What percentage of the modules exceed the structure

Assignment Help Computer Network Security
Reference no: EM13186627

In her paper, "Developing an Effective Metrics Program," Rosenberg described a group of "sample goals, questions and metrics. The goals are general and could be adapted with minor modifications to any project development. Questions are derived to quantify the goals. The metrics needed to provide the answers to the questions are then chosen and shown in italics."

Here is a goal from her paper, with associated questions and metrics:
 GOAL: Examine the product quality from the point of view of the customer
 QUESTION: What percentage of the modules exceed the structure / architecture guidelines?
 METRIC: Size (such as LOC)
 METRIC: Complexity (such as Oviedo's metric)
 QUESTION: What modules are high risk?
 METRIC: Complexity (such as Oviedo's metric) for each module
 METRIC: Size (such as LOC) for each module
 METRIC: Errors

Use your knowledge of measurement dysfunction to critique this set of questions and metrics. In particular

(a) If you collected these metrics, would they provide you with answers to the questions? Why or why not? What other information, if any, would you need?

(b) If you could answer these questions, could you accurately describe the quality from the point of view of the customer? Why or why not? What other information, if any, would you need?

(c) If you relied on these metrics, would any aspect of the project be systematically under-managed or mismanaged? Explain your thinking.

Reference no: EM13186627

Questions Cloud

State what is the half life of the reaciton : gave straight line relationship. It took 52.3 seconds for concentration of A to decrease from 0.667 M to 0.117 M. What is the half life of the reaciton when [A]o = 0.667 M?
Pros-and-cons for less developed-countries of mne investment : Much of the discussion regarding the effects of MNE investment on "host" countries has focused on the pros-and-cons for less developed-countries (LDCs). Access these arguments in terms of post-WWII experience up to the present day, particularly th..
State separating eucalytus oil : Based on the structure and boiling point(176-177C) of Eucalytol. what aspects of this molecule allow it to separate from hexane? And which of the following temperature option of is best for separating eucalytus oil and why?
Find the stopping distance required by an alfa romeo : cording to Car and Driver, an Alfa Romeo going 70 mph requires 177 feet to stop. Assuming that the stopping distance is proportional to the square of the velocity, find the stopping distance required by an Alfa Romeo going at 45mph and 130mph.
What percentage of the modules exceed the structure : Examine the product quality from the point of view of the customer and what percentage of the modules exceed the structure / architecture guidelines?
Show how to approximate the required work : A cable that weighs 6 lb/ft is used to lift 850 lb of coal up a mine shaft 300 ft deep. Find the work done.
What recovery of product based on the mass of crude product : "What was the % recovery (by mass) of product based on the mass of crude product?" The starting unkown material weighed .2415g, the melting point of just the sample was 51.4-95.2 degrees C,
Calculate the level of incremental profit per unit : Barney Rubble, marketing director for Flintstones, is considering whether or not the company should market its product directly to end users for $300 per unit. Although no added investment in productive facilities is required, there are additional..
What is the discrepancy rate of closure : If you collected these metrics, would they provide you with answers to the questions? Why or why not? What other information, if any, would you need?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Different logon passwords to be five upper-case letters

Computer system 1 needs logon passwords to be five upper-case letters. How many different passwords are there for system 1?

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Describe the security features available on a platform

Describe the security features available on a platform of your choice (for example, Linux/Android/Mac OS X/Windows/Apache/Java/Perl), to mitigate a specific type of attack (for example, adware/malware/SQL injection/spoofing/tampering).

  Determine the legal and ethical considerations

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  Analyse security procedures

Analyse security procedures

  It infrastructure groups

Information Technology infrastructure groups are often responsible for direct customer interaction and associated customer service.

  Strong ciphers produced by the enigma machine

Concur with, dispute, or qualify following statement: "The strong ciphers produced by Enigma machine are  result of complex mathematical trapdoor functions used to encrypt messages."

  Implement client-server application to emulates ping utility

The goal of this assignment is to implement a client-server application which emulates the ping utility. It is also good practice because it implements the client-server architecture.

  Denial of service and distributed denial of service attacks

US cryptography export restrictions: past, present, and future and biometrics for authentication: security and privacy implications.

  Defects of gsm networks

Security mechanism, threat, GSM networks, DDoS attacks, IPv4, IPv6, IPsec integrity, authentication and privacy, IPsec AH,  ‘single sign-on' in the context of access control, Secure Electronic Transaction (SET) protoco,  Encryption

  Determine plaintext and key from vigenere cipher

Below are ciphertext from Vigenere cipher. Determine plaintext and key. Give a clearly written description of steps you followed to decrypt each ciphertext.

  Prepare a security checklist for new century

You decide to prepare a security checklist for New Century. Prepare a list of security issues that the firm should evaluate and monitor. Be sure to organize the items into categories that match the five security levels.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd