Computer Science: An Overview (12th Edition)
12th Edition
ISBN: 9780133760064
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 7, Problem 1SI
a.
Explanation of Solution
What should Marry do?
- Marry must not avoid the flaws. She can easily find out at which point system is defected with the help of some methodologies.
- These methodologies are called software testing. If Mary does not get correct output, then she can test the system by black box testing. The results of any system are tested in black box testing...
b.
Explanation of Solution
What should Mary do and to what extent she is liable to for the breach of the security?
- A software license grants the user certain permissions to use the product without transferring ownership rights to the intellectual property.
- Hence, Marry should get the patent for her software and get the copyright license...
c.
Explanation of Solution
Were Mary Analyst’s actions correct?
“Yes”, Mary Analyst’s actions were correct.
- Because if the system has flaws sooner or later it will show up and the system will fail. That will also do big damage to the system as well as financial hardship and some employees may lose their jobs...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Describe John von Neumann has made to computer science. Particularly, the contributions that he has made to the architecture of the modern computer in computer technology.
From the workplace to the home to even the domain of robots, computers have penetrated almost every part of human life. Consider the idea that computers may one day run the whole world. Ensure that you include at least TWO advantages and disadvantages of frequent computer usage in your analysis.
In the realm of computer architecture, can you differentiate between the Harvard and von Neumann approaches?
Chapter 7 Solutions
Computer Science: An Overview (12th Edition)
Ch. 7.1 - Prob. 1QECh. 7.1 - Prob. 2QECh. 7.1 - Prob. 3QECh. 7.1 - Identify two contexts in which the field of...Ch. 7.2 - Prob. 1QECh. 7.2 - Prob. 2QECh. 7.2 - What is the role of a software requirements...Ch. 7.3 - Prob. 1QECh. 7.3 - Prob. 2QECh. 7.3 - Prob. 3QE
Ch. 7.3 - What potential problems do you suspect could arise...Ch. 7.4 - Prob. 1QECh. 7.4 - Prob. 2QECh. 7.4 - Prob. 3QECh. 7.4 - Prob. 4QECh. 7.4 - Prob. 5QECh. 7.4 - What is the difference between a traditional...Ch. 7.4 - Prob. 8QECh. 7.5 - Prob. 1QECh. 7.5 - Prob. 2QECh. 7.5 - Prob. 3QECh. 7.5 - Prob. 4QECh. 7.5 - Prob. 6QECh. 7.6 - Prob. 1QECh. 7.6 - Prob. 2QECh. 7.6 - Prob. 3QECh. 7.6 - Prob. 4QECh. 7.6 - Prob. 5QECh. 7.6 - Prob. 6QECh. 7.7 - Prob. 1QECh. 7.7 - Prob. 2QECh. 7.7 - Prob. 3QECh. 7.8 - Prob. 1QECh. 7.8 - Prob. 2QECh. 7.8 - Prob. 3QECh. 7.8 - Prob. 4QECh. 7.9 - Prob. 1QECh. 7.9 - Prob. 2QECh. 7.9 - Prob. 3QECh. 7 - Give an example of how efforts in the development...Ch. 7 - Prob. 2CRPCh. 7 - Explain how the lack of metrics for measuring...Ch. 7 - Would you expect that a metric for measuring the...Ch. 7 - Prob. 5CRPCh. 7 - Prob. 6CRPCh. 7 - Prob. 7CRPCh. 7 - Prob. 8CRPCh. 7 - Prob. 9CRPCh. 7 - Prob. 10CRPCh. 7 - Prob. 11CRPCh. 7 - Prob. 13CRPCh. 7 - Prob. 14CRPCh. 7 - Prob. 15CRPCh. 7 - Prob. 16CRPCh. 7 - Prob. 17CRPCh. 7 - Prob. 18CRPCh. 7 - Prob. 20CRPCh. 7 - Prob. 21CRPCh. 7 - Prob. 22CRPCh. 7 - Prob. 23CRPCh. 7 - Prob. 24CRPCh. 7 - Contrast the information represented in a class...Ch. 7 - What is the difference between a one-to-many...Ch. 7 - Prob. 27CRPCh. 7 - Prob. 28CRPCh. 7 - Prob. 29CRPCh. 7 - Prob. 30CRPCh. 7 - Prob. 31CRPCh. 7 - Prob. 32CRPCh. 7 - Prob. 33CRPCh. 7 - Prob. 34CRPCh. 7 - Extend your solution to the previous problem to...Ch. 7 - Prob. 38CRPCh. 7 - Prob. 39CRPCh. 7 - Identify some design patterns in fields other than...Ch. 7 - Prob. 41CRPCh. 7 - Prob. 42CRPCh. 7 - Prob. 43CRPCh. 7 - Prob. 44CRPCh. 7 - Prob. 45CRPCh. 7 - Prob. 46CRPCh. 7 - How does open-source development differ from beta...Ch. 7 - Prob. 48CRPCh. 7 - Prob. 49CRPCh. 7 - Prob. 50CRPCh. 7 - Prob. 51CRPCh. 7 - Prob. 52CRPCh. 7 - In what ways can a software developer be...Ch. 7 - Prob. 1SICh. 7 - Prob. 2SICh. 7 - Prob. 3SICh. 7 - Prob. 4SICh. 7 - Prob. 5SICh. 7 - What happens if technology begins to advance so...Ch. 7 - Is the computer revolution contributing to, or...Ch. 7 - Prob. 8SICh. 7 - If you had a time machine, in which period of...Ch. 7 - Prob. 10SI
Knowledge Booster
Similar questions
- The following question are intended as a guide to the ethical/social/legal issues associated with the field of computing. The goal is not merely to answer these question. You should also consider why you answered as you did and whether your justifications are consistent from one question to the next. In the context of interactive television, to what extent should a company be allowed to retrieve information from children (perhaps via an interactive game format)? For example, should a company be allowed to obtain a child's report on his or her parents' buying patterns? What about information about the child?arrow_forwardIs it possible to distinguish computer architecture from computer organization? You are free to submit whatever examples you choose.arrow_forwardWhat precisely is the academic field of computer science, and how does it vary from other fields of research in the academic world? When do these things happen, and in what particular order?arrow_forward
- In what ways, if any, does the study of computer science differ from, or complement, other academic disciplines? How do they accomplish their goals?arrow_forwardCan the inner workings of a computer be described using this? After that, I anticipate that we will discuss the many subsystems that make up a computer.arrow_forwardShould I be aware of any discrepancies between the von Neumann and Harvard computer designs?arrow_forward
- It is necessary to provide both an explanation and a demonstration of the numerous stages that comprise the lifetime of a computer. It is necessary to provide in-depth explanations of, and examples for, each of the multiple stages that comprise the lifetime of a computer.arrow_forwardIn the field of computer architecture, are you able to describe the distinction between the Harvard and von Neumann systems?arrow_forwardTo what extent are you familiar with Ada Lovelace and the impact she had on the field of computing?arrow_forward
- Are you able to explain the difference between the Harvard and von Neumann systems, which both fall under the umbrella of the discipline of computer architecture?arrow_forwardConduct a thorough research into the following and produce outputs with referencing. The six levels in our computer science hierarchy are as follows: Level 1: The Algorithmic Foundations of Computer ScienceLevel 2: The Hardware WorldLevel 3: The Virtual MachineLevel 4: The Software WorldLevel 5: ApplicationsLevel 6: Social Issues in Computingarrow_forwardAre you able to describe the distinction between Harvard and von Neumann systems in terms of computer architecture?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning