Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
Duplicate: How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct. Would the same be true if you were developing a model of a new system?
–1
vote
1.4k
views
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
1
Answer
0
votes
answered
Mar 1, 2021
by
(user.guest)
Duplicate question. Already answered here >
https://cpentalk.com/456/already-explain-always-necessary-system-complete-correct
Your comment on this answer:
Improve the existing answer with your comment.
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please
log in
or
register
.
Related questions
+4
votes
1
answer
7.0k
views
How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.8k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
507
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 131.107.256.80
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
797
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid:
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
2.9k
views
Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid
asked
Nov 22, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
491
views
Explain why it is important to model the context of a system that is being developed. Give two examples of possible errors that could arise if software engineers do not understand the system context.
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
+2
votes
1
answer
7.5k
views
Explain why it is important to model the context of a system that is being developed. Give two examples of possible errors that could arise if software engineers do not understand the system context.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
3.0k
views
Explain why it may be difficult to use agile methods in a large project to develop a new information system that is to be part of an organizational system of systems.
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
738
views
Explain how you would use the reference model of CASE environments to compare the IDEs offered by different vendors of a programming language such as Java.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.1k
views
You are responsible for the design of a communications switch that has to provide 24/7 availability, but which is not safety-critical. Giving reasons for your answer, suggest an architectural style that might be used for this system.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
0
votes
0
answers
489
views
Explain why prototyping model is an adaptable model that can support both change avoidance and change tolerance activities. How does it differ from spiral model which in practice has not been widely used. Suggest why this might the case.
asked
Jun 17, 2020
in
Software Engineering
by
anonymous
–1
vote
1
answer
790
views
Duplicate: Why would you choose a database system instead of simply storing data in operating system files? When would it make sense not to use a database system?
asked
Oct 19, 2020
in
Database Management Systems
by
anonymous
+2
votes
1
answer
1.1k
views
Using an example of a component that implements an abstract data type such as a stack or a list, show why it is usually necessary to extend and adapt components for reuse.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.8k
views
Using an example of a component that implements an abstract data type such as a stack or a list, show why it is usually necessary to extend and adapt components for reuse.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.0k
views
Duplicate: You are a software engineering manager and your team proposes that model-driven engineering should be used to develop a new system...
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
+3
votes
1
answer
6.3k
views
Explain why it is not necessary for a program to be completely free of defects before it is delivered to its customers.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
0
votes
1
answer
687
views
Duplicate: Testing is meant to show that a program does what it is intended to do. Why may testers not always know what a program is intended for?
asked
Jun 28, 2020
in
Software Engineering
by
anonymous
0
votes
1
answer
3.4k
views
Is it necessary that every autonomous system use the same intra-AS routing algorithm? Why or why not?
asked
Oct 9, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.1k
views
Explain what is meant by “inversion of control” in application frameworks. Explain why this approach could cause problems if you integrated two separate systems that were originally created using the same application framework.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
0
votes
1
answer
1.1k
views
Duplicate: Explain why it is important to make a distinction between developing the user requirements and developing system requirements in the requirements engineering process.
asked
Jun 29, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.0k
views
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
2.3k
views
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
2.5k
views
If we treat 2 twos complement numbers as unsigned integers for purposes of addition, the result is correct if interpreted as a twos complement number. This is not true for multiplication.Why?
asked
Jan 3, 2020
in
Computer Architecture
by
anonymous
+1
vote
1
answer
3.6k
views
You are a software engineering manager, and a senior member of your team proposes that model-driven engineering should be used to develop a new system...
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.4k
views
Explain when it may be cost-effective to use formal specification and verification in the development of safety-critical software systems. Why do you think that critical systems engineers are against the use of formal methods?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
1.6k
views
Explain when it may be cost-effective to use formal specification and verification in the development of safety-critical software systems. Why do you think that some critical systems engineers are against the use of formal methods?
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.7k
views
Explain why deploying software as a service can reduce the IT support costs for a company. What additional costs might arise if this deployment model is used?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
–1
vote
1
answer
471
views
Duplicate: When describing a system, explain why you may have to design the system architecture before the requirements specification is complete.
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
0
votes
1
answer
1.9k
views
What does it mean for a wireless network to be operating in “infrastructure mode?” If the network is not in infrastructure mode, what mode of operation is it in, and what is the difference between that mode of operation and infrastructure mode?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
669
views
You have been asked to develop a system that will help with planning large-scale event and parties, using an activity diagram model the process context for such a system that shows the activities involved in planning a party
asked
Nov 10, 2020
in
Software Engineering
by
anonymous
–1
vote
1
answer
940
views
Duplicate: Testing is intended to show that a program does what it is intended to do. Why may testers not always know what a program is intended to do?
asked
Jun 3, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
10.0k
views
Why would you choose a database system instead of simply storing data in operating system files? When would it make sense not to use a database system?
asked
Mar 30, 2020
in
Database Management Systems
by
anonymous
+2
votes
1
answer
1.1k
views
What factors have to be taken into account in the design of a menu-based interface for ‘walk-up’ systems such as bank ATMs? Write a critical commentary on the interface of an ATM that you use.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.2k
views
Duplicate: Suggest why it is important to make a distinction between developing the user requirements and developing system requirements in the requirements engineering process.
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
0
votes
1
answer
565
views
Duplicate: Suggest why it is essential to make a distinction between developing the user requirements and developing system requirements in the requirements engineering process.
asked
Jun 28, 2020
in
Software Engineering
by
anonymous
0
votes
1
answer
452
views
Duplicate: Using an example, explain why it is important when developing dependable systems to consider these as sociotechnical systems and not simply as technical software and hardware systems.
asked
Sep 15, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.4k
views
When would you recommend against the use of an agile method for developing a software system
asked
Apr 16, 2021
in
Software Engineering
by
anonymous
0
votes
0
answers
435
views
Suppose that the designers of the laboratory access system have settled on a system that uses a swipe card and a card reader to access the laboratories. How would you set about evaluating this design? Use the design principles to discuss the key issues .
asked
Dec 20, 2020
in
Computer Aided Design
by
anonymous
–1
vote
1
answer
682
views
Duplicate: You have been asked to prepare and deliver a presentation to a non-technical manager to justify the hiring of a system architect for a new project. Write a list of bullet points setting out the key points in your presentation. Naturally.
asked
Feb 1, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
553
views
Duplicate: You have been asked to prepare and deliver a presentation to a non-technical manager to justify the hiring of a system architect for a new project. Write a list of bullet points setting out the key points in your presentation. Naturally,
asked
Feb 1, 2021
in
Software Engineering
by
anonymous
+2
votes
1
answer
2.4k
views
Giving reasons for your answer based on the type of system being developed, suggest the most appropriate generic software process model that might be used to develop a system that automatically controls the speed of a motor vehicle (cruise control).
asked
Apr 3, 2020
in
Software Engineering
by
(user.guest)
0
votes
1
answer
395
views
What does a model in a software engineering can be defined as an abstraction of a system that has no longer exists, an existing system and future system to be built means?
asked
Mar 30, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
8.0k
views
When describing a system, explain why you may have to start the design of the system architecture before the requirements specification is complete.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
+3
votes
1
answer
2.0k
views
Reliability and safety are related but distinct dependability attributes. Describe the most important distinction between these attributes and explain why it is possible for a reliable system to be unsafe and vice versa.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
0
votes
0
answers
498
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Dec 4, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
968
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
–1
vote
1
answer
746
views
Duplicate: Suggest the most appropriate SDLC process model that might be used to develop a university accounting system that replaces an existing system
asked
Aug 4, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.6k
views
A train protection system automatically applies the brakes of a train if the speed limit for a segment of track is exceeded, or if the train enters a track segment that is currently signaled with a red light (i.e., the segment should not be entered)...
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.5k
views
Duplicate: Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system.
asked
Jul 20, 2020
in
Software Engineering
by
anonymous
0
votes
1
answer
2.6k
views
True or false: When a BGP router receives an advertised path from its neighbor, it must add its own identity to the received path and then send that new path on to all of its neighbors. Explain.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...