Software Development Life Cycle (SDLC): Methodologies, Testing, and Tools
Software Development Life Cycle (SDLC)
SDLC Phases
The SDLC typically involves seven phases:
- Planning
- Defining Requirements
- Design and Prototyping
- Software Development
- Testing
- Deployment
- Operations and Maintenance
SDLC Methodologies
Waterfall Method
The Waterfall method follows a sequential approach, where each phase is completed before moving on to the next. It is documentation-driven and well-suited for large, critical applications with clearly defined requirements.
Pros:
- Disciplined and structured process
- Clear
12 Essential C Programming Projects for Beginners and Intermediates
Program 1 calender
#include <stdio.H>
#include <stdlib.H>
#include <string.H>
struct Day
{
char *name;
int date;
char *activity;
};
struct Day create()
{
struct Day day;
day.Name = (char *)malloc(20 * sizeof(char));
day.Activity = (char *)malloc(100 * sizeof(char));
printf(“Enter the day name: “);
scanf(“%s”, day.Name);
printf(“Enter the date: “);
scanf(“%d”, &day.Date);
printf(“Enter the activity for the day: “);
scanf(” %[^\n]”, day.Activity);
return day;
}
void
Java Programming: Arrays
Java Programming–Arrays
General Format
<strong style="color:#9013fe"><span style="color:#9013fe">data type </span><span style="color:#417505"><span style="color:#417505">[] </span><span style="color:#4a90e2">arrayName <span style="color:#f5a623"><span style="color:#000000">=</span> <span style="color:#d0021b">new <span style="color:#9013fe"><span style="color:#9013fe">data type </span><span style="color:
Read More
Understanding Memory Management and I/O Devices
WEEK 9 Round Robin Algorithm? How Does It Work?
A scheduling algorithm which has a time quantum. After that set quantum time, the process that was running is preempted and moved back to the arrival queue if it still has burst time remaining.
Demand Paging? Example of Demand Paging.
Demand paging is a method of virtual memory management. Demand paging follows that pages should only be brought into memory if the executing process demands them. This is often referred to as lazy evaluation as only those
Read MoreThe employer shall conduct” + “risk assessment
z
Dependability:most important? User degree of trust in system, system will operate as expected and not fail during normal user interdep attributes: availability,reliability,security, safety, resilience, maintainability, error tolerance, repair ability Why?failures affect lots of people, unreliable = unsafe, cost, info loss, reputation causes: hardware, software, operational. Interdependent safe systems must be safe and reliable which can be hindered by cyberattacks, viruses, ddos attacks which can |
---|
Network Fundamentals: VLANs, Spanning Tree, and Network Layer Concepts
VLANs and Hubs
VLANs require configuration tables in bridges to function. However, if hubs are used instead of switches, configuration tables are not necessary because hubs simply connect incoming lines electrically without performing any routing or configuration.
Spanning Tree Algorithm
Steps:
- Elect a root node (switch with the lowest address).
- Grow the tree as the shortest distances from the root (using the lowest address to break distance ties).
- Turn off ports for forwarding if they are not on the