Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 14, Problem 14.1E
Program Plan Intro
System resilience:
System resilience is the judgement, with the help of which any system maintains continuity of systems critical resources during disruptive event which includes cyber-attack or failure of equipment. This comprises of four strategies which are mentioned below:
- Recognition
- Resistance
- Reinstatement
- Recovery
Expert Solution & Answer
Explanation of Solution
Recognition:
- In this type of strategy, the operators of the system detect any possible issues which can cause any sort of system failure and it is generally done before the failure is occurred.
Resistance:
- In this type of strategy, the critical parts of the system are focused as this strategy comes into action when there is any possibility of any cyber-attack is encountered. This action reduces the probability of system failure.
Recovery:
- This strategy is used when system has already taken place and only the critical services of the system are to be restored. With the use of this strategy the faith of the users can be maintained.
Reinstatement:
- This is the final activity that is implemented when the services of any failed system have been recovered and the system is performing all its activities in a normal condition.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
In what ways does the analysis of a system provide difficulties?
What are some of the aspects that go into evaluating a system to determine whether or not it is likely to be successful or if it is impractical?
Why might an effort to create a system be unsuccessful?
When it comes to the deployment, maintenance, and security of information systems, traditional SDLC should be compared to Agile development.
Distinguish between preventive maintenance and perfective maintenance in the context of an information system project.
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- A safety-critical system is one whose failure or misuse may cause human injury or death. Given that an EHR system can be considered to be such a system, which tasks associated with software implementation deserve special attention?arrow_forwardAn adaptive approach to the SDLC is used when the exact requirements of a system or the users' needs are well understood and agreed upon. True Falsearrow_forwarda) In your opinion, at what point in time should users get training on a new system?b)which phase of the system life cycle is considered to be the most innovative and challenging?b) In which step of the SDCL life cycle does the cost of mistake correction decrease to its lowest point?arrow_forward
- which statement about continuity and resilience are correct? ( choose all that apply)arrow_forwardIs there a path forward for the development of legacy systems in terms of strategy?When should an entire system be replaced if the software and hardware of the system continue to have failures?arrow_forwarda) In your opinion, at what point in time should users get training on a new system? b)which phase of the system life cycle is considered to be the most innovative and challenging? b) In which step of the SDLC life cycle does the cost of mistake correction decrease to its lowest point?arrow_forward
- Over the course of the study, system requirements were determined using three different approaches: a classic method, a modern methodology, and a radical strategy. You've examined a variety of approaches throughout your investigation. What, in your view, are the benefits and downsides of each strategy?arrow_forwardHow do long-term consequences of strategic choices during the development of legacy systems manifest themselves? When would it be best to completely replace a system rather than continually improve it via updates?arrow_forwardWhat are some common challenges and limitations associated with prototyping systems, and how can they be mitigated?arrow_forward
- Justification and need for full system testing must be made clear.arrow_forward1. The simplicity of using the system is one of the key features that developers should consider when developing the proposed E-Counselling System. What is the best process model to adopt in building the system? Justify your answer. 1. Suppose that you have been assigned to develop the proposed E-Counselling System and deliver it to the Department of Academic Advising in increments and in the shortest possible time. What is the best process model you should adopt in building the system? Justify your answer.arrow_forwardDiscuss the concept of a microkernel and its impact on system modularity, extensibility, and ease of maintenance.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning