Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

1. Is this article evidence that we have a software crisis? How is aviation better off because of software engineering? What issues should be addressed during software development so that problems like this will be prevented in the future?

2. Explain the difference between errors, faults and failures. Give an example of error that leads to a fault in the requirements; the design; the code. Give an example of a fault in the requirements that leads to a failure. A fault in the design that leads to a failure. A fault in the test data that leads to a failure.

3. Give an example of problem analysis where the problem components are relatively simple, but the difficulty is solving the problem lies in the interconnections among sub-problem components.

4. Why can a count of false be a misleading measure of product quality

5. Many developers equate technical quality with overall product quality. Give an example of a product with high technical quality that is not considered high quality by the customer. Are there ethical issues involved in narrowing the view of quality to consider only technical quality? Use the Therac-25 example to illustrate your point.

6. Many organization buy commercial software, thinking it is cheaper than developing and maintaining software in-house. Describe the cons and pros of using COTs software. For example, what happens when if the COTS products are no longer supported by their vendors? What must the customer, user, and developer anticipate when developing a product that uses COTS software in larger system

7. What are the legal and ethical implications of using COTS software? Of using sub contractors. For example, who is responsible for fixing the problem when the major system fails as a result of fault in the COTS software? Who is liable when such systems cause harm to the users, directly (as when the automatic brakes fail in a car) or indirectly (as when the wrong information is supplied to another system as we saw in Exercise 1). What checks and balances are needed to ensure the quality of COTS system before it is integrated into a larger system?

8. The piccadilly television example, as illustrated in figure 1.17 contains great many rules and constraints. Discuss three of them and explain the pros and cons of keeping them outside the system boundary.

9. When the Ariane-5 rocket was destroyed, the news made headlines in France and else-where. Liberation, a French -newspaper, called it "A 37-billion-frane fireworks display" on the front page. In fact the explosion was front-page news in almost all European news-papers and headed the main evening news bulletins on most European TV networks. By contrast, the invasion by a hacker of Panix, a New-York based internet provider, forced the Panix system to close down for several hours. News of this event appeared only on the front page of business section of the Washington part. What is the responsibility of the press when reporting software-based incidents? How should the potential impact of software failures should be assessed and reported.

a. Different languages can produce different numbers of lines of code for implementation of the same design

b. Productivity in lines of code cannot be measured until implementation begins.

c. Programmers may structure code to meet productivity goals

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91548036
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Shadow register setsa describe the use of shadow register

Shadow Register Sets a. Describe the use of shadow register sets. b. How many shadow register sets are supported? c. What instructions are used to move data between them? Floating Point Numbers. We have heretofore focuse ...

Security risk assessment executive summarya detailed

SECURITY RISK ASSESSMENT Executive Summary A detailed Information security risk assessment was carried out on Fiji Directories Limited (FDL) during October 15th 2018 to October 24th 2018. FDL, an ATH group company, is a ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Question snmp initially appeared in 1988 but it did not

Question : SNMP initially appeared in 1988, but it did not receive widespread adoption. What have been the issues with SNMP, and have they been addressed? How widely used is SNMP now? Find some examples of tools that use ...

1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Design and implementation of secure enterprise wireless

Design and implementation of secure enterprise wireless network Purpose of the assessment  (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering th ...

Research assignmentproduce a formal 2000 word report in the

Research Assignment Produce a formal 2000 word report, in the format described in the supplied "Reports format and style" document, examining the various "Transition from IPv4 to IPv6". You are to research and compare th ...

Objectives-to learn about more advanced network security

Objectives -To learn about more advanced network security and vulnerability scanning tools Lab Outcome: · To complete the lab procedures & correctly answer the questions in the Blackboard quiz. Lab Deliverables · Answer ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As