Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
Suppose that the designers of the laboratory access system have settled on a system that uses a swipe card and a card reader to access the laboratories. How would you set about evaluating this design? Use the design principles to discuss the key issues .
0
votes
435
views
asked
Dec 20, 2020
in
Computer Aided Design
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
+2
votes
1
answer
1.0k
views
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
2.3k
views
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.4k
views
Duplicate: How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct. Would the same be true if you were developing a model of a new system?
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.1k
views
What factors have to be taken into account in the design of a menu-based interface for ‘walk-up’ systems such as bank ATMs? Write a critical commentary on the interface of an ATM that you use.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
0
answers
423
views
Compare and contrast three (3) performance assessment methods that could be used in evaluating the performance of computers. In each case demonstrate how it could be used to evaluate the performance of a set of computers.
asked
Jul 28, 2020
in
Computer Architecture
by
anonymous
+1
vote
1
answer
851
views
Extreme Programming expresses user requirements as stories with each story written on a card. Discuss the advantages and disadvantages of this approach to requirements description
asked
May 11, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
808
views
Extreme programming expresses user requirements as stories, with each story written on a card. Discuss the advantages and disadvantages of this approach to requirements description.
asked
Apr 27, 2021
in
Software Engineering
by
anonymous
+2
votes
1
answer
11.4k
views
Extreme programming expresses user requirements as stories, with each story written on a card. Discuss the advantages and disadvantages of this approach to requirements description.
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
+3
votes
1
answer
2.1k
views
You have been asked to design a secure system that requires strong authentication and authorization. The system must be designed so that communications between parts of the system cannot be intercepted and read by an attacker.
asked
Nov 23, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
725
views
You have been given the task of ‘selling’ formal specification techniques to a software development organization. Outline how you would go about explaining the advantages of formal specifications to sceptical, practising software engineers.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.9k
views
Skype offers a service that allows you to make a phone call from a PC to an ordinary phone. This means that the voice call must pass through both the Internet and through a telephone network. Discuss how this might be done.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.1k
views
You are responsible for the design of a communications switch that has to provide 24/7 availability, but which is not safety-critical. Giving reasons for your answer, suggest an architectural style that might be used for this system.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
–1
vote
1
answer
682
views
Duplicate: You have been asked to prepare and deliver a presentation to a non-technical manager to justify the hiring of a system architect for a new project. Write a list of bullet points setting out the key points in your presentation. Naturally.
asked
Feb 1, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
553
views
Duplicate: You have been asked to prepare and deliver a presentation to a non-technical manager to justify the hiring of a system architect for a new project. Write a list of bullet points setting out the key points in your presentation. Naturally,
asked
Feb 1, 2021
in
Software Engineering
by
anonymous
+4
votes
1
answer
7.0k
views
How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
268
views
It is argued that understanding peoples existing activities doesn’t help to design future technologies. Which requirements elicitation techniques are most likely to be effective in helping users and designers to create the future?why?
asked
Dec 20, 2020
in
Computer Aided Design
by
anonymous
+1
vote
1
answer
9.0k
views
Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent connections, and is currently receiving requests from two different Hosts, A and B.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.4k
views
Java uses a right brace to mark the end of all compound statements. What are the arguments for and against this design?
asked
Oct 6, 2019
in
Programming Languages & Algorithms
by
anonymous
+1
vote
0
answers
384
views
Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system.
asked
Dec 4, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.5k
views
Duplicate: Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system.
asked
Jul 20, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
12.6k
views
Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system.
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
237
views
What you know about windows NT. Write down the evolution and history of windows NT? State some design principles Also?
asked
Sep 14, 2021
in
Compilers & Operating Systems
by
anonymous
+2
votes
1
answer
2.5k
views
By means of a clearly labeled Memory Hierarchy diagram, discuss the pro and cons of the use of the various memory segments in the design and build of a personal computer on a Intel based architecture.
asked
Aug 23, 2019
in
Computer Architecture
by
anonymous
+2
votes
1
answer
2.2k
views
Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the Web servers (outside your department) that are most popular among the users in your department? Explain.
asked
Sep 25, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
5.6k
views
Consider a reliable data transfer protocol that uses only negative acknowledgments. Suppose the sender sends data only infrequently. Would a NAK-only protocol be preferable to a protocol that uses ACKs?
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
234
views
Prove that if the number of Transistors is doubled, the increase in the performance of the processor will be in the region of 40% and discuss the relevance of this mathematical observation to multi-processor computing architecture design.
asked
Aug 26, 2021
in
Computer Architecture
by
anonymous
+1
vote
2
answers
3.0k
views
To help counter terrorism, many countries are planning or have developed computer systems that track large numbers of their citizens and their actions. Discuss the ethics of this..
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
739
views
Explain how you would use the reference model of CASE environments to compare the IDEs offered by different vendors of a programming language such as Java.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
8.0k
views
When describing a system, explain why you may have to start the design of the system architecture before the requirements specification is complete.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
4.5k
views
For the Mentcare system, propose a set of use cases that illustrates the interactions between a doctor, who sees patients and prescribes medicine and treatments, and the Mentcare system.
asked
Aug 30, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.5k
views
An address space uses three symbols: 0, 1, and 2 to represent addresses. If each address is made of 10 symbols, how many addresses are available in this system?
asked
Jul 3, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
41
views
Suppose that routers were subjected to conditions that might cause them to fail fairly often. Would this argue in favor of a VC or datagram architecture?
asked
5 days
ago
in
Computer Networks
by
(user.guest)
+3
votes
1
answer
629
views
Duplicate: One approach that is commonly adopted to system testing is to test the system until the testing budget is exhausted and then deliver the system to customers. Discuss the ethics of this approach.
asked
Mar 21, 2020
in
Software Engineering
by
anonymous
+1
vote
0
answers
669
views
You have been asked to develop a system that will help with planning large-scale event and parties, using an activity diagram model the process context for such a system that shows the activities involved in planning a party
asked
Nov 10, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
6.0k
views
Suppose we extend Evans’s ANALOGY program so that it can score 200 on a standard IQ test. Would we then have a program more intelligent than a human? Explain.
asked
Oct 1, 2019
in
Artificial Intelligence
by
anonymous
0
votes
0
answers
287
views
Suppose, there are N number of operations that have to be performed for a transaction. Now describe, in which state the (N-1) operations will be executed and what’s the name of N th operation for that specific transaction.
asked
Dec 23, 2020
in
Database Management Systems
by
anonymous
–1
vote
1
answer
791
views
Duplicate: Why would you choose a database system instead of simply storing data in operating system files? When would it make sense not to use a database system?
asked
Oct 19, 2020
in
Database Management Systems
by
anonymous
+2
votes
1
answer
10.0k
views
Why would you choose a database system instead of simply storing data in operating system files? When would it make sense not to use a database system?
asked
Mar 30, 2020
in
Database Management Systems
by
anonymous
+1
vote
0
answers
249
views
As the Business Development Manager of a company, write a technical proposal on how a new product or service that you intend to introduce into the market could benefit prospective clients
asked
Aug 2, 2020
in
Software Engineering
by
anonymous
+1
vote
0
answers
138
views
Where natural language descriptions are presented in a standard format, write plausible user requirements for an unattended petrol pump system that includes a credit card reader
asked
Dec 1, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
466
views
Imagine that u had been to an aquarium and seen a shark and an octopus. Describe this to a child who has never seen one. What resources and mechanism does the child use to comprehend nature of these marine animals
asked
Aug 15, 2021
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
4.6k
views
Suppose you wanted to do a transaction from a remote client to a server as fast as possible. Would you use UDP or TCP? Why?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
–1
vote
1
answer
472
views
Duplicate: When describing a system, explain why you may have to design the system architecture before the requirements specification is complete.
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
3.8k
views
When describing a system, explain why you may have to design the system architecture before the requirements specification is complete.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
4.4k
views
You have been asked to prepare and deliver a presentation to a nontechnical manager to justify the hiring of a system architect for a new project.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
4.9k
views
Look carefully at how messages and mailboxes are represented in the email system that you use.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
498
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Dec 4, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
968
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.4k
views
When would you recommend against the use of an agile method for developing a software system
asked
Apr 16, 2021
in
Software Engineering
by
anonymous
+1
vote
0
answers
283
views
How can standards (the 'what') and other information be used to develop a methodology/approach/framework for managing projects (the 'how')? Describe some of this "other information" that can be used to create a methodology.
asked
Jul 7, 2021
in
Software Engineering
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...