21_System Engineering_ Questions

profileoeealmzs

21 Questions

Write a 200- to 300-word short-answer response to the following:

(Please provide reference for the answers, when possible)

-515-

1.       "Concurrency Control" Please respond to the following:

 

There are times when a database is accessed by many users across the enterprise.  Transaction logs can help maintain concurrency in a multiuser platform. Describe at least two business scenarios where COMMIT and ROLLBACK would be required. Describe how these functions would be essential for business continuity and concurrency control. Identify how these functions would enable an organization to recover from a database corruption event.

 

Describe how locks could be used in order to qualify data transactions and enhance concurrency control. Suggest at least two business scenarios that would benefit from implementing locking methods.

 

2.       "Optimization for Transactional Processing" Please respond to the following:

 

Databases can grow in data structure and data capacity throughout time. At certain times, it is necessary to perform optimization techniques in order to ensure optimal performance of the database. Evaluate at least two methods that can be used to optimize database components such as queries, reports SQL transaction processing, and data consumption. Provide a real-world example that explains how these methods would help an organization process a large number of online transactions within a short time span.

 

Suggest at least two SQL optimization techniques that can be used to enhance the data access turnaround time and transaction processing time. Provide examples to support your response.

 

Assess the database statistics that could be used in order to measure database performance. Provide a real-world example that demonstrates how this information would enable businesses to accurately scale its data processing requirements.

 

3.       "Centralized versus Decentralized Database Management Systems" Please respond to the following:

 

Compare and contrast benefits and challenges that exist between centralized database management systems and distributed database management systems. Identify potential business environments where each can be properly used.

 

Analyze at least two considerations that would be required to ensure effective transaction transparency of centralized database management systems and distributed database management systems. Justify your response.

4.       "Business Intelligence Tools" Please respond to the following:

 

Business intelligence tools are considered the key drivers for many organizations. Identify and evaluate at least two business intelligence tools that could be effectively used to report business performance. Justify your response.

 

Estimate the costs and describe the values of the two business intelligence tools you have identified from Part 1 of this discussion based on their functionality, integrating architecture, and benefits to the enterprise. Provide your rationale.

 

5.       "Database Connectivity Methods" Please respond to the following:

 

Database solutions today must be able to adapt and integrate among various computing applications. Determine at least three forms of database connectivity methods that can be used as an interface between applications. For each method you have chosen, create an example that demonstrates how each could facilitate data exchange functionality in a cloud service environment.

 

Suggest at least two software solutions that offer the connectivity methods you have determined in Part 1 of this discussion to interface with other systems.

 

6.       "Extensible Markup Language (XML)" Please respond to the following:

 

XML provides a method for data to be transferred between systems. Specify at least three components of an XML document. Analyze how each component ensures data reliability and validation.

 

Identify at least two e-Commerce systems that provide XML data integration. For each system, describe how XML extensions could enable e-Commerce integration among system stakeholders such as vendors, resellers, suppliers, and customers.

 

-517-

7.       "Testing and Quality"  Please respond to the following:

 

Give your opinion on the effect that formal training has on each element the triple constraint of project management.

 

8.       "Teams and Communication"  Please respond to the following:

 

Examine the team building techniques found in the PMI article titled “Team Building and Development in a Matrix Environment” located at https://www.pmiwdc.org/article/karen-davey-winter/team-building-and-development-matrix-environment. Then, give your opinion on the manner in which team dynamics affects communication and conflict resolution among its members.

 

9.       "Risk Management"  Please respond to the following:

 

Identify the key risks (both positive and negative) associated with embarking on a graduate program. Describe the likelihood and the potential impact of such risks.

 

-518-

10.   "Software Certification Test" Please respond to the following:

 

From the first e-Activity, describe two types of software testing, identify when they are applied, and explain their corresponding standards.

 

As a software engineer in a software development company, explain how you would apply testing standards when testing your development projects.

 

11.   "User Documentation" Please respond to the following:

 

From the second e-Activity, discuss the readability and usefulness of the online user manual that you have researched. Identify its strengths and weaknesses, and areas where it could be improved.

 

From the second e-Activity, describe how you would modify the documentation to improve the user’ s ability to interpret failure messages and look up topics in the documentation if that user had little or no experience with computers and software.

 

12.   "S-, P-, or E- Systems" Please respond to the following:

 

Identify at least two methods by which we can determine if a legacy system should remain as legacy or it should be upgraded into a new software system. Explain these two methods and how they are applied. (List Reference)

 

Describe at least two ways software engineers can measure the impact of a proposed change to a software system. (List Reference)

 

13.   "Cost of Strongly Coupled Components" Please respond to the following:

 

Explain why a high degree of coupling among components of a software system can make maintenance of the system difficult. Provide at least one example that supports your answer.

Elaborate on two maintenance strategies that you would apply to lessen the effect of an already tightly coupled software that you have to maintain for an organization that requires 100% uptime on its safety-critical system. Provide a justification as to why you would implement these strategies over other options that are available. Describe how your strategies would change if the system only required 90% uptime and could be shut down for short periods of time during nonbusiness hours

 

 

14.   "Component Reuse History" Please respond to the following:

 

As a software engineer, what are the means of tracking you would use to track and monitor the reuse history of a component? Provide a rationale for the elements you list.

 

Provide at least one real-world example of a reuse situation where each piece of information should be or could have been used. Support your response.

 

15.   "Software engineer certification" Please respond to the following:

 

Should software engineers be licensed or certified the way many other professional engineers are?

 

Can a software engineer's performance be evaluated in an objective, quantitative way?

 

-555-

16.   "Representing Operation Models" Please respond to the following:

 

From the e-Activity: (http://www.youtube.com/watch?v=2yoahl1Hf5U.), suppose you were asked to create an UML use case for a system-as-is given the complete requirements. Propose three best practices that you would suggest for the creating of a UML use case from the complete requirements (i.e. selecting actors and operations).

 

Evaluate operationalization diagrams and UML use case diagrams in relation to operational models. Select the diagram that you believe represents operation models clearer. Defend your position.

 

17.   "Instance Behaviors" Please respond to the following:

 

From the second e-Activity, determine whether you believe that the behavior of a system can or cannot be captured without using UML sequence diagrams. Provide rationale.

 

Determine whether or not you believe that every system being modeled must include state diagrams in order to understand state transitions. Support your position.

 

 

 

 

18.   "Meta-Modeling" Please respond to the following:

 

A meta-model may be used to relate goal, object, agent, operation, and behavior models. Determine whether or not a system model that represents a meta-model could be functional without all five of the views defined. Provide a rationale.

 

Determine whether you would use UML class diagrams or another tool to describe meta-models. Support your position.

 

19.   "Goal-Oriented Modeling" Please respond to the following:

 

Suppose someone made the claim, “There is no difference between modeling the system-as-is and the system-to-be”. Provide three reasons to support or refute this claim.

 

From the e-Activity: (http://lotos.csi.uottawa.ca/ucm/pub/UCM/VirLibSDL09profile/SDL09-Profile.pdf.), provide your opinion as to whether the extension from the article makes it easier or harder to build models compared to using plain UML. Provide a rationale.

 

20.   "Central Repository and Threat Modeling" Please respond to the following:

 

From the e-Activity: (http://www.youtube.com/watch?v=qBI8BOvP2l8&feature=relmfu.), provide three examples of unintentional security threats and three examples of intentional security threats. Determine which of these examples puts an organization at a higher risk and explain why.

 

Propose three advantages and three disadvantages of using a central repository. Determine which advantages are the most important to an organization and which disadvantage is the most limiting to an organization

 

21.   "Formal Language Specification" Please respond to the following:

 

Examine the syntax and semantics of Linear Temporal Logic (LTL) closely. Determine whether you find it easier or harder to read and understand than other formal modeling languages. Provide a rationale.

 

Differentiate between instance variables and state variables and provide examples of each. Determine which of the two types of variables could adversely impact a design if used improperly in a system and explain why.

 

 

 

  • 9 years ago
  • 5
Answer(1)

Purchase the answer to view it

blurred-text
NOT RATED
  • attachment
    question_2.docx