You have been given the task of ‘selling’ formal specification techniques to a software development organization. Outline how you would go about explaining the advantages of formal specifications to sceptical, practising software engineers.
What will be an ideal response?
To explain the advantages of formal specification to practising engineers, it is
important to focus on what it brings to the practice of software development rather
than on more abstract advantages such as the ability to mathematically analyse the
specification. Advantages that might be stressed are:
1. The detailed analysis of the requirements that is necessary to produce a
formal specification. This results in the discovery and resolution of
ambiguities and errors at an early stage in the process.
2. The unambiguous specification of interfaces. Interface problems are one of
the major problems in system integration and a reduction in such problems
can significantly reduce software costs.
3. The ability to mix formal and informal specifications. The whole system
need not be formally specified but only those parts where most benefit can
be gained.
You might also like to view...
Case-Based Critical Thinking QuestionsCase 4-1Savannah is learning about different types of storage devices. She has many files on her computer. Savannah is going on vacation and wants to take some files with her. She is concerned because she is traveling to a hot climate and knows that some storage devices can be damaged by high heat. Savannah should NOT take her files with her on a(n) ____ storage medium because it is susceptible to high heat.
A. magnetic B. optical C. solid state D. computer
If all three RGB parameters for decimal are set to 0, the color will be ________
Fill in the blank(s) with correct word
________ changes the appearance of a field containing a date without affecting the data the field contains
Fill in the blank(s) with correct word
What statement regarding the SSH (Secure Shell) collection of protocols is accurate?
a. SSH provides a graphical view of the remote computer. b. SSH does not protect against DNS spoofing. c. SSH does not protect against IP spoofing. d. SSH supports port forwarding.