In: Computer Science
a. Explain why incremental development is the most effective approach for developing business software systems.
b. Draw a context diagram of online course registration system. Explain each component in the diagram.
c. Suggest ONE appropriate generic software process
model that might be used as a basis for managing
the development of the following systems:
i. A system to control anti-lock braking in a car
ii. A system to control an aircraft safely during flight.
d. Explain the following Security Engineering Terminologies
Asset
Attack
Control
Vulnerability
Threat
a. Incremental development is the most effective approach for developing business software systems because the process is not visible.Compare to real time sysytems, real time systems are complex,it involves more hardware components.Hence incremental development is better for developing business software systems.
b.Course Regisration System -
Finance Department - Student payment status.Confirmation of payment.
Academic Department - Details of courses offered.
Faculty Member - Class list.
Student - Class Schedule.Class Request and Payment of Fees.
Student Record System - Status of the student.
c.generic software process model that might be used as a basis
for managing
the development of the following systems:
i. A system to control anti-lock braking in a car : It requires
planning.So waterfall model will be useful for this system.
ii.A system to control an aircraft safely during flight - Safety is the main priority of this system.It requires non - functional requirements.
d.Asset - Asset in the security engineering terminologies is nothing but the data or device which supoorts information or data related activities.Something which must be protected related to data is called asset.
Attack - Attack is the attempt made to steal the information,to expose the information.
Control - This is the protective or preventive measure takent to reduce the vulnerability or to reduce the possibility of loss in future.This is preventive measure.
Vulnerability - Vulnerability is the weakness of computer system which can cause harm in the future.
Threat - Threat is possible danger.It can harm systems.