Software Engineering (10th Edition)
Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
Expert Solution & Answer
100%
Book Icon
Chapter 25, Problem 25.1E

Explanation of Solution

Problems:

The problem that could arise when a company does not develop effective configuration management policies and processes are as follows:

  • It is not possible to create new versions of software systems effectively as they change. As well as it is not possible for the developers to keep track of the changes to the software.
  • It is difficult to control the costs and effort involved in making changes to a system.
  • There may be chances to forget the storage place of the software source code for a particular version. In some cases, wrong version of a system may be delivered to the customers.
  • Configuration management is seen as a part of a more general quality management process which results in ineffective quality management process.
  • If some one is leaving the company, then it is very difficult to protect investments in software, and to reproduce a build with the correct component or continue development.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
In the context of managing large-scale systems, discuss the significance of configuration management and its role in system maintenance.
Discuss the principles of "configuration management" and its role in maintaining system consistency.
QUESTION 26 Within the Configuration Management Plan what is the entity called that reviews all changes that are submitted by systems within an organization? O SELC Review Board O Project change review Board O SDLC Review Board O Configuration Control Board QUESTION 27 The reason why Laws, Regulations, and Guidance are written is because it provides organizations structure when they are defining their specific policies and procedures. O True O False QUESTION 28 Within the idea of Security Awarness and Training there are usually 2 different types oof training for General Users and Adminstrators O True O False
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning