 2017
(1/25) MA284 : Discrete Mathematics Week 8: The fundamentals of graph theory; Planar Graphs 25 and 27 October, 2017 1 Definitions 1. A graph 2. Paths and connected graphs 3. Complete graphs 4. Vertex degree
More informationPRIVACY POLICY QUICK GUIDE TO CONTENTS
PRIVACY POLICY This privacy policy describes the policies and practices of Comodo Security Solutions, Inc. and Comodo Security Solutions Ltd. (collectively and individually referred to herein as "Comodo"),
More informationTHE UNIVERSITY OF BRITISH COLUMBIA CPSC 110: MIDTERM 1 Part B May 26, Important notes about this examination
THE UNIVERSITY OF BRITISH COLUMBIA CPSC 110: MIDTERM 1 Part B May 26, 2014 Last Name: First Name: Signature: UBC Student #: Important notes about this examination 1. This exam has two separate parts. Your
More informationCSC2108: Automated Verification Assignment 1 - Solutions
8 CSC218: Automated Verification Assignment 1 - Solutions 1. Solve the following problem: Use the definition of between states and CTL formulas to explain why means that is true infinitely often along
More informationChapter 13. Digital Cash. Information Security/System Security p. 570/626
Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not
More informationCPSC 121 Sample Final Examination December 2013
CPSC 121 Sample Final Examination December 2013 Name: Student ID: Signature: You have 150 minutes to write the 11 questions on this examination. A total of 98 marks are available. Justify all of your answers.
More informationINCREMENTAL SOFTWARE CONSTRUCTION WITH REFINEMENT DIAGRAMS
INCREMENTAL SOFTWARE CONSTRUCTION WITH REFINEMENT DIAGRAMS Ralph-Johan Back Abo Akademi University July 6, 2006 Home page: www.abo.fi/~backrj Research / Current research / Incremental Software Construction
More informationTECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica
TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10/2II45), on Monday January 25, 2016, from 18.00 to 21.00 hours. Indicate on your
More informationB) Symmetric Ciphers. B.a) Fundamentals B.b) Block Ciphers B.c) Stream Ciphers
1 B) Symmetric Ciphers B.a) Fundamentals B.b) Block Ciphers B.c) Stream Ciphers B.a) Fundamentals 2 B.1 Definition 3 A mapping Enc: P K C for which ϕ k := Enc(,k): P C is bijective for each k K is called
More informationGeneral Terms and Conditions
General Terms and Conditions Contents: Article 1 Applicability Article 2 Definitions Article 3 Identity and Customer Support Article 4 The services provided by Online PrePaid Services Article 5 The offer
More informationBaruch Cellular Device Policy
Baruch Cellular Device Policy 1. General: a. The need for cellular devices must be justified. Convenience is not sufficient justification. There must be a demonstrated business purpose for an employee
More informationMichael Kifer, Arthur Bernstein, Philip M. Lewis. Solutions Manual
Michael Kifer, Arthur Bernstein, Philip M. Lewis Solutions Manual Copyright (C) 2006 by Pearson Education, Inc. For information on obtaining permission for use of material in this work, please submit a
More informationINSTRUCTIONS. What are the steps to apply? What is this? Who can apply? How does it work? What does the test cover?
INSTRUCTIONS What is this? This program has been established to enable experienced fire sprinkler fitters/installers a means to demonstrate their knowledge in the field of fire sprinkler installation.
More informationSTART the Registration Process
Obtain the following information from your instructor before you begin enrolling in Undergraduate CGE UNI-TRACK classes for Credit Course Title: Class # Class Term: Spring 2018 FIRST TIME Uni-track student.
More informationWHAT S CHANGING IN PROCURE-TO-PAY
epayment Forum WHAT S CHANGING IN PROCURE-TO-PAY August 2017 Session Objectives During this session, we will discuss: Overview of the University s Preferred Purchasing Methods Changes to the check request
More informationUpdated: 2/14/2017 Page 1 of 6
MASTER SYLLABUS 2017-2018 A. Academic Division: Business, Industry, and Technology B. Discipline: Engineering Technology C. Course Number and Title: ENGR1910 Engineering Programming D. Course Coordinator:
More informationCMSC 132: Object-Oriented Programming II
CMSC 132: Object-Oriented Programming II Problem Specification & Software Architecture Department of Computer Science University of Maryland, College Park Overview Problem specification Obstacles Software
More informationUNIT 3 INTRODUCTORY MICROSOFT EXCEL LESSON 6 MAKING THE WORKSHEET USEFUL
UNIT 3 INTRODUCTORY MICROSOFT EXCEL LESSON 6 MAKING THE WORKSHEET USEFUL Objectives Sort data in a worksheet. Use the AutoFilter to extract specified data from the worksheet. Hide worksheet columns or
More informationNetwork Systems ( / ), Test 3 March 24, 2017, 13:45 15:15
Network Systems (201600146/201600197), Test 3 March 24, 2017, 13:45 15:15 This is an open-book exam: you are allowed to use the book by Peterson & Davie and the reader that belongs to this module. Furthermore,
More information21) Functional and Modular Design
Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - 21) Functional and Modular Design Prof. Dr. U. Aßmann Technische Universität Dresden Institut für Software-
More informationFinite Mathematical Structures A
MS 301.2 (Spring, 2010) stie rkin inite Mathematical Structures xam 1: Thursday, ebruary 25, 2010 R TS INSTRUTIONS RULLY. o not start the exam until told to do so. Make certain that you have all 5 pages
More informationCONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014
CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier
More informationExaminers/Instructors Manual for Practical Examinations For trades of Hairstylist, Esthetician and Electrologist
Examiners/Instructors Manual for Practical Examinations INTRODUCTION The purpose of this document is to provide a comprehensive source of information for examiners and instructors regarding the mandatory
More informationSeattle University Identity Theft Prevention Program. Purpose. Definitions
Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection
More informationTECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica
TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Operating Systems (2IN05) on January 18, 2010, 14.00h-17.00h. The exam consists of two parts that are handed in separately.
More informationMay Comp-B 11, Advanced Software Design. 3 hours duration
May 2016 98-Comp-B 11, Advanced Software Design 3 hours duration NOTES: 1. If doubt exists as to the interpretation of any question, the candidate is urged to submit, with the answer paper, a clear statement
More informationIn his paper of 1972, Parnas proposed the following problem [42]:
another part of its interface. (In fact, Unix pipe and filter systems do this, the file system playing the role of the repository and initialization switches playing the role of control.) Another example
More information4: Specifying State-based Behavior With UML Statechart Diagrams
Outline UML Design Supplement 4: Specifying State-based Behavior With UML Statechart Diagrams Introduction to Statecharts Statechart building blocks States Transitions Advanced Characteristics Composite
More informationBuilding Standards Department Markham eplan Applicant Handbook For Building Permits, Sign Permits and Zoning Preliminary Review
Markham eplan Applicant Handbook For Building Permits, Sign Permits and Zoning Preliminary Review In addition to this user manual, please refer to the instructions provided in the electronic forms (eforms)
More informationSoftware Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm. Rao Casturi 09/29/2015
Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm Rao Casturi 09/29/2015 http://cs.gsu.edu/~ncasturi1 Class Announcements Grading is done for the Deliverable #2 (Requirement Elicitation)
More informationGENERAL CONDITIONS FOR POWER ENGINEERING EXAMINATIONS AND REFRIGERATION OPERATORS A AND B AND COMPRESSOR OPERATORS
GENERAL CONDITIONS F POWER ENGINEERING EXAMINATIONS AND REFRIGERATION OPERATS A AND B AND COMPRESS OPERATS TABLE OF CONTENTS PAGE 1. Definitions..3 2. Classification..3 3. Applications for Examinations.3
More informationSoftware Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm. Rao Casturi 09/17/2015
Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm Rao Casturi 09/17/2015 http://cs.gsu.edu/~ncasturi1 Requirement Elicitation 2 Requirement Engineering First step for understanding the
More informationDatabase Systems: Concepts, design, and implementation ISE 382 (3 Units)
Database Systems: Concepts, design, and implementation ISE 382 (3 Units) Spring 2013 Description Obectives Instructor Contact Information Office Hours Concepts in modeling data for industry applications.
More informationFormal Verification: Practical Exercise Model Checking with NuSMV
Formal Verification: Practical Exercise Model Checking with NuSMV Jacques Fleuriot Daniel Raggi Semester 2, 2017 This is the first non-assessed practical exercise for the Formal Verification course. You
More informationMovie Tickets Frequently Asked Questions. How will I receive my discounted tickets? How secure is my purchase and my data?
Movie Tickets Frequently Asked Questions How will I receive my discounted tickets? Ticket choices are either hard copy which are mailed via Australia Post, or evouchers which are emailed to your nominated
More informationSoftware Architecture. Lecture 4
Software Architecture Lecture 4 Last time We discussed tactics to achieve architecture qualities We briefly surveyed architectural styles 23-Jan-08 http://www.users.abo.fi/lpetre/sa08/ 2 Today We check
More informationIndustry Competency Examination Proctor Guide
Industry Competency Examination Proctor Guide TABLE OF CONTENTS INDUSTRY COMPETENCY EXAMINATION...1 INTRODUCTION...1 RECEIPT OF EXAMINATION MATERIALS...1 EXAMINATION SECURITY... 2 EXAMINATION SCHEDULE...
More informationRules and Regulations of the Examination Board of Radboud University, Faculty of Science
Rules and Regulations of the Examination Board of Radboud University, Faculty of Science 2017-2018 General Section 1. Scope These Rules and Regulations apply to all exams given by the Faculty of Science
More informationONLINE ENROLLMENT FOR OLLI COURSES (FALL 2018)
ONLINE ENROLLMENT FOR OLLI COURSES (FALL 2018) Before starting the online enrollment process, consult the catalog to decide what courses you want to take. Before You Begin Sample Course Description from
More informationWhat personal data we collect and why we collect it
Who we are Jinny Beyer Studio is a two-story shop located in Great Falls, Virginia. We also have a mailorder business run through our website. Our website address is: https://jinnybeyer.com. What personal
More informationSystem and Software Architecture Description (SSAD)
System and Software Architecture Description (SSAD) FlowerSeeker Team 05 Name Eder Figueroa Sophia Wu Doris Lam Hiram Garcia Roles Primary Role: Project Manager/ Implementer. Secondary Role: Tester. Primary
More informationSALES LEAD MULTIPLIER INC. PRIVACY POLICY
SALES LEAD MULTIPLIER INC. LAST UPDATED: July 31, 2016 PRIVACY POLICY PLEASE NOTE THAT THIS PRIVACY POLICY APPLIES ONLY TO OUR ONLINE COLLECTION AND USE OF INFORMATION AND DOES NOT APPLY TO ANY INFORMATION
More informationPrivacy Policy. Information about us. What personal data do we collect and how do we use it?
This privacy policy sets out the way in which your personal data is handled by Leeds Bradford Airport Limited (referred to as "we", "us" and "our") whether collected through one of the websites we operate,
More information1. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which:
P R O B L E M S Finite Autom ata. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which: a) Are a multiple of three in length. b) End with the string
More informationThe Registry of Fitness Professionals. Fitness Leader User Manual
The Registry of Fitness Professionals Fitness Leader User Manual 1 Table of Contents Introduction... 4 A. SETUP AND OVERVIEW OF THE REGISTRY... 5 I. The Registry Home Page... 5 SEARCH THE REGISTRY...5
More informationExcel 2013 Beyond TheBasics
Excel 2013 Beyond TheBasics INSTRUCTOR: IGNACIO DURAN Excel 2013 Beyond The Basics This is a class for beginning computer users. You are only expected to know how to use the mouse and keyboard, open a
More informationContent Manager User Guide
Content Manager User Guide Read these guide to learn how to use Content Manager to browse, buy, download and install updates and extra contents to your Becker PND. 1.) How to install Content Manager Installation
More informationCSE Theory of Computing Fall 2017 Project 2-Finite Automata
CSE 30151 Theory of Computing Fall 2017 Project 2-Finite Automata Version 1: Sept. 27, 2017 1 Overview The goal of this project is to have each student understand at a deep level the functioning of a finite
More informationOperator Frequently Asked Questions
Water & Wastewater Facility Operators Certification Program Operator Frequently Asked Questions Exam: 1. How often / when are exam sessions held? 2. How can I register to write the exam? 3. What if my
More informationChapter 6 Architectural Design. Chapter 6 Architectural design
Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying
More information