Quality Attribute Cases - Architecture Questions (21)

Question one

An e-commerce company upgraded its membership and promotion management system to provide personalized services to users and improve user stickiness. At the beginning of the establishment of the project, the leaders of the company agreed that the goal was to improve the flexibility of member management. Since the current user scale is small and the users are simple, there is no need to think too much about the system.

Question 1】

During the architecture evaluation process, the quality attribute utility tree is an important tool for identifying and optimizing the system quality attributes. Please fill in the appropriate quality attribute names in the blanks of 1 and 2 in the figure. a and k are filled in the blanks of 3/4/5/6 respectively.

  1. Administrators can flexibly set discount rules and promotional activity logic on the page, which will take effect after setting.
  2. The system should have complete security protection measures to support the detection and alarm of malicious attacks.
  3. Under normal load conditions, the system should respond to user interface operation requests within 0.3 seconds.
  4. Username is the unique identifier of the system, which must start with a letter, be composed of numbers and letters, and be no less than 6 characters in length.
  5. Under normal load conditions, the user confirms the order payment information within 3 seconds after supporting the commodity fee .
  6. After a power outage at the main site of the system, requests should be redirected to the standby site within 5 seconds.
  7. The system supports horizontal storage expansion, and all expansion and testing work is required to be completed within 2 man-days.
  8. After the system goes down, it needs to sense the error within 10 seconds and automatically start the hot backup system .
  9. The system needs built-in interface functions to support the development team in function debugging and system diagnosis.
  10. The system needs to record all user operations in detail for later review and audit .
  11. Support the adjustment and configuration of the appearance of the system, and the adjustment work needs to be completed within 4 days.

Parse:

Because b is security, (1) should be security, and (4) filling in J tracking audit is also security

Availability of (5) fill in H

For performance (3) fill in C , for performance (3) fill in e

It can be known from g that (2) is extensibility , (6) fill in K (2 is modifiability)

Question 【2】

Regarding the functions of the system, Li Gong suggested adopting an object-oriented architecture style, packaging the calculation of discount strength and user screening into independent objects, and realizing the corresponding functions through object calls; Calculation and user filtering conditions are packaged as independent rules, and the corresponding functions are realized through the interpreter. For the main functions of the system, analyze and compare the two architectural styles from the three aspects of the possibility of discount rules, flexible definition of personalized discounts and system performance, and determine which style is suitable?

Parse:

Flexibility: The interpreter is more flexible, allowing users to flexibly formulate membership rules.

Modifiability: The interpreter is more modifiable than object-oriented. The membership rules of the interpreter mode are independent grammatical rules, which are parsed by the interpreter. It is easier to modify independent rules. Object-oriented needs to be modified according to specific classes. .

Performance: Object-oriented performance outperforms interpreters. Because the object-oriented writing method is relatively fixed, the interpreter is dynamically bound at runtime.

Question two

A narrative on the design and modeling of software systems.

An energy company plans to develop a coal construction project safety early warning system to protect the lives of employees in coal mine construction projects.

【Question 1】

According to the functional requirements of the coal mine construction project safety early warning system, Wang Gong has designed and completed the data flow diagram of the system. Please use the functions (a)~(h) described in the stem to supplement and improve the contents of 1 to 6, and briefly introduce the data The data balance principle that the flow graph follows in the process of hierarchical refinement.

  1. Project Information Maintenance
  2. Input of influencing factors
  3. Associated accident entry
  4. Safety Score Score

  1. Early warning analysis of project indicators
  2. Fill in project indicators
  3. Project indicator review
  4. Project indicator determination

Parse:

123 are fgh

6 is e

4 is d

5 is b

The balance between the parent graph and the sub-graph means that the input/output flow of any sub-graph must be consistent with the corresponding processing input/output flow of the parent graph.

If a certain processing flow in the parent graph corresponds to several data flows in the sub-graph, then these data flows in the sub-graph also point to the data of the parent class, which is also balanced.

I/O streams inside subclass diagrams also need to be balanced.

【Question 2】

Supplement the relevant information in the data flow to the ER diagram, including the specific content of 1~6.

Parse:

(2) Project Manager

(1) Project administrator

(3) Project indicator data

(4) Project information

(5) Index parameters

(6) Accidents and their influencing factors

【Question 3】

In the process of structural analysis and design, data flow diagrams and data dictionaries are commonly used technical means. Please describe their role in software requirement analysis and software design in 200 words .

Answer:

Data flow diagram analysis stage: establish the functional model of the system to complete the demand analysis.

Data flow diagram design phase; provide basis for module division and module interface design.

The role of the data dictionary in the analysis phase and design phase:

It is the basis and unified standard for all personnel to work. It can determine the integrity and consistency of data in the system.

Specific functions include: listing according to various requirements, cross-referencing, retrieving names from description content, consistency check and integrity check.

おすすめ

転載: blog.csdn.net/ke1ying/article/details/132651638