Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
thumb_up100%
Chapter 25, Problem 25.1E
Explanation of Solution
Problems:
The problem that could arise when a company does not develop effective configuration management policies and processes are as follows:
- It is not possible to create new versions of software systems effectively as they change. As well as it is not possible for the developers to keep track of the changes to the software.
- It is difficult to control the costs and effort involved in making changes to a system.
- There may be chances to forget the storage place of the software source code for a particular version. In some cases, wrong version of a system may be delivered to the customers.
- Configuration management is seen as a part of a more general quality management process which results in ineffective quality management process.
- If some one is leaving the company, then it is very difficult to protect investments in software, and to reproduce a build with the correct component or continue development.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
In the context of managing large-scale systems, discuss the significance of configuration management and its role in system maintenance.
Discuss the principles of "configuration management" and its role in maintaining system consistency.
QUESTION 26
Within the Configuration Management Plan what is the entity called that reviews all changes that are submitted by systems within an organization?
O SELC Review Board
O Project change review Board
O SDLC Review Board
O Configuration Control Board
QUESTION 27
The reason why Laws, Regulations, and Guidance are written is because it provides organizations structure when they are defining their specific policies and
procedures.
O True
O False
QUESTION 28
Within the idea of Security Awarness and Training there are usually 2 different types oof training for General Users and Adminstrators
O True
O False
Chapter 25 Solutions
Software Engineering (10th Edition)
Ch. 25 - Prob. 25.1ECh. 25 - Prob. 25.2ECh. 25 - Imagine a situation where two developers are...Ch. 25 - Prob. 25.4ECh. 25 - Prob. 25.5ECh. 25 - With reference to system building, explain why you...Ch. 25 - Prob. 25.7ECh. 25 - Prob. 25.8ECh. 25 - Describe six essential features that should be...Ch. 25 - Describe five factors that engineers should take...
Knowledge Booster
Similar questions
- You and your team have been hired to perform a system investigation for a fast food restaurant that wants to implement new tools and processes to improve its customer service. Currently, the restaurant has a poor reputation for not correctly filling customers orders and for taking too long to do it. Perform a functional decomposition to define the scope and basic requirements of such a system. Brainstorm some ideas to improve the situation, and choose one to pursue based on its technical, economic, legal, operational, and schedule feasibility.arrow_forwardWhat are the challenges associated with implementing a centralized vs. decentralized system management strategy?arrow_forwardWhat are the advantages of implementing a decentralized system management approach?arrow_forward
- The CHAOS report is a study based on the CHAOS research project on IT project success rates and project management methods conducted by the "Standish Group." Explain in detail the CHAOS study from 1994 and how it may help software projects succeed. How can we ensure the success of our projects? What is a software product's configuration? Is it possible to talk about the configuration management activities?arrow_forwardBased on the case study given, write a short summary on what was the main problem with the company’s Procurement exercise.arrow_forwardDiscuss the role of configuration management in maintaining system stability and consistency.arrow_forward
- Examine three approaches to formulating system requirements: a classic, a contemporary, and a radical way. When is the optimal time to use each of the several tactics you compared? What are the disadvantages of each approach? If you could only select one, which would it be?arrow_forwardwerrearrow_forwardWhich among what is given below is not appropriate to be included as a system operation decision? a. Scheduling b. Quality Assurance c. Capacity Planning d. Location Planning e. None of the abovearrow_forward
- Analyze three different techniques for determining system requirements: one classic, one modern, and one radical.The most appropriate time to apply every single strategy you compared is when?What are the disadvantages of using each method?Which technique would you use if you had to choose?arrow_forwardThe team has decided to focus on agile principles of transparency andcollaborative planning to address risk. Briefly explain the benefits in using this approach.arrow_forwardSuggest the suitable models for the following mentioned scenarios 1. Process Visibility is necessary 2. For Small and medium size interactive systems 3. To explore unknown requirements 4. To accommodate change at any time 5. Need to reduce the risk of overall project failure 6. Need of Risk Assessmentarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningInformation Technology Project ManagementComputer ScienceISBN:9781337101356Author:Kathy SchwalbePublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning