Questions from Software Engineering


Q: Some experts believe that the growth in e-commerce will cause

Some experts believe that the growth in e-commerce will cause states and local governments to lose tax revenue, unless Internet transactions are subject to sales tax. What is one argument that support...

See Answer

Q: When team members are geographically dispersed, communication becomes more challenging.

When team members are geographically dispersed, communication becomes more challenging. Explain how groupware can increase user productivity in this context.

See Answer

Q: Under what circumstances should a systems analyst recommend an agile methodology over

Under what circumstances should a systems analyst recommend an agile methodology over structured development or object-oriented analysis?

See Answer

Q: Should the IT director report to the company president, or somewhere

Should the IT director report to the company president, or somewhere else? Does it matter?

See Answer

Q: Rapid advancements in areas such as machine learning and predictive analytics in

Rapid advancements in areas such as machine learning and predictive analytics in data science are affecting the daily operations of many IT departments. What should a systems analyst do to stay curren...

See Answer

Q: When using a project triangle to illustrate conflicting priorities, Microsoft suggests

When using a project triangle to illustrate conflicting priorities, Microsoft suggests that if the problem is in the fixed leg, work on the other two legs. For example, if the project must not exceed...

See Answer

Q: If you are managing a large project, would you prefer Gantt

If you are managing a large project, would you prefer Gantt charts or PERT/CPM charts to represent project status? Explain why.

See Answer

Q: Suggest three typical business situations where referential integrity avoids data problems.

Suggest three typical business situations where referential integrity avoids data problems. Students might respond with examples similar to the following.

See Answer

Q: We use lots of codes in our personal and business lives.

We use lots of codes in our personal and business lives. How many can you name?

See Answer

Q: What are the six security levels? Provide examples of threat categories

What are the six security levels? Provide examples of threat categories, attacker profiles, and types of attacks.

See Answer