| Syllabus | Contact Info |

   
Herbert J. Bernstein Professor of Computer Science
Dept. of Mathematics and Computer Science, 150 Idle Hour Blvd., KSC 121, Oakdale, NY 11769-1999

92720 CSC 3981 -- Advanced Software Engineering I -- Fall 2012
Online Course
Quiz 4


This web page is http://www.bernstein-plus-sons.com/.dowling/CSC3981F12/CSC3981_Quiz_4.html
Copyright © 2010, 2012 Herbert J. Bernstein and other parties. All rights reserved.


This is the weekly quiz for 9 October 2012 for the CSC 3981 course. Please do this quiz after you have completed the rest of assignment 4. It should take between one half hour and 2 1/2 hours to complete if you are well prepared, longer if not.

  <==== Do this AFTER you've answered all the questions

You probably DON'T want to do this ===>  

Please fill in the following information:

Name:


Email:

Skype ID:

  1. Consider what you have read and do some research on the web and write a detailed essay either supporting or opposing the proposition that the designer of applications does not need to be concerned with security issues.

  2. If you are a software engineer working in a large institution with well-established security policies, should you do your design on the assumption that those policies are strictly adhered to? should you do your design on the assumption that those policies actual achieve the intended results with respect to security? how should your design incorporate those policies?

  3. If you are designing a system in a hostile environment (e.g. the internet), what should be the roles of perimeter defense (security at the public interfaces of the system) and of point defense (security at all major nodes of the system, whether internal or external) in your design. Explain your answer.

  4. Explain the concept of a critical system.

  5. Explain the relative roles and values of static analysis and reliability testing.

  6. Consider what you have read and do some research on the web and write a detailed conherent essay on the concept of software reuse, comparing and contrasting open- and closed-source software environments.

  7. Update your blog on the status of your first project and second projects and then give the URL here.

  8. Give the URL of your current best design for your second project.

  9. Compare and contrast the approach to software engineering on Brooks and in Sommerville. Be detailed and specific.

  10. Summarize the three most important things you learned in Prof. Joshi's nineth lecture.

  11. Summarize the three most important things you learned in Prof. Joshi's tenth lecture.

  12. Summarize the three most important things you learned in Prof. Joshi's eleventh lecture.

  <==== Do this AFTER you've answered all the questions

You probably DON'T want to do this ===>  


Updated 6 October 2012.