Software Development Life Cycle (SDLC): Methodologies, Testing, and Tools

Software Development Life Cycle (SDLC)

SDLC Phases

The SDLC typically involves seven phases:

  1. Planning
  2. Defining Requirements
  3. Design and Prototyping
  4. Software Development
  5. Testing
  6. Deployment
  7. Operations and Maintenance

SDLC Methodologies

Waterfall Method

The Waterfall method follows a sequential approach, where each phase is completed before moving on to the next. It is documentation-driven and well-suited for large, critical applications with clearly defined requirements.

Pros:

  • Disciplined and structured process
  • Clear
Read More

12 Essential C Programming Projects for Beginners and Intermediates

Program 1 calender

#include <stdio.H>
#include <stdlib.H>
#include <string.H>
struct Day 
{
 char *name;
 int date;
 char *activity;
};
struct Day create() 
{
 struct Day day;
 day.Name = (char *)malloc(20 * sizeof(char)); 
 day.Activity = (char *)malloc(100 * sizeof(char)); 
 printf(“Enter the day name: “);
 scanf(“%s”, day.Name);
 printf(“Enter the date: “);
 scanf(“%d”, &day.Date);
 printf(“Enter the activity for the day: “);
 scanf(” %[^\n]”, day.Activity);
 return day;
}
void

Read More

Java Programming: Arrays

Java Programming–Arrays

General Format

<strong style="color:#9013fe"><span style="color:#9013fe">data type </span><span style="color:#417505"><span style="color:#417505">[] </span><span style="color:#4a90e2">arrayName <span style="color:#f5a623"><span style="color:#000000">=</span>&nbsp;<span style="color:#d0021b">new <span style="color:#9013fe"><span style="color:#9013fe">data type </span><span style="color:
Read More

Understanding Memory Management and I/O Devices

WEEK 9 Round Robin Algorithm? How Does It Work?

A scheduling algorithm which has a time quantum. After that set quantum time, the process that was running is preempted and moved back to the arrival queue if it still has burst time remaining.

Demand Paging? Example of Demand Paging.

Demand paging is a method of virtual memory management. Demand paging follows that pages should only be brought into memory if the executing process demands them. This is often referred to as lazy evaluation as only those

Read More

The employer shall conduct” + “risk assessment

z

Dependability:


most important? User degree of trust in system, system will operate as expected and not fail during normal user interdep attributes:
availability,reliability,security, safety, resilience, maintainability, error tolerance, repair ability

Why?


failures affect lots of people, unreliable = unsafe, cost, info loss, reputation causes:

hardware, software, operational. Interdependent safe systems must be safe and reliable which can be hindered by cyberattacks, viruses, ddos attacks which can
Read More

Network Fundamentals: VLANs, Spanning Tree, and Network Layer Concepts

VLANs and Hubs

VLANs require configuration tables in bridges to function. However, if hubs are used instead of switches, configuration tables are not necessary because hubs simply connect incoming lines electrically without performing any routing or configuration.

Spanning Tree Algorithm

Steps:

  1. Elect a root node (switch with the lowest address).
  2. Grow the tree as the shortest distances from the root (using the lowest address to break distance ties).
  3. Turn off ports for forwarding if they are not on the
Read More