Difference between errors or faults and failures

Assignment Help Computer Network Security
Reference no: EM13879522

1. Is this article evidence that we have a software crisis? How is aviation better off because of software engineering? What issues should be addressed during software development so that problems like this will be prevented in the future?

2. Explain the difference between errors, faults and failures. Give an example of error that leads to a fault in the requirements; the design; the code. Give an example of a fault in the requirements that leads to a failure. A fault in the design that leads to a failure. A fault in the test data that leads to a failure.

3. Give an example of problem analysis where the problem components are relatively simple, but the difficulty is solving the problem lies in the interconnections among sub-problem components.

4. Why can a count of false be a misleading measure of product quality

5. Many developers equate technical quality with overall product quality. Give an example of a product with high technical quality that is not considered high quality by the customer. Are there ethical issues involved in narrowing the view of quality to consider only technical quality? Use the Therac-25 example to illustrate your point.

6. Many organization buy commercial software, thinking it is cheaper than developing and maintaining software in-house. Describe the cons and pros of using COTs software. For example, what happens when if the COTS products are no longer supported by their vendors? What must the customer, user, and developer anticipate when developing a product that uses COTS software in larger system

7. What are the legal and ethical implications of using COTS software? Of using sub contractors. For example, who is responsible for fixing the problem when the major system fails as a result of fault in the COTS software? Who is liable when such systems cause harm to the users, directly (as when the automatic brakes fail in a car) or indirectly (as when the wrong information is supplied to another system as we saw in Exercise 1). What checks and balances are needed to ensure the quality of COTS system before it is integrated into a larger system?

8. The piccadilly television example, as illustrated in figure 1.17 contains great many rules and constraints. Discuss three of them and explain the pros and cons of keeping them outside the system boundary.

9. When the Ariane-5 rocket was destroyed, the news made headlines in France and else-where. Liberation, a French -newspaper, called it "A 37-billion-frane fireworks display" on the front page. In fact the explosion was front-page news in almost all European news-papers and headed the main evening news bulletins on most European TV networks. By contrast, the invasion by a hacker of Panix, a New-York based internet provider, forced the Panix system to close down for several hours. News of this event appeared only on the front page of business section of the Washington part. What is the responsibility of the press when reporting software-based incidents? How should the potential impact of software failures should be assessed and reported.

a. Different languages can produce different numbers of lines of code for implementation of the same design

b. Productivity in lines of code cannot be measured until implementation begins.

c. Programmers may structure code to meet productivity goals

Reference no: EM13879522

Questions Cloud

Write a one-page report about use of qualitative research : Write a report about the difference between qualitative and quantitative research methods related to your area of study. Write a one-page report about the use of qualitative research in your area of study.
Embarking upon an enterprise-wide system integration project : Advantage and disadvantage for embarking upon an enterprise-wide system integration project
Formulate an lp model that maximizes profit from the sale : Formulate an LP model that maximizes profit from the sale of produce while meeting the constraints outlined in this exercise including the minimum consumption constraints. Solve the exercise using Solver.
Design value of the overall convection coefficient : A counter flow, concentric tube heat exchanger used for engine cooling has been in service for an extended period of time. The heat transfer surface area of the exchanger is 5 m2, and the design value of the overall convection coefficient is 38 W/..
Difference between errors or faults and failures : Explain the difference between errors, faults and failures
Create a scope management plan : Create a Scope Management Plan and a Work Breakdown Structure (WBS) on a house that I am building and subcontracting out.
Summarize demographics of the crime : Summarize demographics of the crime for both the perpetrators and the victim. Be sure to cover the following: Gender and Ethnicity
Configuration of figure and an inner diameter : A cooling coil consists of a bank of aluminum (k = 237 W/m · K) finned tubes having the core configuration of figure and an inner diameter of 13.8 mm.
Determine the total heat transfer : (a) If the outlet temperature of the oil is 60°C, determine the total heat transfer and the outlet temperature of the water. (b) Determine the length required for the heal exchanger.

Reviews

Write a Review

Computer Network Security Questions & Answers

  How to use tools to evaluate best security mechanisms

How to use tools to evaluate best security mechanisms for dealing with internal and external threats Consolidate all sections of the paper

  Using the prime p 2621and encryption key e 7 encrypt the

1 using the prime p 2621and encryption key e 7 encrypt the message sweet dreams using modular exponentiation.2 what

  Cisco firewall

Using the Web, research the costs associated with the following items when implemented by a firm with 1,000 employees and 100 servers, Managed antivirus software (not open source) license for 500 workstations, Cisco firewall

  How network security be customized for risks management

If not, how can one of these network security best practices be customized to requrements or risks present in the organization? How are risks to particular organization discovered or established?

  Analyze the necessity for different protocols

Identify common frequency bands used in current RF communications. Analyze the necessity for different protocols in wireless communications. Compare the challenges of using satellites in end-to-end communications links

  Characteristics of tamper-resistant devices

Write a concise summary of the themes emerging from your research on the characteristics of tamper-resistant devices and the similarities and differences among them.

  What is the plaintext for the ciphertext 10000001

What is the ciphertext (in binary form) generated by the encryption of the character T (Please show your work.)

  Discuss the steps necessary to make electronic evidence

Identify and discuss the steps necessary to make electronic evidence admissible in court and identify various crimes and incidents that are involved in electronic forensic investigations.

  It project management tasks

Project life cycle consists of different phases. Recognize the main IT project management tasks associated with the concept, development and closeout phases of the project life cycle.

  Examine the pros and cons of hiring white-hat hackers in

ip addresses and network security testing please respond to the following1.examine five reasons why ipv6 has not

  Define the principle of defense in depth

Define the principle of defense in depth. Give two examples of how the principle might be applied: one describing security measures across multiple layers of security architecture, and another describing security measures within a single layer

  Examine the contents of the security and privacy tabs

Using a Microsoft Windows XP, Vista, or 7, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: (a) content filtering and (b) protecti..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd