Explain why it is difficult to validate a reusable component without the component source code. In what ways would a formal component specification simplify the problems of validation?
What will be an ideal response?
Component validation without source code is very difficult because there is no way
of assessing how the component handles exceptions (and this is rarely defined in a
component specification). The only validation method that can be used is black-box
testing so static techniques cannot be used. Component specifications are rarely
complete and this increases the problems of black-box testing. Formal
specifications would help because they would precisely define what the component
was supposed to do and its actual behaviour could be compared to the specification.
However, formal specification rarely cover all exceptions and they do not help with
testing performance, dependability or other non-functional characteristics.
You might also like to view...
All of the following statements are TRUE about the current business drivers for dashboard initiatives EXCEPT:
A) The need to gain visibility into key business processes B) The need to recruit the best employees C) Improved timeliness and accuracy of business decisions D) The need for one view of the business date
After accessing your organization and its security needs, you make several recommendations to management. Management decides to implement most of your recommendations. However, they feel that one of your recommendations is too expensive to implement. Management comes up with an alternative recommendation that is less expensive. This an example of which type of control?
A. Corrective B. Deterrent C. Preventive D. Compensative
Answer the following statements true (T) or false (F)
1. A data center generally includes backup power supplies. 2. Site security of the data center itself includes barriers to entry, coupled with authentication techniques for gaining physical access. 3. Network security is extremely important in a facility in which such a large collection of assets is concentrated in a single place and accessible by external network connections. 4. Security specifically tailored to databases is an increasingly important component of an overall organizational security strategy. 5. Encryption becomes the last line of defense in database security.
The end result of a user needs assessment project that recommends the purchase, modification, upgrade, or building new technology is called a ____.
A. charter B. prototype C. report D. deliverable