Describe the software engineering process

Assignment Help Computer Engineering
Reference no: EM132165120

Assignment 2: Software Engineering, CMMI, and ITIL

Realizing that an organization's CMMI level impacts an organization's success on requests for proposals (RFPs), your CIO wants to get the software development processes to CMMI level 3. Your organization has started developing software applications and database systems for their customers. The CIO wants to ensure that the software development and database development processes are being properly managed and audited, and he wants to ensure that the organization begins taking the necessary steps to progress to CMMI level 3. In preparation for your response, review the CMMI information available at the Carnegie Mellon Website.

IT managers will commonly manage software development and systems integration activities. Write a three to five (5-6) page paper in which you:

1. Describe the software engineering process, the challenges in managing software development activities, and the potential interface issues from the software development perspective.

2. Analyze the CMMI levels and define a roadmap that the organization will need to follow in order to get their software development processes to CMMI level 3. Note: This is important because the CMMI level that an organization achieves impacts their software development reputation.

3. Explain the auditing tasks that must be performed in order to achieve level 3.

4. Determine the continuous assurance auditing activities that the organization will need to implement to help achieve CMMI level 3.

5. Analyze the ITIL service management guidelines and principles.

6. Examine how ITIL service management practices relate to CMMI levels and continuous service auditing.

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM132165120

Questions Cloud

Graphical elements to produce site with strong visual appeal : What are the constraints on using graphical elements to produce a site with strong visual appeal?
Discuss the possible reasons to buy a watch today : What does these big tech companies believe will motivate consumers to purchase these products?
What gets in the way of most leaders coaching effectively : How does a leader gain coaching skills and what gets in the way of most leaders coaching effectively?
Do you think software and hardware products are advertised : Your analysis of the strategic management appears to be accurate. Strategic management focus is on long-term goals incorporating development and growth.
Describe the software engineering process : Describe the software engineering process, the challenges in managing software development activities, and the potential interface issues from the software.
What do you see as the challenges facing web analytics : What do you see as the biggest challenges facing web analytics and how can those challenges be overcome?
Determine what that statute accomplishes : Please post the hyperlink to one federal statute which influences commerce on the internet and summarize in not less than 100 words.
What is dippin dots competitive strategy : What role did entrepreneurial strategy and the management of innovation play in establishing Dippin' Dots' iniital competitive edge?
Create a pert diagram that identifies the critical path : Create a PERT diagram that identifies the critical path. Take a screenshot of the PERT chart which can later be inserted into your written paper.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe any environmental conditions or for evidence room

How should the items you collected as evidence be stored in your evidence room. Describe any environmental conditions or concerns for your evidence room (digital evidence can require some unique considerations!), as well any security procedures t..

  Question1 a multiprogramming operating system uses an

question1. a multiprogramming operating system uses an apportioning method and divides the 60 mb of existing memory

  How many times does the top module call each subordinate

What tool would not be useful in preparing a Module Specification for a programmer to code the Update Account Module?

  Have you created things to share freely with the online

Web 2.0 has created numerous channels for people to offer their own work for free-open source software, free music, books, and artwork.

  What is the system bus and what are its main components

What is the system bus? What are its main components? What is a bus master? What is the advantage of having devices other than the CPU be bus masters?

  What is the probability that bob gets a red ball

If Alion fint Laukkomly draws a ball without replroment, and tueth Bob draws a ball at ramloum. What tlut Bob gets a red ball, given that Alice gets red ball?

  When is off-line programming normally used

Timers and counters use words of memory, but contacts, coils, and branch start instructions do not.

  Determine the type of the appointment to be loaded

Improve your Appointment program by giving the user the option to add new Appointments. The user must specify the type of the appointment, the description, and the date and time.

  Write a program that prompts the user to enter coordinates

Write a program that prompts the user to enter the center coordinates and radii of two circles and determines .

  Summarize cpu data types and common data structures

Summarize CPU data types and common data structures.Discuss common input / output technologies.Summarize the different types of data storage technology.Develop an enterprise architecture plan to address and solve a proposed business ethical problem.

  Create the hash function that produces an n bit hash

Use an encryption function to create a hash function. Assume you have an encryption function of n bits - and you are to construct a hash function of n bits.

  Design a visual c-sharp program for an ice cream shop

design a Visual C-Sharp program for an Ice Cream Shop. The program will store data about ice cream cones and customers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd