Difference between errors or faults and failures

Assignment Help Computer Network Security
Reference no: EM13879522

1. Is this article evidence that we have a software crisis? How is aviation better off because of software engineering? What issues should be addressed during software development so that problems like this will be prevented in the future?

2. Explain the difference between errors, faults and failures. Give an example of error that leads to a fault in the requirements; the design; the code. Give an example of a fault in the requirements that leads to a failure. A fault in the design that leads to a failure. A fault in the test data that leads to a failure.

3. Give an example of problem analysis where the problem components are relatively simple, but the difficulty is solving the problem lies in the interconnections among sub-problem components.

4. Why can a count of false be a misleading measure of product quality

5. Many developers equate technical quality with overall product quality. Give an example of a product with high technical quality that is not considered high quality by the customer. Are there ethical issues involved in narrowing the view of quality to consider only technical quality? Use the Therac-25 example to illustrate your point.

6. Many organization buy commercial software, thinking it is cheaper than developing and maintaining software in-house. Describe the cons and pros of using COTs software. For example, what happens when if the COTS products are no longer supported by their vendors? What must the customer, user, and developer anticipate when developing a product that uses COTS software in larger system

7. What are the legal and ethical implications of using COTS software? Of using sub contractors. For example, who is responsible for fixing the problem when the major system fails as a result of fault in the COTS software? Who is liable when such systems cause harm to the users, directly (as when the automatic brakes fail in a car) or indirectly (as when the wrong information is supplied to another system as we saw in Exercise 1). What checks and balances are needed to ensure the quality of COTS system before it is integrated into a larger system?

8. The piccadilly television example, as illustrated in figure 1.17 contains great many rules and constraints. Discuss three of them and explain the pros and cons of keeping them outside the system boundary.

9. When the Ariane-5 rocket was destroyed, the news made headlines in France and else-where. Liberation, a French -newspaper, called it "A 37-billion-frane fireworks display" on the front page. In fact the explosion was front-page news in almost all European news-papers and headed the main evening news bulletins on most European TV networks. By contrast, the invasion by a hacker of Panix, a New-York based internet provider, forced the Panix system to close down for several hours. News of this event appeared only on the front page of business section of the Washington part. What is the responsibility of the press when reporting software-based incidents? How should the potential impact of software failures should be assessed and reported.

a. Different languages can produce different numbers of lines of code for implementation of the same design

b. Productivity in lines of code cannot be measured until implementation begins.

c. Programmers may structure code to meet productivity goals

Reference no: EM13879522

Questions Cloud

Write a one-page report about use of qualitative research : Write a report about the difference between qualitative and quantitative research methods related to your area of study. Write a one-page report about the use of qualitative research in your area of study.
Embarking upon an enterprise-wide system integration project : Advantage and disadvantage for embarking upon an enterprise-wide system integration project
Formulate an lp model that maximizes profit from the sale : Formulate an LP model that maximizes profit from the sale of produce while meeting the constraints outlined in this exercise including the minimum consumption constraints. Solve the exercise using Solver.
Design value of the overall convection coefficient : A counter flow, concentric tube heat exchanger used for engine cooling has been in service for an extended period of time. The heat transfer surface area of the exchanger is 5 m2, and the design value of the overall convection coefficient is 38 W/..
Difference between errors or faults and failures : Explain the difference between errors, faults and failures
Create a scope management plan : Create a Scope Management Plan and a Work Breakdown Structure (WBS) on a house that I am building and subcontracting out.
Summarize demographics of the crime : Summarize demographics of the crime for both the perpetrators and the victim. Be sure to cover the following: Gender and Ethnicity
Configuration of figure and an inner diameter : A cooling coil consists of a bank of aluminum (k = 237 W/m · K) finned tubes having the core configuration of figure and an inner diameter of 13.8 mm.
Determine the total heat transfer : (a) If the outlet temperature of the oil is 60°C, determine the total heat transfer and the outlet temperature of the water. (b) Determine the length required for the heal exchanger.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd