What percentage of the modules exceed the structure

Assignment Help Computer Network Security
Reference no: EM13186627

In her paper, "Developing an Effective Metrics Program," Rosenberg described a group of "sample goals, questions and metrics. The goals are general and could be adapted with minor modifications to any project development. Questions are derived to quantify the goals. The metrics needed to provide the answers to the questions are then chosen and shown in italics."

Here is a goal from her paper, with associated questions and metrics:
 GOAL: Examine the product quality from the point of view of the customer
 QUESTION: What percentage of the modules exceed the structure / architecture guidelines?
 METRIC: Size (such as LOC)
 METRIC: Complexity (such as Oviedo's metric)
 QUESTION: What modules are high risk?
 METRIC: Complexity (such as Oviedo's metric) for each module
 METRIC: Size (such as LOC) for each module
 METRIC: Errors

Use your knowledge of measurement dysfunction to critique this set of questions and metrics. In particular

(a) If you collected these metrics, would they provide you with answers to the questions? Why or why not? What other information, if any, would you need?

(b) If you could answer these questions, could you accurately describe the quality from the point of view of the customer? Why or why not? What other information, if any, would you need?

(c) If you relied on these metrics, would any aspect of the project be systematically under-managed or mismanaged? Explain your thinking.

Reference no: EM13186627

Questions Cloud

State what is the half life of the reaciton : gave straight line relationship. It took 52.3 seconds for concentration of A to decrease from 0.667 M to 0.117 M. What is the half life of the reaciton when [A]o = 0.667 M?
Pros-and-cons for less developed-countries of mne investment : Much of the discussion regarding the effects of MNE investment on "host" countries has focused on the pros-and-cons for less developed-countries (LDCs). Access these arguments in terms of post-WWII experience up to the present day, particularly th..
State separating eucalytus oil : Based on the structure and boiling point(176-177C) of Eucalytol. what aspects of this molecule allow it to separate from hexane? And which of the following temperature option of is best for separating eucalytus oil and why?
Find the stopping distance required by an alfa romeo : cording to Car and Driver, an Alfa Romeo going 70 mph requires 177 feet to stop. Assuming that the stopping distance is proportional to the square of the velocity, find the stopping distance required by an Alfa Romeo going at 45mph and 130mph.
What percentage of the modules exceed the structure : Examine the product quality from the point of view of the customer and what percentage of the modules exceed the structure / architecture guidelines?
Show how to approximate the required work : A cable that weighs 6 lb/ft is used to lift 850 lb of coal up a mine shaft 300 ft deep. Find the work done.
What recovery of product based on the mass of crude product : "What was the % recovery (by mass) of product based on the mass of crude product?" The starting unkown material weighed .2415g, the melting point of just the sample was 51.4-95.2 degrees C,
Calculate the level of incremental profit per unit : Barney Rubble, marketing director for Flintstones, is considering whether or not the company should market its product directly to end users for $300 per unit. Although no added investment in productive facilities is required, there are additional..
What is the discrepancy rate of closure : If you collected these metrics, would they provide you with answers to the questions? Why or why not? What other information, if any, would you need?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Design item hash table from using hash function

Design the 11-item hash table that results from using hash function h(i) = (i mod 11) to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, and 5, for each of the following assumptions.

  Implementation phase of a project

Assume you are in implementation phase of a assignment and your customer indicates they require a specific change to the project that changes the scope of the deliverables.

  Security infrastructure and protocols

Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "top-down" approach to trust and PGP is a "bottom-up" approach to trust.

  Using vigene table to find key used to encrypt message

You were given the following plaintext and cipertext, and you are needed to find key used by them. plaintext: Using Vigene table, find key used by them to encrypt the message.

  Describe the life cycle of an information system

Suppose that you run a photography printing store. Your workers have been using punch cards for time entry since you started the business.

  It project management

Assume your corporation is trying to decide whether it should buy special equipment to prepare some of its high-quality publications itself or lease the equipment from another corporation.

  Estimating resources with the budget

Managing a project and I have an $850,000 budget. For the project, the resources include 4-developers and on project manager. A suppose that the average workweek per person is forty hours

  Passive eavesdropper observes single execution of protocol

Show that a passive eavesdropper that observes a single execution of the protocol can recover key s and impersonate the tag.

  Explain cross-talk and other forms of interference

Cross-talk, and other forms of interference are a significant issue in any communications infrastructure. Compare and contrast how this problem would manifest for analog data transmitted

  Denial of service and distributed denial of service attacks

US cryptography export restrictions: past, present, and future and biometrics for authentication: security and privacy implications.

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd