Ask Computer Network & Security Expert

1. Is this article evidence that we have a software crisis? How is aviation better off because of software engineering? What issues should be addressed during software development so that problems like this will be prevented in the future?

2. Explain the difference between errors, faults and failures. Give an example of error that leads to a fault in the requirements; the design; the code. Give an example of a fault in the requirements that leads to a failure. A fault in the design that leads to a failure. A fault in the test data that leads to a failure.

3. Give an example of problem analysis where the problem components are relatively simple, but the difficulty is solving the problem lies in the interconnections among sub-problem components.

4. Why can a count of false be a misleading measure of product quality

5. Many developers equate technical quality with overall product quality. Give an example of a product with high technical quality that is not considered high quality by the customer. Are there ethical issues involved in narrowing the view of quality to consider only technical quality? Use the Therac-25 example to illustrate your point.

6. Many organization buy commercial software, thinking it is cheaper than developing and maintaining software in-house. Describe the cons and pros of using COTs software. For example, what happens when if the COTS products are no longer supported by their vendors? What must the customer, user, and developer anticipate when developing a product that uses COTS software in larger system

7. What are the legal and ethical implications of using COTS software? Of using sub contractors. For example, who is responsible for fixing the problem when the major system fails as a result of fault in the COTS software? Who is liable when such systems cause harm to the users, directly (as when the automatic brakes fail in a car) or indirectly (as when the wrong information is supplied to another system as we saw in Exercise 1). What checks and balances are needed to ensure the quality of COTS system before it is integrated into a larger system?

8. The piccadilly television example, as illustrated in figure 1.17 contains great many rules and constraints. Discuss three of them and explain the pros and cons of keeping them outside the system boundary.

9. When the Ariane-5 rocket was destroyed, the news made headlines in France and else-where. Liberation, a French -newspaper, called it "A 37-billion-frane fireworks display" on the front page. In fact the explosion was front-page news in almost all European news-papers and headed the main evening news bulletins on most European TV networks. By contrast, the invasion by a hacker of Panix, a New-York based internet provider, forced the Panix system to close down for several hours. News of this event appeared only on the front page of business section of the Washington part. What is the responsibility of the press when reporting software-based incidents? How should the potential impact of software failures should be assessed and reported.

a. Different languages can produce different numbers of lines of code for implementation of the same design

b. Productivity in lines of code cannot be measured until implementation begins.

c. Programmers may structure code to meet productivity goals

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91548036
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As