Do a small amount of research on systems

Assignment Help Software Engineering
Reference no: EM131148069

You've been asked to build software to support a low-cost video editing system. The system accepts digital video as input, stores the video on disk, and then allows the user to do a wide range of edits to the digitized video. The result can then be output to DVD or other media.

Do a small amount of research on systems of this type and then make a list of technology risks that you would face as you begin a project of this type.

Reference no: EM131148069

Questions Cloud

Develop a table that relates number of people : Develop a table that relates number of people to project duration for a software project requiring 50,000 LOC and 15 person-years of effort (the productivity parameter is 5000 and B 0.37).
Determine the average shearing stress in the bolts : Three planks are connected as shown by bolts of 14-mm diameter spaced every 150 mm along the longitudinal axis of the beam. For a vertical shear of 10 kN, determine the average shearing stress in the bolts.
Define parallel work activities during the olcrs project : Define parallel work activities during the OLCRS project - Distribute effort throughout the project.
Identify ethical and unethical actions you could take : Identify ethical and unethical actions you could take. Define the concept of dual relationships. Analyze the dual relationships presented in your scenario.
Do a small amount of research on systems : Do a small amount of research on systems of this type and then make a list of technology risks that you would face as you begin a project of this type.
Create a risk table for the project : You've been asked to lead a team that's developing "next generation" word-processing software. Create a risk table for the project.
Determine the dimension b for which the shear center o : A thin-walled beam of uniform thickness has the cross section shown. Determine the dimension b for which the shear center O of the cross section is located at the point indicated.
Describe limits of confidentiality that must be considered : Discuss the ethical issues presented in this scenario; identify the ethical code number and definition. Describe the limits of confidentiality that must be considered. Justify whether or not the counselor would need to break confidentiality.
Describe software application areas : Describe five software application areas in which software safety and hazard analysis would be a major concern.

Reviews

Write a Review

Software Engineering Questions & Answers

  Draw er diagram that models information of company

Draw an ER diagram that models the information in the following scenario: A manufacturing company has several assembly plants in different cities.

  Evaluate principles of software engineering

The purpose of this assignment is to enable students to demonstrate their ability to interpret a set of laws that are part of the principles of software engineering, to evaluate principles of software engineering aspects within an industry

  Why it is important to use white box and black box testing

why it is important to use WHITE BOX AND BLACK BOX testing technique to evaluate a software module. This assignments needs to be at least 5 pages and no more than 10 pages.

  Web site distinguish between lack of capacity and a denial-o

a web site distinguish between lack of capacity and a denial-of-service attack? For example, web sites often experience a tremendous increase in volume of traffic right after an advertisement with the site's URL

  Determine business requirements throughout the sdlc

Effectively communicate with stakeholders to determine, manage, and document business requirements throughout the SDLC, Perform modeling to assist with analysis and decision making

  Each user has a unique five-digit id number

Each user has a unique five-digit ID number. Whenever a user logs on, the user's ID, lab  number, and the computer station number are transmitted to your system. For example, if user 49193 logs onto station 2 in lab 3, then your system receives (4919..

  What is the problem with the waterfall model

Dealing with this situation would be quite difficult if the project was being implemented using the waterfall model. What is the problem with the waterfall model

  Approach to system development to define large project

Third approach to system development might be to define one large project which will use iterative approach to the SDLC. Briefly explain what you would include in each iteration.

  Describe the concept of encryption

Describe the concept of encryption., Include a discussion about symmetric and asymmetric encryption., Provide a description of at least 2 different encryption algorithms.

  Design phase includes

Design phase includes? [A] Data,architectural and procedural designs only

  What do you think of these arguments

Some systems analysts argue, "Give users what they ask for. If they want lots of reports and reams of data, then that is what you should provide. Otherwise, they will feel that you are trying to tell them how to do their jobs." Others say, "Systems a..

  Analyze polynomial-time algorithm using black box design

Using black box design and analyze the polynomial-time algorithm which calculates the assignment to variables which satisfies the formula.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd