Explain the six-sigma quality constraints

Assignment Help Management Information Sys
Reference no: EM131620598 , Length: 5

Case Study : Why Six-Sigma Efforts Do Not Apply to Software

Read the case study titled, "Why Six-Sigma Efforts Do Not Apply to Software" located in Chapter 9 of the textbook and consider a situation where you are working for a large software development company that is considering applying the Six-Sigma quality constraints to the software it produces.

Write a five to six (5-6) page paper in which you:

Explain the Six-Sigma quality constraints and provide a justification as to why the software development company should consider it.

Compare and contrast quality control processes for both hardware and software.

Examine the arguments presented in the case study and evaluate their applications to control the quality of software produced in the organization.

Propose a testing strategy for a software development project that ensures high quality of the software delivered.

Describe the idiosyncrasies of software, and explain why software needs a different set of rules for testing and for quality control as opposed to those used in hardware.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Compare and contrast testing techniques and concepts to include functional, performance, acceptance, and installation.

Use technology and information resources to research issues in software engineering.

Write clearly and concisely about advanced software engineering topics using proper writing mechanics and technical style conventions.

Reference no: EM131620598

Questions Cloud

Show a breakdown of different types of products : Share one way that you think charts in Microsoft Excel can be used in business (for example, to show a breakdown of different types of products).
Describe the two religious clauses found in first amendment : Describe the two religious clauses found in the First Amendment. Discuss the accommodationist approach and separationist approach as they relate to the textual.
Why a dollar today is worth more than a dollar in the future : Which of the following is NOT a reason why a dollar today is worth more than a dollar in the future?
How much can you save by purchasing two filters : Auto Zone has a special on fuel filters. Normally, the price of one filter is $15, but with this sale, you can purchase two filters for only $27.
Explain the six-sigma quality constraints : Explain the Six-Sigma quality constraints and provide a justification as to why the software development company should consider it.
Considered a cost of financial distress : Which of the following would not be considered a cost of financial distress?
How many coins does she have in the collection : A stack of countertops measures 238 inches. If each countertop is 2 inches thick, how many are in the stack?
Describe distinct differences between civil and criminal law : Describe the distinct differences between the civil law and criminal law. Discuss the influence and outcome of these laws on American criminal justice system.
Review the movie gangs of new york : In-depth movie review of "Gangs Of New York" Martin Scorcese, starring Daniel Day-Lewis

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the protocol in detail

Consider the following protocol (attached file): a. Explain the protocol in detail.b. Can you think of a possible attack on this protocol? Explain in detail how it can be done.

  Defensive and offensive measures to frustrate the attacker

Handling attackers to ensure that the application behaves appropriately when being directly targeted, taking suitable defensive and offensive measures to frustrate the attacker

  Describe the methods for establishing component priorities

Describe the methods for establishing component priorities.Describe the methods for determining component reliance and dependencies.

  What are some strengths of computer systems

Strengths of computer systems and What are some strengths of computer systems and technology use, including hardware and software?

  Describe the challenges that enterprise applications pose

In your own words, describe the challenges that enterprise applications pose and how are enterprise applications taking advantage of new technologies? A successful answer will include three paragraphs with at least five sentences in each paragra..

  Create the same plot and this time using tableau

Create the same plot, this time using Tableau. Compare the two processes of generating the plot in terms of effort as well as the quality of the resulting plots

  Risk, return and portfolios in general

Risk, return, and portfolios in general. Technology stocks in particular - How would you respond to such a comment?

  Distinctions between dsss and expert systems

Distinctions between DSSs and Expert Systems and primary distinctions between DSSs and expert systems.

  What would be some of your potential vulnerabilities

Think of an organization that you are familiar with. Assume that you are the IT Manager concerned with access control. Chose an area that you consider to be the most important with regards to access control. What is the biggest threat? What woul..

  What are pros and cons of outsourcing and offshoring

What are pros and cons of outsourcing and offshoring and Should we curtail outsourcing and offshoring to protect jobs?

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How many years it take to recover the cost of layout change

Determine whether it would be worthwhile to change the layout of the hospital. -  How many years would it take to recover the cost of layout changes?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd