Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
How do you think would heterogeneity, business and social change, security and trust change the future of software development.
0
votes
37
views
asked
Apr 8
in
Computer Networks
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
+1
vote
0
answers
712
views
How does heterogeneity, business and social change, security and trust impact the development of software products
asked
Jan 12, 2021
in
Others
by
anonymous
0
votes
1
answer
1.0k
views
Duplicate: Apart from the challenges of heterogeneity, business and social change, and trust and security, identify other problems and challenges that software engineering is likely to face in the 21st century
asked
Nov 23, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
9.1k
views
Apart from the challenges of heterogeneity, business and social change, and trust and security, suggest other problems and challenges that software engineering is likely to face in the 21st century.
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.4k
views
Explain when it may be cost-effective to use formal specification and verification in the development of safety-critical software systems. Why do you think that critical systems engineers are against the use of formal methods?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
1.6k
views
Explain when it may be cost-effective to use formal specification and verification in the development of safety-critical software systems. Why do you think that some critical systems engineers are against the use of formal methods?
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
352
views
Do you think software system can be phased out even if it is still of high quality and high business Value. Under what circumstances can that be done
asked
Jul 28, 2021
in
Software Engineering
by
anonymous
+2
votes
1
answer
725
views
You have been given the task of ‘selling’ formal specification techniques to a software development organization. Outline how you would go about explaining the advantages of formal specifications to sceptical, practising software engineers.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
1.4k
views
The Importance of Entrepreneurship and Business Development in Economic and Social Growth
asked
Jan 30, 2020
in
Discourse
by
(user.guest)
+2
votes
1
answer
1.0k
views
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
2.3k
views
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
5.5k
views
Consider the seven software categories: system software, application software and so on. Do you think that the same approach to software engineering can be applied for each?
asked
Jul 17, 2020
in
Software Engineering
by
anonymous
+1
vote
0
answers
249
views
As the Business Development Manager of a company, write a technical proposal on how a new product or service that you intend to introduce into the market could benefit prospective clients
asked
Aug 2, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
743
views
Why do you think both the sender and receiver addresses are needed in the Internet?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
335
views
What is your vision for the future of networking and security
asked
Feb 17, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
405
views
What is the future of networking and security
asked
Feb 17, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
736
views
Why do you think that we do not need addresses at the physical layer?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
271
views
Briefly discuss the history and future of multimedia. How might multimedia be used to improve the lives of its users? How might it influence users in negative ways? What might be its shortcomings?
asked
Oct 4, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
1.4k
views
Duplicate: How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct. Would the same be true if you were developing a model of a new system?
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
0
votes
0
answers
435
views
Suppose that the designers of the laboratory access system have settled on a system that uses a swipe card and a card reader to access the laboratories. How would you set about evaluating this design? Use the design principles to discuss the key issues .
asked
Dec 20, 2020
in
Computer Aided Design
by
anonymous
+1
vote
1
answer
959
views
Explain how the principles underlying agile methods lead to the accelerated development and deployment of software.
asked
Jun 11, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
368
views
Duplicate: Explain how the principles underlying agile methods lead to the accelerated development and deployment of software.
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
546
views
Duplicate: Explain how the principles underlying agile methods lead to the accelerated development and deployment of software.
asked
Sep 19, 2020
in
Software Engineering
by
anonymous
–1
vote
1
answer
489
views
Duplicate: Explain how the principles underlying agile methods lead to the accelerated development and deployment of software.
asked
May 2, 2020
in
Software Engineering
by
anonymous
+3
votes
2
answers
18.0k
views
Explain how the principles underlying agile methods lead to the accelerated development and deployment of software.
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
135
views
How Do You Become A Business Lawyer?
asked
Sep 11, 2021
in
Law for Engineers
by
anonymous
+1
vote
1
answer
1.9k
views
For a P2P file-sharing application, do you agree with the statement, “There is no notion of client and server sides of a communication session”? Why or why not?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
103
views
How would you explain the term Access control
asked
Feb 27
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
396
views
Explain how advances in technology can force a software subsystem to undergo change or run the risk of becoming useless.
asked
Jun 10, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
830
views
Explain how advances in technology can force a software subsystem to undergo change or run the risk of becoming useless.
asked
Nov 15, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
2.3k
views
What problems do you think might arise in extreme programming teams where many management decisions are devolved to the team members?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
140
views
A new version of the TCP header that accommodates a round-trip time of 200ms, a network bandwidth of 100Mbps, a maximum segment lifetime of 150 sec, How many bits will you need for the advertised window field and for the sequence number field?
asked
Apr 20
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
733
views
Explain why there is a need for both preliminary security risk assessment and design risk assessment during the development of a system.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
0
answers
207
views
Describe how you would handle the representation of derived data in the database
asked
May 25, 2021
in
Database Management Systems
by
anonymous
+1
vote
1
answer
739
views
Explain how you would use the reference model of CASE environments to compare the IDEs offered by different vendors of a programming language such as Java.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
4.6k
views
Suppose you wanted to do a transaction from a remote client to a server as fast as possible. Would you use UDP or TCP? Why?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
124
views
List three (3) open source engineering computational software tools that you would recommend as alternative to Matlab software for calculating the Grade Point Average (GPA) of 1000 students for each semester
asked
Nov 8, 2021
in
Computational Tools
by
(user.guest)
+1
vote
1
answer
1.4k
views
When would you recommend against the use of an agile method for developing a software system
asked
Apr 16, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
428
views
Duplicate: What are the strategic options for legacy system evolution? When would you normally replace all or part of a system rather than continue maintenance of the software?
asked
Jun 3, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
2.7k
views
What are the strategic options for legacy system evolution? When would you normally replace all or part of a system rather than continue maintenance of the software?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
5.1k
views
What are the strategic options for legacy system evolution? When would you normally replace all or part of a system rather than continue maintenance of the software?
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
14.1k
views
Explain why incremental development is the most effective approach for developing business software systems. Why is this model less appropriate for real-time systems engineering?
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.6k
views
How do you measure the performance of an agent
asked
Oct 2, 2019
in
Artificial Intelligence
by
anonymous
0
votes
0
answers
498
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Dec 4, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
968
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
285
views
What do you understand by the term Information Security Cyber Law?
asked
Sep 11, 2021
in
Law for Engineers
by
anonymous
+1
vote
1
answer
607
views
Explain why change is inevitable in complex systems and examples of software process activities that help predict changes and make the software being developed more resilient to change?
asked
Mar 29
in
Computer Architecture
by
anonymous
+1
vote
1
answer
1.9k
views
From Figure 9.4, you can see that impact analysis is an important sub-process in the software evolution process. Using a diagram, suggest what activities might be involved in change
asked
May 28, 2020
in
Software Engineering
by
anonymous
0
votes
1
answer
937
views
With HTTP streaming, are the TCP receive buffer and the client’s application buffer the same thing? If not, how do they interact?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.5k
views
Compare the frame structures for 10BASE-T, 100BASE-T, and Gigabit Ethernet. How do they differ
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
819
views
You are an engineer in charge of the development of a small, safety-critical train control system, which must be demonstrably safe and secure...
asked
Nov 5, 2019
in
Software Engineering
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...