Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 12, Problem 12.4E
Explanation of Solution
Description of hazards:
- Hazard 1: Leakage of radiation
- The sensor used in the system must detect the leakage of the radiation.
- It rings an alarm with the occurrence of the leakage.
- Hence, the doctors get the notifications and altered.
- Hazard 2: Misuse of the information from the
database - The involvement of the unauthorized user modifies the actual information.
- This may lead to wrong treatment...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
In a construction company, a new system has been in place for a few months and now there is a list of possible changes/updates that need to be done. For each of the changes/updates, specify what type of maintenance needs to be done: (a) corrective, (b) adaptive, and (c) perfective.
An error in the size of one of the fields has been identified and it needs to be updated status field needs to be changed.
The company is expanding into a new type of service and this will require enhancing the system with a new set of tables to support this new service and integrate it with the existing data.
The company has to comply with some government regulations. To do this, will require adding a couple of fields to the existing system tables.
Explain in details each of the following importance of continuous event simulation.
(a) Risk-free environment:
(b) increased accuracy
(c) Visualisation:
(d) Save money and time
Justification and need for full system testing must be made clear.
Chapter 12 Solutions
Software Engineering (10th Edition)
Ch. 12 - Prob. 12.1ECh. 12 - Prob. 12.2ECh. 12 - Prob. 12.3ECh. 12 - Prob. 12.4ECh. 12 - Prob. 12.5ECh. 12 - Prob. 12.6ECh. 12 - Explain why using model checking is sometimes a...Ch. 12 - List four types of systems that may require...Ch. 12 - Prob. 12.9ECh. 12 - Should software engineers working on the...
Knowledge Booster
Similar questions
- A safety-critical system is one whose failure or misuse may cause human injury or death. Given that an EHR system can be considered to be such a system, which tasks associated with software implementation deserve special attention?arrow_forwardIn the context of system maintenance, it is important to distinguish between a patch, release, version, and splitstream update. These terms refer to different types of updates that are applied to a system in order to address various issues or improve its functionality.arrow_forwardA gradual approach to implementing new functionality, beginning with a basic set, then adding more advanced functionality after users have had a chance to adjust to the new system is a good idea because: Group of answer choices Users can get new ideas for advanced functionality once they have a chance to use the basics of the new system. This approach allows for an iterative approach to be taken to fix issues and make improvements to the new system. It sets in motion “the journey” of continuous improvement and process redesign using the new system. All of the above.arrow_forward
- The term "system testing" has numerous meanings. Give an overview of the many sorts of testing that may be performed.arrow_forwardEedddarrow_forwardA system administrator's job is to keep production software safe from being broken by updates. Due to the shortened SDLC of the updated software, rapid enhancements are required. These enhancements need to be approved before they can be implemented. Prior to the rollout of updates, four measures will reduce production downtime.arrow_forward
- An auditor is preparing a systems development process audit for a software development company. The auditor has identified the following six control activities as sources of audit evidence: 1. Users’ involvement in the systems development process2. Systems design3. System authorization4. Pre-implementation testing5. Program code integrity6. Internal audit a.) For each control activity, what documents or evidence will the auditor expect from the software development company? b.) What other control activities would you add to the evidence list?arrow_forwardThe external behavior of a system is described by _____.arrow_forwardA common approach to system testing is to test the most essential functions of a system first, followed by the less vital functions, and so on until the testing budget is exhausted. What ethical ramifications will it have to decide what "more important" means?arrow_forward
- Are there any specific evaluation reports that should be produced when implementing a cyberattack rpogram?arrow_forwardQUESTION 1 Draw level 1 DFD of the given scenario. Mention your brain storming as well before the drawing. Tom is starting a dental practice in a small town. He will have a dental assistant, a dental hygienist, and a receptionist. He wants a system to manage the appointments. When a patient calls for an appointment, the receptionist will check the calendar and will try to schedule the patient as early as possible to fill in vacancies. If the patient is happy with the proposed appointment, the receptionist will enter the appointment with the patient name and purpose of appointment. The system will verify the patient name and supply necessary details from the patient records, including the patient's ID number. After each exam or cleaning, the hygienist or assistant will mark the appointment as completed, add comments, and then schedule the patient for the next visit if appropriate. The system will answer queries name and by date. Supporting details from the patient's records are…arrow_forwardIn the process of developing a system, which of the following types of internal controls do you believe are the most important? Why? Every facet of the controls classification cube has to be taken into consideration (intention, implementation, level).arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning