Question: Q 1 . ( 1 5 pts ) Define the following terms and provide a real - world example for each: a . Agile Methodology

Q1.(15 pts) Define the following terms and provide a real-world example for each:
a. Agile Methodology
b. Stakeholder Management
c. Scope Creep
d. Job enrichment
e. Job enlargement
Q2.(10 pts) List and describe the quality-in-use attributes (ISO9126).
Q3.(15 pts)
Scenario: You are managing a software development project for a healthcare application. During the planning phase, you identified the risk of potential data breaches due to stringent health information privacy regulations. Midway through the project, your team discovers a vulnerability in the data encryption process that could be exploited.
Question:
Explain the steps you would take to assess and mitigate this risk. What are the implications if this risk is not addressed promptly? Include a discussion of the tools and techniques used in risk management within software projects.
Q4.(15 pts) List and explain the roles of a balanced team according to Belbin approach. You have been involved recently in a group project. Try to categorize each participant according to the Belbin classification. Were there any duplications or gaps in any of the roles? Did this seem to have any impact on progress? Provide examples
Q5.(15 pts) Mehmet is a system analyst who is gathering requirements for an application which will record the details of the training undertaken by police officers in the client police station. Details of training units successfully completed by police officers are to be input to the application by trainers who are themselves senior and active officers. Mehmet needs to interview a trainer to obtain his/her requirements. Because of the senior police officers' other duties, the interview must be arranged two weeks in advance. There is then a 10% chance of the police officers being unable to attend the interview because of an emergency call-out. Each week that the project is delayed costs the police station approximately 20,000 TL. Calculate the risk exposure based on the given scenario.
Q6.(10 pts) Assume that students in a course are required to produce a written report on an ICT-related topic each semester. If you wanted to create a model to estimate how long it should take a student to complete such an assignment, what measure of work content would you use? Some reports might be more difficult to produce than others: what factors might affect the degree of difficulty? Provide a list of factors and explain each briefly.
Q7.(20 pts +10 pts) Consider the following table.
\table[[Activity,Duration,Depends on,Resource Type],[A,3 days,,SA],[B,10 days,A,SD],[C,2 days,A,SD],[D,2 days,C,SC],[E,3 days,C,SC],[F,2 days,C,SC],[G,4 days,B,D,E,F,SA],[SA = system analyst; SD = system designer; SC = system coder,,,]]
a.(20 pts) Draw up a PERT chart for the activities above and identify the critical path. Note that only PERT notation is accepted.
b.(10 pts BONUS) Generate resource histogram for SA and SD.
Q 1 . ( 1 5 pts ) Define the following terms and

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Finance Questions!