Preview

Pt2520 Unit 3 Metrics

Good Essays
Open Document
Open Document
544 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pt2520 Unit 3 Metrics
In this presentation, the author has explained different metrics and there attributed used to measure software. A person can only measure and represent it in number when he knows something about it. On the other hand, if has no idea about it then he doesn’t have any idea about it [1]. There are two types of software complexity metrics. One gives the efficiency of the machine while running the software which is called as computational complexity. Another one is giving us the factors which affect the software developer capacity to develop good software which is known as psychological complexity. There are two types of software metrics. The process metrics which gives details of the process used such as software life cycle used for development, the time consumed for the development etc. The …show more content…
In large software products, a measure is a number of functions used. Some studies showed that some programmer uses the same number of functions to solve given a problem. Another important part of the software is data processed. To understand the psychological complexity of software understanding the amount of data processed by the software is important. VARS is the count of all user defined is the variables used during program development. The average number of variables is the sum of the count of live variables divided by executable statement count. The span defines how many times the variable is used. Based on modules sharing data there are two software measurement types Fan-in which gives the number of modules pass data either indirectly or directly. Whereas Fan-out gives the number of modules to which data passed indirectly or directly. There also another measure which is called as decision count which gives the number of decision statement used in the program. Paths are also used to count the number of different ways the program can be

You May Also Find These Documents Helpful

  • Satisfactory Essays

    For the second event Event2, the algorithm C does not abort during the challenge phase if one of d_0 and d_1 is 0. By the definition of H-list Pr[d_b=0]=1/(m!q_T+1) where b∈{0,1} and the two values are independent of one another, we have that both Pr[d_0=d_1=1]=1-1/q_T≥〖(1-1/(q_T+1))〗^2. Hence, the Pr[Event2] is at least 1/q_T. Since A never issues trapdoor queries for target keyword vectors, Event1 and Event2 are independent. Hence, the probability that C does not abort during the entire simulation, that is Pr[Event_1 ∧ Event_2]≥1/(eq_T).…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Pt2520 Unit 6 Lab 1

    • 292 Words
    • 2 Pages

    24. What is the difference between the logical design and the physical design of a database?…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Look up “System Analysis and Design Life Cycle.” What are the parts of this life cycle? How do you think this relates to database development?…

    • 317 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There will be an offline of White Box Testing technique and Test Case Generation manual, and floating tooltips will be employed in the application.…

    • 1533 Words
    • 7 Pages
    Good Essays
  • Good Essays

    pt2520 unit 8

    • 287 Words
    • 1 Page

    When a client connects to the MySQL server, the server uses the username provided by the client and the client host to select the appropriate account row from the mysql.user table. It then uses this row to authenticate the client. Before MySQL 5.5.7, the server authenticates the password provided by the client against the Password column of the account row. As of MySQL 5.5.7, the server authenticates clients using plugins. Selection of the proper account row from the mysql.user table is based on the user name and client host, as before, but the server authenticates the client credentials as follows: The server determines from the account row which authentication plugin applies for the client. If the account row specifies no plugin name, the server uses native authentication; that is, authentication against the password stored in the Password column of the account row. This is the same authentication method provided by MySQL servers older than 5.5.7, before pluggable authentication was implemented, but now is implemented using two plugins that are built in and cannot be disabled. If the account row specifies a plugin, the server invokes it to authenticate the user. If the server cannot find the plugin, an error occurs. The plugin returns a status to the server indicating whether the user is permitted to connect.…

    • 287 Words
    • 1 Page
    Good Essays
  • Good Essays

    SEQUEL or SQL is a data language that provides benefits for all types of users. SQL’s purpose is to provide an interface to a relational database such as Oracle Database. Dr. Edgar Frank “Ted” Codd introduced the first commercially available implementation of SQL. Today, SQL is accepted as the standard RDBMS language. The features of SQL include processing sets of data as groups rather than as individual units and providing automatic navigation to the data. It uses statements that are complex and powerful individually, and that therefore stand alone. Flow-control statements were not part of SQL originally, but they are found in the recently accepted optional part of SQL. Flow-control statements are commonly known as "persistent stored modules" (PSM), and the PL/SQL extension to Oracle SQL is similar to PSM.…

    • 452 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 3 Assignment Bsa 375

    • 361 Words
    • 2 Pages

    The first step is to identify the major software components of the system being developed. Software systems are divided into four major functions. Data storage in an Information System stores the data or file. Data Access Logic is managing needed to retrieve the data. Application Logic is the processes or activities that are executed. The final function is the Presentation Logic function which is the presentation of the information and the user interface. Knowledge of the functions is vital in the design process and the data flow diagrams (DFD).…

    • 361 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    (c) What is the probability that a selected programmer knows only one of the two languages?…

    • 1289 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Pt2520 Unit 6

    • 1447 Words
    • 6 Pages

    What is data redundancy, and which characteristics of the file system can lead to it?…

    • 1447 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Datta, S. (2007). Metrics-driven enterprise software development: effectively meeting evolving business needs. USA: J. Ross Publishing.…

    • 1550 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    PART 1: 11 short essay questions, each for 5 points for the total of 55 points. Please use APA citations.…

    • 553 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Complexity metrics: A variety of software metrics can be computed to determine the complexity of program control flow.…

    • 431 Words
    • 2 Pages
    Good Essays
  • Good Essays

    If UCD is the method that guides an effective development process, usability may be perceived as the end result. Usability was once known simply as "user-friendliness" (Norman & Draper, 1986), nowadays usability has become the quality software measurement for interactive software. The usability testing perhaps is one of the most valuable tools for designers. This method allows the designers to observe the actions of the target user population first-hand. Usability testing allows designers to observe genuine users performing real tasks and situation.…

    • 416 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Dffffdd

    • 333 Words
    • 2 Pages

    Software Cost Estimation is the process that estimates the effort to develop software. There are several estimation techniques like Algorithmic Cost Modelling, Expert Judgement, and Estimation by Analogy, Parkinson's Law, and Pricing to Win. At here, we use Algorithmic cost modelling such as function points and basic COCOMO model to calculate the effort and development time to develop our software system. We have chosen Algorithmic Cost Modelling because it’s the most systematic, and COCOMO model give the reader an overview of cost estimation.…

    • 333 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    photoelasticity

    • 2727 Words
    • 11 Pages

    An Innovative Polariscope for Photoelastic Stress Analysis Jon R. Lesniak 1, Michael J. Zickel1 , Christopher S. Welch2, Deonna F. Johnson2 Abstract An innovative polariscope involving a single rotating optical element and a digital camera for full-field image acquisition allows automated data to be acquired quickly and efficiently. Software analysis presents the data in an easy to interpret image format depicting the magnitude of the shear strains and the directions of the principal strains. automated grey-field polariscope has been devised that painlessly collects both magnitude and direction data without user intervention.…

    • 2727 Words
    • 11 Pages
    Powerful Essays