Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 12, Problem 12.4E
Explanation of Solution
Description of hazards:
- Hazard 1: Leakage of radiation
- The sensor used in the system must detect the leakage of the radiation.
- It rings an alarm with the occurrence of the leakage.
- Hence, the doctors get the notifications and altered.
- Hazard 2: Misuse of the information from the
database - The involvement of the unauthorized user modifies the actual information.
- This may lead to wrong treatment...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Modeling is being used comprehensively by all national governments and the World Health Organization to decide the best strategies to minimize the risk of COVID-19. These were mainly epidemiological models designed to understand the spread of the disease and the impact of the various interventions. But a global pandemic tends to create a large number of problems and issues, not just those related to disease transmission, and each requires a different model to find the best solution.
Based on case study given:
Why is simulation used?
Following the reopening of educational institutions, taking precautions cannot be ignored, so it becomes a real task for teachers to track the health of students in class and maintain attendance based on that, which if manually enrolling, is in Many people's classes are very intensive, time-consuming and labor-intensive. So in this case it is very helpful to use a computer based system
Draw a context diagram of the suggested system in SECTION A, Question 1 b) ii.
Make sure you label the actors, the relationships between them as well as their
relationships to the system.
Note: Do not forget to document your assumptions, if you make any
a) Suppose a given system allows for indefinite postponementof certain entities. How would you as a systems designer provide ameans for preventing indefinite postponement?
b) A system requires that arriving processes must wait forservice if the needed resource is busy. The system does not use"aging" to elevate the priorities of waiting processes to preventindefinite postponement. What other means might the system use toprevent indefinite postponement?
Chapter 12 Solutions
Software Engineering (10th Edition)
Ch. 12 - Prob. 12.1ECh. 12 - Prob. 12.2ECh. 12 - Prob. 12.3ECh. 12 - Prob. 12.4ECh. 12 - Prob. 12.5ECh. 12 - Prob. 12.6ECh. 12 - Explain why using model checking is sometimes a...Ch. 12 - List four types of systems that may require...Ch. 12 - Prob. 12.9ECh. 12 - Should software engineers working on the...
Knowledge Booster
Similar questions
- The Framework's principal research interest is in discovering how to combine protections that apply across technologies with those that are particular to certain applications. Is it possible to differentiate between broad technological limitations and specific programmatic ones? The method of implementation is a major contrast between application controls and standard technological controls.arrow_forwardDraw a class diagram for the above scenario. Bell’s hospital has a patient management system. A patient must register with the hospital before start of the treatment. Once registered, a doctor is assigned to the patient. The patient must be provided with an appointment date based on the urgency. A doctor meets the patient and request tests to be performed by labs. When the lab results are ready, a new appointment is set with doctor. Doctor meets the patient again and prescribe medicines and treatments/rehabilitation.arrow_forwardThe lack of making security a priority from the start of the design process is a major issue in the realm of computer science. The consequences of treating security as an afterthought need only be briefly considered.arrow_forward
- Adaptive software systems will be created for dynamic environments. As a result, computational entities may join and depart the system on a regular basis through a protocol that connects them. This application is expected to be scalable and trustworthy in the long term. During the development and implementation of this program, did you have a preference for any specific architectural style?arrow_forwardModeling is being used comprehensively by all national governments and the World Health Organization to decide the best strategies to minimize the risk of COVID-19. These were mainly epidemiological models designed to understand the spread of the disease and the impact of the various interventions. But a global pandemic tends to create a large number of problems and issues, not just those related to disease transmission, and each requires a different model to find the best solution. Based on case study given: Discuss how simulation modelling can help to support decision makers in making the most informed decisions?arrow_forwardCreate a Use Case Diagram for the below scenario: In The University of Technology Library Systems, whenever a new books arrives to the university that books information will be entered by the inventory officer into the inventory. Library staff will allow the students to borrow the books and also return the books. Students in the university can search the books and reserve that book automatically to borrow. Also there is a Library manager who will have permission to print the books titles delete the book copy information, view overdue or books which are not returned on time and also view who has reserved the books in advance Now draw the use case diagram by identifying actors, use cases etc.arrow_forward
- Draw the class diagram for these scenarios for entities it should have primary key. Scenario 1 A hotel caters mainly to company retreat groups, and wants to model this information to use in a management system. A retreat group consists of a number of that company’s employees as hotel guests. The system needs to track which room each guest stayed in, as well as which group the guest is part of. Scenario 2 A library wants to model information about its inventory, and which patrons have which books checked out. The library can have multiple copies of a single title, and the model needs to indicate which copy of the title is checked out by a particular patron. Scenario 3 A doctor's office providing health services needs to track all of its patient visits. The date of the visit, along with any diagnoses needs to be stored. Keep in mind that a patient can have more than one diagnosis per visit, and that any particular diagnosis can be made to multiple patients.arrow_forwardMethods from the past, present, and future of analyzing systems to determine their needs are compared and contrasted. Does it ever make sense to use any of the examined tactics, and what are the drawbacks of doing so?arrow_forwardDraw a DFD that represents the processes involved in cooking and serving a three-course dinner, including all such associated tasks as laying out the table. Seeking to ensure that your solution does not impose any unnecessary assumptions about the sequencing of actions.arrow_forward
- Pick from the following scenario given below, and choose a suitable combination of input and output devices to best support the intended interaction. It may help to identify typical users or classes of user, and identify how the devices chosen support these people in their tasks. Explain the major problems that the input and output devices solve. ➢ Environmental database A computer database is under development that will hold environmental information. This ranges from meteorological measurements through fish catches to descriptions of pollution, and will include topographical details and sketches and photographs. The data has to be accessed only by experts, but they want to be able to describe and retrieve any piece of data within a few secondsarrow_forwardWhen designing software systems, performance and security may appear to be incompatible non-functional objectives. Make a case for or against this statement?arrow_forwardIn order to operate in a dynamic environment, an adaptive software system will be created. In addition, computational entities are connected together through a protocol to trade services, and they join and depart the system on a regular basis. This application is expected to be both scalable and reliable. During the development and implementation of this program, did you have a preference for any specific architectural style?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education