EBK SOFTWARE ENGINEERING
10th Edition
ISBN: 8220101455970
Author: SOMMERVILLE
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 19, Problem 19.10E
You are an engineer involved in the development of a financial system. During installation, you discover that this system will make a significant number of people redundant. The people in the environment deny you access to essential information to complete the system installation. To what extent should you, as a systems engineer, become involved in this situation? Is it your professional responsibility to complete the installation as contracted? Should you simply abandon the work until the procuring organization has sorted out the problem?
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
In the process of investigating the needs of a system that is presently being constructed, in your view, what are some of the most important factors to keep in mind? If it is at all feasible, please provide an example to back up the allegations that you are making.
Suppose you are a member of a team working on a computer-controlled crash avoidance system for automobiles. You think the system has a flaw that could endanger people. The project manager does not seem concerned and expects to announce completion of the project soon. Do you have an ethical obligation to do something?
which statement about continuity and resilience are correct? ( choose all that apply)
Chapter 19 Solutions
EBK SOFTWARE ENGINEERING
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- You are working on a software development project which is creating software to control access to a building. The design is simple and unlikely to change. There is a fixed deadline and the budget for the whole project will be fixed once the analysis phase is complete. Explain the following types of quality control, and state which one (1) will be appropriate in the scenario. ▪ Walkthrough ▪ Inspection ▪ Smoke Testing ▪ Black box testing ▪ Regression testingarrow_forwardIman Software House is awarded with a contract for developing a flood disaster management system. Although the company has been in the industry for almost three years, this project is considered new and by far the biggest project they ever involved in. A stipulated amount of money has been allocated for the project and there is only three months given before the project is delivered to the client. The short project duration is due to the approaching flood season. The development team therefore must work fast despite of their lack of experience in this type of project. The system requirements are gathered from many different stakeholders including the local authorities, natural disaster management agencies and many more. Among the important measures for this system are Reservoirs, Embankments, Channelisation of Rivers, Drainage Improvement and Diversion of Flood Waters. The system must also be designed to be highly reliable, maintainable and scalable. Based on the above case study, a)…arrow_forwardIn what ways does the analysis of a system provide difficulties? What are some of the aspects that go into evaluating a system to determine whether or not it is likely to be successful or if it is impractical? Why might an effort to create a system be unsuccessful?arrow_forward
- You have been hired to perform a system investigation for a fast food restaurant that wants to implement new tools and processes to improve its customer service. Currently, the restaurant has a poor reputation for not correctly filling customers' orders and for taking too long to do it. Give a functional decomposition to define the scope and basic requirements of such a system. Provide some ideas to improve the situation Choose one to pursue based on its technical, economic, legal, operational, and schedule feasibility.arrow_forwardWhat are the difficulties in analyzing a system? What are some of the components in examining a system to determine whether it has a high probability of success or is deemed unfeasible? What causes a system project to fail?arrow_forwardImagine that you have been hired by a firm to work as a system analyst for the company that you are now working for. Do you think there are any similarities or differences between the activities that are engaged in the life cycle of system development and the activities that are included in the process of system maintenance? Kindly offer a response that takes into account the persuasive reasons and supports them.arrow_forward
- Charlie looked across his desk at Kelvin, who was absorbed in the sheaf of handwritten notes from the meeting. Charlie had asked Kelvin to come his office to discuss the change control meeting that had occurred earlier that day. “So what do you think?” he asked.“I think I was blindsided by a bus!” Kelvin replied. “I thought I had considered all the possible effects of the change in my project plan. I tried to explain this, but everyone acted as if I had threatened their jobs.” “In a way you did,” Charlie stated. “Some people believe that change is the enemy.” “But these changes are important.” “I agree,” Charlie said. “But successful change usually occurs in small steps. What’s your top priority?” “All the items on this list are top priorities,” Kelvin said. “I haven ’t even gotten to the second tier. ” “So what should you do to accomplish these top priorities?” Charlie asked.“I guess I should reprioritize within my top tier, but what then?”“The next step is to build support before the…arrow_forwardGive two instances of each of the four categories of system maintenance.arrow_forwardCalculate the technical complexity factor by answering all required questions and carefully stating any assumptions you make for each question.(I want a question for each factor, specifying that it is rated from 0 to 5, where 0 means the subfactor is irrelevant, 3 means it is average, and 5 means it is essential to the system being built. Please provide assumptions for the question.) F1 Reliable backup and recovery: F2 Data communications: F3 Distributed functions: F4 Performance: F5 Heavily used configuration: F6 Online data entry: F7 Operational ease: F8 Online update: F9 Complex interface: F10 Complex processing: F11 Reusability: F12 Installation ease: F12 Multiple sites: F14 Facilitate change:arrow_forward
- a) In your opinion, at what point in time should users get training on a new system?b)which phase of the system life cycle is considered to be the most innovative and challenging?b) In which step of the SDCL life cycle does the cost of mistake correction decrease to its lowest point?arrow_forwardDe Heus a.s. needed to build a system that would combine the possibilities of effective document management with the connection to other internally used systems (Integra, ABRA Gen). The flow of company processes was not defined, it was rather “customary” – electronically received invoices were printed and together with a paper shirt travelled on the desks of individual approvers in the same way as those delivered only on paper.It was common for invoices not to be approved on time or even to be lost, which caused delays, and also damaged De Heus’ reputation in the eyes of its suppliers. Data from received invoices were manually transcribed into the ERP, which in turn placed increased demands on the time and attention of the accountants. After signing, contracts were scanned and stored in a folder on a shared drive. In the case that someone forgot to scan a contract, it resulted in an often complicated process to trace it back through the company. Question 1 As a developer tasked with…arrow_forwardIs it feasible to offer a concise overview of the most critical steps involved in system installation?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems Analysis and Design (Shelly Cashman Serie...Computer ScienceISBN:9781305494602Author:Scott Tilley, Harry J. RosenblattPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Systems Analysis and Design (Shelly Cashman Serie...
Computer Science
ISBN:9781305494602
Author:Scott Tilley, Harry J. Rosenblatt
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
9.1.2 Software Development Approaches; Author: EIToppo;https://www.youtube.com/watch?v=Z9znuSQ7Sz8;License: Standard YouTube License, CC-BY