1. What is a naming model used for? 2. List the four major activities associated
ID: 3706867 • Letter: 1
Question
1. What is a naming model used for?
2. List the four major activities associated with software configuration management.
3. What are check-in and check-out?
4. List three concerns you may need to look into before choosing a configuration management tool.
5. What are the build steps of a single program?
6. What is linking and what are we linking in a build process?
7. Explain the difference between the view and the modify functions in the storage and access model of configuration management.
8. Name a tool from each of the three tiers of automating the configuration management activities.
Explanation / Answer
1. What is a naming model used for?
Answer:
A naming model is needed for configuration management in order to uniquely identify and control the pieces and parts of the artifacts.
2. List the four major activities associated with software configuration management.
Answer:
four major activities associated with software configuration management are mentioned below
a) understand and agree on organization’s policies, process activities, and the resulting artifacts that need to be managed,
b) determine and define the framework that needs to be used to manage the artifacts,
c) determine and bring in any tool that is needed to facilitate the management, and
d) train and ensure that the agreed upon configuration management process is practiced and adhered to
3. What are check-in and check-out?
Answer:
Check-in refers to storing or returning an artifact to a configuration management’s library while check-out refers to retrieving an artifact from the configuration management’s library.
4. List three concerns you may need to look into before choosing a configuration management tool.
Answer:
There are many concerns and should include these:
a) is the tool easy to learn and what kind of education is provided by the tool vendor,
b) does the tool have all the needed functionalities to accommodate the organization’s naming model and access model and
c) can the tool accommodate geographically separate, multi-site development and support
5. What are the build steps of a single program?
Answer:
Software system build is a set of activities where all the software source code and data artifacts are gathered for compilation into an executable. All the cross references and external names are resolved. The complete set of artifacts are compiled and linked together into an executable
6. What is linking and what are we linking in a build process?
Answer:
Linking is an activity to tie together all the needed, externally reference items for the software.
7. Explain the difference between the view and the modify functions in the storage and access model of configuration management.
Answer:
The “view” function is the retrieval of an artifact for the purpose of reading the artifact and may be performed by all at all times. The “modify” function is the retrieval of an artifact for the purpose of making changes to the artifact. Thus in the case of modify, only those authorized should be allowed to perform the function. In addition, to prevent conflicts, when an artifact X is retrieved for modification, that X is locked from other modify function until it is returned. X may still be viewed by others
8. Name a tool from each of the three tiers of automating the configuration management activities.
Answer:
The tools for the three tiers are: First tier = Performing version control – Revision Control System (RCS) and Source Code Control System (SCCS) Second tier = Include the build function – MAKE utility in UNIX systems and Odin Third tier = Integrate the configuration, development, and support activities – ClearCase, PVCS (Serena ChangeMan), and Visual SourceSafe
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.