Software Methodology Assignment Solution - Computer Science Course

Verified

Added on  2022/08/14

|4
|666
|21
Homework Assignment
AI Summary
This document presents a comprehensive solution to a software methodology assignment, addressing key concepts in software engineering. The solution explores aspects of software product quality, including security, reliability, and usability. It delves into the use of regular expressions, comparing their advantages and disadvantages, and examines how ACID transactions in database management systems prevent system failures. Furthermore, the solution explains the role of exception handlers in ensuring continuous operation. The assignment covers topics such as Linux file systems, programming errors, and complexity reduction guidelines, providing a well-rounded understanding of software development principles. The document also references relevant literature to support the discussed concepts.
Document Page
RUNNING HEAD: SOFTWARE METHODOLOGY 1
NAME
INSTITUTION AFFLIATION
DATE
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SOFTWARE METHODOLOGY 2
Introduction
The software product aspects include the security, reliability, availability, usability, maintenance
and resilience. Programmers make errors due to lack of understanding by the domain and may
not understand the technologies properly.
Question one
The short program
The LINUX file systems do not support the idea of extension. The element of a file extension
exists when supported by utilities such as cp and is. The LINUX do not have a minimum of
three characters limit on the extensions but uses shortenings for example one can use .html at the
end of HMTL files on LINUX instead of .htm.
The pearl program helps one to finish various tasks using string scars. For example, the simple
regular expression in an abc string whereby the /abc/ is the regular expression need to match, the
code block could loop through standard in and processes any match as abc, abcababc
Question two
An alternative to using regular expressions to check that an input string is valid is to write your
own code to check the input, what are the advantages and disadvantages
The advantages include, the regular expressions especially those used in UNIX systems are very
powerful, set of tools that can easily find specific words of characters combinations in the strings
(Basil,2016). It also helps in ensuring the cleaning and working with text based data easy hence
reducing any troubles required when search a text by hand in a ton of data
Document Page
SOFTWARE METHODOLOGY 3
Disadvantages
However, in some cases the engine of the regular expression tends to work slowly hence
inefficient (Bresciani, 2017). Whereby, it can take more time to process small input on data.
Question three
Explain why the use of ACID transactions management in a database management systems help
avoid system failures
The ACID systems ensure data validity in actions caused by errors or power failures. They
ensure that the transactions in the database are processed efficiently. It mainly ensures the
recovery of the database upon failure when processing a transaction.
The acid compliant DBMS ascertains the accuracy and consistency of the data in the database
despite any errors or failures.
Question four
In assumption one can save and restore the state of a program using functions called save state
and restore state, explain how one can use in an exemption handler to provide nonstop operation
where in the event of a failure the system state is restored to the last saved state and execution
An exemption handler is a code that helps in the stimulation of a program functions in case `of
the disruption of the normal flow of instruction (Basil, 2015). It is availed by serialized
programming language construction, hardware mechanisms of a computer such as the signals of
the operating system.
Conclusion
Document Page
SOFTWARE METHODOLOGY 4
In summary regular expressions are strings of text that help in creation of patterns that help in
matching, locating and managing texts. The acid systems contain the four key elements that are:
atomicity, consistency, isolation and durability. Also, an exemption handler is effective to ensure
an nonstop operation in cases of the failure of the system by stimulating the program.
References
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., & Mylopoulos, J. (2017). Tropos: An
agent-oriented software development methodology. Autonomous Agents and Multi-Agent
Systems, 8(3), 203-236.
Basili, V. R., & Weiss, D. M. (2016). A methodology for collecting valid software engineering data.
IEEE Transactions on software engineering, (6), 728-738.
Basili, V. R. (2015). Quantitative evaluation of software methodology.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]