How is control managed within the architecture

Assignment Help Computer Engineering
Reference no: EM132134651

Software Engineering

Answer each of the following questions posed for control and data when applied a "stepwise refinement approach" to develop three different levels of procedural abstraction in a simple invoicing system for a small business.

Control:

1. How is control managed within the architecture?

2. Does a distinct control hierarchy exist, and if so, what is the role of components within this control hierarchy?

3. How do components transfer control within the system?

4. How is control shared among components?

5. What is the control topology (i.e., the geometric form that the control takes)?

6. Is control synchronized or do components operate asynchronously?

Data:

1. How are data communicated between components?

2. Is the flow of data continuous, or are data objects passed to the system sporadically?

3. What is the mode of data transfer (i.e., are data passed from one component to another or are data available globally to be shared among system components)?

4. Do data components (e.g., a blackboard or repository) exist, and if so, what is their role?

5. How do functional components interact with data components?

6. Are data components passive or active (i.e., does the data component actively interact with other components in the system)?

7. How do data and control interact within the system?

Reference no: EM132134651

Questions Cloud

A new defense against ddos attacks : Their marketing folks are claiming that this will stop all DDoS attacks cold in the water. Is this a good solution to the problem?
How a systems decomposition into components is driven : Can someone explain how a system's decomposition into components is driven by the system's features/requirements.
What is the value of x : A software has x bugs. A team finds 19 bugs in it. Another team finds 11 bugs in it. Of these, 3 bugs were common to both teams.
Design an algorithm that tests whether or not two input list : Design an algorithm that tests whether or not two input lists of size n have at least one element in common.
How is control managed within the architecture : Does a distinct control hierarchy exist, and if so, what is the role of components within this control hierarchy?
Prepare a sustainability assessment report : Prepare a sustainability assessment report referring to the Consolidated Set of GRI Sustainability Reporting Standards 2016 that specifically addresses
Compute the time difference in minutes between the two time : You need to compute the difference in minutes between the start time and end time, returning the number of minutes to your test main.
What are the best practices in writing program : Question: What are the best practices in writing program? Describe each one briefly.
Write a program using python that asks the user to enter : Quantity discounts are given according to the following table: Quantity Discount 10 - 19 20% 20 - 49 30% 50 - 99 40% 100 or more 50%

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss important e-commerce business models

Describe and provide examples of important e-commerce business models

  Describe a use case dependency for making an account deposit

Describe (in a one to two page narrative) a use case dependency for making an account deposit. Illustrate this use case with Visio or a similar product.

  Identify threats and vulnerabilities in an it infrastructure

To complete Lab 1, please access and complete the lab activities under Topic 1: Identifying Threats and Vulnerabilities in an IT Infrastructure.

  Discuss about the primary audience of the website

To successfully analyze your client's needs, you should collect as much information about the project as possible. To assist in your data collection.

  Write down a driver program to test library

Write down a library Cylinder containing functions to compute the total surface area, lateral surface area, and volume of a right-circular cylinder.

  Discuss what determines which function is actually called

Discuss what determines which function is actually called, the base class member function or the derived class member function.

  How a certified it security professional can add credibility

Describe two IT certifications that may be considered when selecting an expert for an expert witness opinion.

  Prepare plan for utilizing active directory to achieve goals

Prepare a plan for utilizing Active Directory and Group Policy Objects to achieve the goals of setting secure permissions on business unit resources.

  What are bufferedinputoutputstreams and why are they used

question 1 what is the difference between text io and binary io? question 2 what happens if you try to create a

  What is the power of scenario planning

Part 1: answer below question with atleast 350 words in APA format no plagrism and also I need two professional refrences. What is power of scenario planning?

  What circumstances would cause you to do those things

Why would you worry about doing any privilege escalation or leaving backdoors? What circumstances would cause you to do either of those things?

  Simulate the insertion into an initially empty hash table

Consider a linear hash table that uses 4-bit hash keys and stores two records per bucket.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd