Question: 1. System set out what the system should do and define constraints on its operation and implementation. But, functional are the statements of services that

 1. System set out what the system should do and define

1. System set out what the system should do and define constraints on its operation and implementation. But, functional are the statements of services that the system must provide or are descriptions of how come computations must be carried out. (6 pts) a functions b. requirements c. plans d. projects e communications 2. Possible loss or harm in a computing system. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach is the meaning the of the security term for : (6 pts) a threats b. control c. attack d. weakness e. exposure 3. An event that occurs at some point in the time when the system does not deliver a service as expected by its user is the meaning the of the "reliability term" for: (6 pts) a. system failure b. attack c. system fault d. human error e system error 4. A condition with the potential for causing and contributing to an accident is the meaning the of the "safety term for : a. risk b. hazard c. damage d. accident e. severity 5. The measure of the loss resulting from a mishap is the meaning the of the safety term for : (6 pts) a. risk b. hazard c. damage d. accident e, severity 6. Project involves the creation of various graphical plan representations of part of the project plan. These include activity charts shoving the interrelationships of project activities and bar charts showing activity durations. (6 pts) a innovation b. monitoring c. milestone d. scheduling e. Prediction 7. is the keyword used for describing an exploitation of a system's vulnerability (i.e. a weakness in a computer-based system that may be exploited to cause loss or harm). Generally, this is from outside the system and is a deliberate attempt to cause damage. (6 pts) a. attack b. weakness c. management d. project management e. risk management 8. is a measure of probability that the system will cause an accident. That is, the is assessed by considering the hazard probability, the hazard severity and probability that a hazard will result in an accident. (6 pts) a. management b. bar chart c. network d. risk e. Strategy 9 tools are software systems that are designed to support routine activities in the software process such as editing design diagrams, checking diagram consistency and keeping track of program tests that have been run. (6 pts) a. project b. estimation c. CASE d. timing e. Financial 10. The high-level activities of software specification, development, validation and evaluation are part of all processes. (6 pts) a. integration b. milestone C. software d. software management e. risk analysis 11. What are the four important attributes which all software products should have? (10 pts) 12. Give the list of steps for the systems engineering process (10 pts) 13. Reliability and safety are related but distinct dependability attributes. Describe the most important distinction between these attributes, and explain why it is possible for a reliable system to be unsafe or vice versa. (10 pts) 14. What are the main phases of the "waterfall model for the software process model? List them. (10 pts)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!