Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 12, Problem 12.5E
Explanation of Solution
Five possible functional system safety requirements for the onboard software which are generated form the system safety requirements:
- The system should ensure the color of the light telecasted for the next segment. Break should be applied when the light color is red.
- Speed of the train should be limited when they exceeds the speed limit.
- The color of the light, speed limit and the current speed of the train should be tested multiple times per section of track...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Problem Description:
Some highly confidential documents need to be kept in a super secured vault.
The vault has 5 steps of security checkpoints without any human security personnel. Only an
authorized person gets 5 different passwords to open and close 5 different security gates. Each
password is effective to open and close the very same gate once.
You have to enter 5 different authorized passwords to open 5 different gates. You have to keep track
of which password was used to open one gate so that you can close the gate with the same password
after finishing your job in the vault. You will finish your job in the vault and lock the series of gates
using the correct sequence (which one you used to enter) of passwords. The passwords will be of
string type.
Question 1: Which data structure would you choose to keep track of the sequence of passwords to
access the vault?
Answer:
Question 2: Write the Pseudocode of the insertion operation of this data structure.
Answer:
Question 3: Write the…
Program
PROJECT TITLE: IMPLEMENTATION OF DESIGN FOR RADIO FREQUENCY (RF) TECHNOLOGY BASED SPEED CONTROL SYSTEM FOR VEHICLES
PROJECT DESCRIPTION: Road safety at important places like schools, hill areas, highways, and expressways is very important. Roads should be designed for the safety of all road users, i.e., ensuring adequate facilities for pedestrians, cyclists, and motorcyclists. Measures such as footpaths, cycling lanes, safe crossing points, and traffic calming measures are critical to reducing the risk of injury among these road users. In this project, a speed control system for vehicles is proposed in which a microcontroller based system with RF based communication that is simple, low cost, and a durable project for safety of drivers as well as the public.
PLATFORM: EMU8086
In some older homes that do not have a central heating and air conditioning system, smaller air conditioning units made to fit inside of a window and cool a single room are used as an alternative way to cool the home.
Depending on the size of the room and the amount of shade that the room has, different sizes of air conditioning units must be used in order to be able to properly cool the room. The unit of measure for the amount of cooling that an air conditioner unit can provide is the BTU (British Thermal Unit) per hour.
Code a program that will calculate the correct size of air conditioner for a specific room size using the instructions below.
Step 1:
Ask the user to enter the length of their room (in feet).
Step 2:
Ask the user to enter the width of their room (in feet).
Step 3:
Calculate the area (in square feet) of the room by multiplying the length and the width of the room.
For example, if a room is 20 feet wide by 24 feet long, then its area is 20 * 24 = 480 square feet
Step…
Chapter 12 Solutions
Software Engineering (10th Edition)
Ch. 12 - Prob. 12.1ECh. 12 - Prob. 12.2ECh. 12 - Prob. 12.3ECh. 12 - Prob. 12.4ECh. 12 - Prob. 12.5ECh. 12 - Prob. 12.6ECh. 12 - Explain why using model checking is sometimes a...Ch. 12 - List four types of systems that may require...Ch. 12 - Prob. 12.9ECh. 12 - Should software engineers working on the...
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Video-Rental LTD is a small video rental store. The store lends videos to customers for a fee, and purchases its videos from a local supplier. A customer wishing to borrow a video provides the empty box of the video they desire, their membership card, and payment – payment is always with the credit card used to open the customer account. The customer then returns the video to the store after watching it. If a loaned video is overdue by a day the customer's credit card is charged, and a reminder letter is sent to them. Each day after that a further card is made, and each week a reminder letter is sent. This continues until either the customer returns the video, or the charges are equal to the cost of replacing the video. New customers fill out a form with their personal details and credit card details, and the counter staff give the new customer a membership card. Each new customer's form is added to the customer file. The local video supplier sends a list of available titles to…arrow_forwardTroubleshooter Think of a technical problem you may have encountered. It can be related to software, hardware, or even in a non-technical setting. Why is it important to follow a troubleshooting methodology to solve the problem? When faced with a problem, why do you suppose you shouldn't start trying fixes immediately as they occur?arrow_forwardA gate can be in one out of four possible states: closed, raising, open, lowering. The gate can be opened either manually (by pushing the “OPEN” button) or when a sensor detects that a car is at gate. After the gate fully opens, it can be closed by pushing the “CLOSE” button. It can be also closed after 10 seconds from being fully opened, but only if there is no car at gate.Create state transition table for the above case based on the image given.arrow_forward
- Computer Science You are the project manager of a building construction project. A conflict has emerged between two key stakeholders due to their personal working styles. This conflict has been escalated to you and you should facilitate a satisfactory resolution. Part A: Explain your resolution strategy. Part B: How would you address the issue.arrow_forwardDetection functions in several ways.arrow_forwardINTI Online Book Purchasing System is a system to help student in book purchasing. The main objective for the system is to keep track of student records, student orders and the available books. The student may search for books before they order the books online. The system operator is responsible to verify the order submitted by the students. The order is process when it is available otherwise, a purchase order will be prepared. A feedback is send to the student when the process is completed. Each student will be characterized by a unique ID number, name, address and contact number. Each book holds information on the book title, author, category, and ISBN number. Student Order characterized by an ID number, date ordered, and quantity. Each order is associated with only one student. One student may have many orders and each order contains one or many book orders. Book order is characterized by order-number, date, ISBN number, quantity and total. Any book order is related to one and only…arrow_forward
- A motor runs when the start button is pressed and the following conditions are satisfied .Safety door is closed The level of the liquid in the tank is above a X .certain level The motor stops and a lamp is to glow if any of the following conditions occur .The stop button is pressed K .The safety door is opened X .The liquid level is below the satisfactory level X The lamp stops glowing when the motor starts. One signal triggers an alarm bell and another one causes a flash-lamp to start flashing (on/off) when a fault occurs in the motor. The bell stops when the operator acknowledges the alarm, but the lamp continues to flash until the fault is .removed The designer needs for ...... state boxes for drawing the ASM-chart for the controller of the aforementioned system O 7 9 10 8 6 Oarrow_forwardTroubleshooting in Daily Life Troubleshooting is a technical term for solving a problem. Chances are you have already done some troubleshooting in your daily life. What are some examples of troubleshooting that you have experienced? What were you trying to fix and why? When you were doing it, did you think of it as "troubleshooting" or not? If you did the same activity today, would you think of it as "troubleshooting" now? Could you provide documentation for someone else who may have had the same issue so they could resolve it? How would you do that? What would you include?arrow_forwardCase Study: A Video Store (AVS) runs a business of renting out video to customers. Every customer must have a AVS customer card in order to rent a video, or he need to apply for one. Customers rent videos for three days at a time. Every time a customer rents a video, the system must ensure that they do not have any overdue videos. If so, the overdue videos must be returned and an overdue fee paid before customer can rent more videos. Likewise, if the customer has returned overdue videos, but has not paid the overdue fee, the fee must be paid before new videos can be rented. Every morning, the store manager prints a report that lists overdue videos. If a video is two or more days overdue, the manager calls the customer to remind them to return the video. If a video is returned in damaged condition, the manager removes it from the video database and may sometimes charge the customer. Task 1: Behavioral communication diagram. Create a communication diagram…arrow_forward
- Computer Science Internship training is one of the graduation requirements for undergraduate students in UTP. Students are usually posted to different companies, agencies, and organizations for the training. After the posting, the first activity that is conducted by students is to search for accommodation in proximity with the company to which they are posted. However, this task is not always easy as students may not be familiar with the company’s neighborhood. As a results, many websites are designed to recommend the best hotel/homestay for students using a recommender system. This system uses hotel rating to predict which hotel a user is most likely to choose from among all hotel/homestay. Nevertheless, in the case of students, rating alone is not enough for a suitable prediction, other important factors should also be considered. Assuming you are among the students who will be posted next semester for this training, build a system which will help you and your friends to book the…arrow_forwardVideo-Rental LTD case study Video-Rental LTD is a small video rental store. The store lends videos to customers for a fee and purchases its videos from a local supplier. A customer wishing to borrow a video provides the empty box of the video they desire, their membership card, and payment – payment is always with the credit card used to open the customer account. The customer then returns the video to the store after watching it. If a loaned video is overdue by a day the customer's credit card is charged, and a reminder letter is sent to them. Each day after that a further card is made, and each week a reminder letter is sent. This continues until either the customer returns the video, or the charges are equal to the cost of replacing the video. New customers fill out a form with their personal details and credit card details, and the counter staff gives the new customer a membership card. Each new customer form is added to the customer file. The…arrow_forwardDefine the term sentinel.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education