Meta-modeling and goal-oriented modeling

Assignment Help Basic Computer Science
Reference no: EM132524385

Discussion 1.

"Meta-Modeling" Please respond to the following:

A meta-model may be used to relate goal, object, agent, operation, and behavior models. Determine whether or not a system model that represents a meta-model could be functional without all five of the views defined. Provide a rationale.

Determine whether you would use UML class diagrams or another tool to describe meta-models. Support your position.

Discussion 2.

"Goal-Oriented Modeling" Please respond to the following:

Suppose someone made the claim, "There is no difference between modeling the system-as-is and the system-to-be". Provide three reasons to support or refute this claim.

From the e-Activity, provide your opinion as to whether the extension from the article makes it easier or harder to build models compared to using plain UML. Provide a rationale.

Reference no: EM132524385

Questions Cloud

Search engines are monster sized databases : Search Engines are monster sized databases. They are not normalized by any means or are they?
Different uses of these tools besides cryptography : What are the different uses of these tools besides cryptography? How do they work?
Cybersecurity attack on the water utility SCADA system : This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system.
The issue of data privacy in their privacy policy : How social communication sites address the issue of data privacy in their privacy policy?
Meta-modeling and goal-oriented modeling : Determine whether or not a system model that represents a meta-model could be functional without all five of the views defined. Provide a rationale.
Approaches to physical security : Approaches to physical security (APS) is embedded with measurable technique to protect buildings, property, assets and resources against intruders.
Project risks and risk management : You would use to identify, prioritize, and mitigate risk within a large software development project management life cycle.
Different possibilities for virtual private network : Access to the back-end database will be an important part of the network design. Research and discuss the different possibilities for virtual private network
Sampling to reduce the number of data objects : Discuss the advantages and disadvantages of using sampling to reduce the number of data objects that need to be displayed.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a program that contains a text field and a button

Write an application with three buttons labeled "Red", "Green", and "Blue" that changes the background color of a panel in the center of the frame to red, green, or blue.

  What model should you consider for this experiment

Suppose that you want to fit a second-order response surface model in a situation where there are k = 4 factors; however, one of the factors is categorical with two levels. What model should you consider for this experiment? Suggest an appropriate..

  Why is the coefficient of variation important

Why is the coefficient of variation important? What do we mean when we say the coefficient of variation has no units?

  Write a program that reads a value

Write a program that reads a value (say n) from the user and ouputs "Hello world" n times. Verify that the user has entered an integer. If the input is 3, the output will be "hello world" 3 times.

  Describe relationship between project risk management

Determine why project risk management is a key component to bringing a project to successful conclusion. Describe relationship between project risk management

  Which direction would the demand curve shift

Please see the photo for more information regarding this problem. Which direction would the demand curve shift. And which statements are true?

  Evaluate a generation project

Belgravia Petroleum Inc. is trying to evaluate a generation project with the following cash flows:

  Question regarding the troubleshooting tables

Imagine that an associate of yours just designed a table with captions outside the table's borders. The font on the Website is black, and the text inside the table is red. He is frustrated because the captions he placed outside of the table are no..

  Fit a regression model and interpret the results

The time to encrypt or decrypt a k-bit record was measured on a uniprocessor as well as on a multiprocessor. The times in milliseconds are shown in Table 15.12. Using a log transformation and the method for categorical predictors, fit a regression..

  What is the voltage drop across the resistor

A resistor and capacitor are connected in parallel to a 1,000 Hz line. The capacitor has a voltage drop of 200 volts across it. What is the voltage drop across the resistor?

  What is the probability that the phone will generate busy

As manager of a cellular phone system, you want the probability of a busy signal to be less than 0.02 If p = 0.9, what is the minimum value of n necessary to achieve your goal?

  Briefly explain multiple-partition allocation

Briefly explain multiple-partition allocation with example. Also explain Best Fit & First Fit allocation algorithms

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd