In her paper developing an effective metrics program

Assignment Help Computer Networking
Reference no: EM13379972

In her paper, "Developing an Effective Metrics Program," Rosenberg described a group of "sample goals, questions and metrics. The goals are general and could be adapted with minor modifications to any project development. Questions are derived to quantify the goals. The metrics needed to provide the answers to the questions are then chosen and shown in italics."

Here is a goal from her paper, with associated questions and metrics:

GOAL: The system must release on time with at least 90% of the errors located and removed

QUESTION: When will 90% of the errors be found?

METRIC: Effort (such as hours worked)

METRIC: Errors (count errors detected)

QUESTION: What is the discrepancy rate of closure?

METRIC: Errors (count errors detected)

METRIC: Closure status of the errors

Use your knowledge of measurement dysfunction to critique this set of questions and metrics. In particular

(a) If you collected these metrics, would they provide you with answers to the questions? Why or why not? What other information, if any, would you need?

(b) If you could answer these questions, could you know whether at least 90% of the errors had been located and removed? Why or why not? What other information, if any, would you need?

(c) If you relied on these metrics, would any aspect of the project be systematically under-managed or mismanaged? Explain your thinking.

Reference no: EM13379972

Questions Cloud

Design the layout of users domains trusted domains : design the layout of users domains trusted domains anonymous users etc for a start-up open source software company abc.
1 define ethics for the information age cite your sources : 1. define ethics for the information age cite your sources. you may use any original works but may not discuss your
Question 1one of the criticisms of measurement of the work : question 1one of the criticisms of measurement of the work of software engineers is that they will probably change how
In her paper developing an effective metrics program : in her paper developing an effective metrics program rosenberg described a group of sample goals questions and metrics.
In her paper developing an effective metrics program : in her paper developing an effective metrics program rosenberg described a group of sample goals questions and metrics.
In her paper developing an effective metrics program : in her paper developing an effective metrics program rosenberg described a group of sample goals questions and metrics.
Question short1compare and contrast the ideas of semantic : question short1compare and contrast the ideas of semantic complexity and structural complexity of a computer program.
1 create a multi-view program for the iphonecreate a : 1 create a multi-view program for the iphonecreate a program that involves multi-views. the main view should contain a
Giving reasons for your answer suggest two types of : giving reasons for your answer suggest two types of applications where you would not recommend the use of

Reviews

Write a Review

Computer Networking Questions & Answers

  What is the maximum data capacity for traffic

What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store? [Short answer]

  What is the server ip address

Create 3 subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 12 addresses.

  Threat, risk and vulnerability

Threat, Risk and Vulnerability are related to Cybersecurity. Describe these three terms and provide a business case example.

  1 research the types of media that were covered in this

1. research the types of media that were covered in this weeks lectures utp stp fiber optic and wireless and create a

  Explain client-server architecture for serving client on pc

When people explain client-server architecture, they are usually referring to a system in which a large server is serving a client on a PC. With X Window, reverse is frequently the case. Explain

  Determine alice-s secret random number

Alice and Bob utilize Diffie-Hellman key exchange protocol with common prime modulus p = 11 and common base a = 2. Determine Alice's secret random number xA?

  Where are wlan technologies going in the future

Where are WLAN technologies going in the future? Research what the next versions of the 802.11 standards are, and provide your educated opinion on how these technologies will be used.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Derive the state equations

Derive the state equations A(t+1) and B(t+1) by substituting the input equations for the J and K variables, and draw the state diagram of the circuit.

  Determine total end-to-end delay to send packet of length l

Suppose that switches user store-and forward packet switching, determine the total end-to-end delay to send packet of length L?

  Which modern wireless technologies use ofdm

Investigate the history of the CSIRO Wifi patent which was recently up-held in courts in the United States.

  Find data transmission rate in bits per second of system

Assume that the airliner carries 10,000 kg of those floppies at the speed of 1000 km/h over the distance of 5000 km. Determine the data transmission rate in bits per second of this system?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd