Pearson eText for Software Engineering -- Instant Access (Pearson+)
10th Edition
ISBN: 9780137503148
Author: Ian Sommerville
Publisher: PEARSON+
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 12, Problem 12.1E
Program Plan Intro
Safety Critical System:
Safety-Critical System is the system where the system operations performed is always safe. The system does not provide any damage to the people or the other environment which is regardless to the specification it carries. Example of safety-critical system comprises of control process in chemical and pharmaceutical industries, control and monitoring system in aircraft.
There are two classes of safety-critical software. They are:
- Primary safety-critical software
- Secondary safety-critical software
Expert Solution & Answer
Explanation of Solution
Six consumer products controlled by the safety critical system:
- Microwave oven
- Disposal of garbage
- Vacuum cleaner
- Food processor
- Drill or electric saw
- Heating furnace
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
What factors led to the production of hazardous software if it has a
worldwide impact?
Explain the concept of a safety-critical system. Provide examples of industries or applications where safety-critical software is essential, and discuss the unique challenges associated with developing such software.
Discuss the challenges of integrating safety-critical software with hardware and how to address them.
Chapter 12 Solutions
Pearson eText for Software Engineering -- Instant Access (Pearson+)
Ch. 12 - Prob. 12.1ECh. 12 - Prob. 12.2ECh. 12 - Prob. 12.3ECh. 12 - Prob. 12.4ECh. 12 - Prob. 12.5ECh. 12 - Prob. 12.6ECh. 12 - Explain why using model checking is sometimes a...Ch. 12 - List four types of systems that may require...Ch. 12 - Prob. 12.9ECh. 12 - Should software engineers working on the...
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- If hazardous software has a worldwide effect, what factors are accountable for its creation?arrow_forwardWhat causes the development of harmful software with global repercussions?arrow_forwardWhat risks and start-up issues are associated with the use of any new software that is designed to replace manual procedures?arrow_forward
- Explain how human factors and user interfaces impact software safety. What considerations should be taken into account to enhance human interaction with safety-critical software?arrow_forwardSofware Quality Assurance and Testting:arrow_forwardComputer science What sorts of risks should be addressed in resilience planning?arrow_forward
- Differentiate between hardware and software reliability and their contributions to overall system reliability.arrow_forwardThink about how people would react if they encounter a problem when using a computer or mobile device. What preventative steps can end users take to make sure worries like these don't slow them down? You have found fault with some feature of a piece of software or programme. What do you think about that? Explain the steps you took to resolve the issue.arrow_forwardHow do real-time operating systems (RTOS) contribute to software safety in embedded and safety-critical applications?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning