what characteristics need to be exhibited by an organisation to improve its software process?

Answers

Answer 1

Answer:  Defined , Controllable ,  Measured , Effective ,  Institutionalized are some of the characteristics needed to be exhibited by an organisation to improve its software process

Explanation:

Software process improvement(SPI)  helps in achieving goals of software products for an organization. Some of its characteristics are Defined , Controllable ,  Measured , Effective ,  Institutionalized.

It goals must be defined, and must also be controlled and it performance must be measured at regular intervals and any reforms carried out to achieve goals must be effective. Lastly it should implement all goals in an institutional framework to be followed by every one in the organization.


Related Questions

Write a C++ program that takes as input a list ( an array) of n integrers and finds the number of negative inetgers inthe list (array ).
Side Note: The problem did not come out ofthis book but the information that I study is from this book. And Iam not getting how to write the program.

Answers

Answer:Following is the program for the count of negative integers in an array:-

#include <bits/stdc++.h>  

using namespace std;

int main()

{

   int n,count=0;//declaring 2 variables n and count and initializing count with 0..

   cout<<"Enter the size of the array"<<endl;

   cin>>n;//prompting the size of the array...

   int negative_nums[n];//array of integers of size n..

   cout<<"Enter the numbers"<<endl;

   for(int i=0;i<n;i++)

   cin>>negative_nums[i];//prompting elements of the array...

   for(int i=0;i<n;i++)//iterating over the array....

   {

       if(negative_nums[i]<0)// if integer in the array at ith position is negative...  

       count++;// increasing the count...

   }

   cout<<"The number of negative numbers are "<<count<<endl;//printing the count of negative integers...

   return 0;

}

Explanation:

1. In the program i have taken a count integer initializing it with 0

2. Iterating over the array.

3. If the element at ith position is less than zero then increasing the count by 1.

4.Printing the count of negative integers in the array.

Write a C++ program that computes the area and perimeter of aspecified shape
(either rectangle,triangle, or circle). The user should be prompted for therelevant

input (type of shape anddata associated with that shape). See the examplebelow.

Enter the shape type (1 forrectangle, 2 for triangle, 3 for circle)

1

Enter the width

2

Enter the height

3

The perimeter of the rectangleis 10 and the area is 6.

Answers

C++ program that computes the area and perimeter of a specified shape

#include <iostream>

#include <cmath>

using namespace std;

void rectangle() //Defining function for rectangle

{ int h,w;

cout << "Enter height: ";

//taking input

cin >> h;

cout << "Enter width: ";

cin >> w;

cout << "The perimeter of the rectangle is " <<2*h+ 2*w << " and the area is " <<h*w << endl;  //printing output

}

void triangle()  //Defining function for triangle

{ int s1,s2,s3,h,w;

cout << "Side 1: ";  //Taking input

cin >> s1;

cout << "Side 2: ";

cin >> s2;

cout << "Side 3: ";

cin >> s3;

cout << "Enter the height: ";

cin >> h;

cout << "Enter the base length: ";

cin >> w;

cout << "The perimeter of the triangle is " <<s1+s2+s3 << " and the area is " <<(.5)*w*h << endl; //printing output

}

void circle()//Defining Function for the circle

{

const double p=3.14;

int w;

cout << "Enter the radius: "; //Taking input

cin >> w;

cout << "The perimeter of the circle is " << p*2*w << " and the area is " << p*w*w<< endl;  //printing output

}

int main()  //driver function

{

int s;

cout << "Enter the shape (1 for rectangle,2 for triangle, 3 for circle): ";

//Asking user for the shape

cin >> s;

switch(s)  //checking which shape it chooses

{

case 1:

rectangle();  //If user type 1 ,then calling rectangle function

break;

case 2:

triangle();   //If user type 2 ,then calling triangle function

break;

case 3:

circle();  //If user type 3,then calling circle function

break;

default:

cout <<"Enter valid choice for shape";  //If user type other than 1,2,3

}

return 0;  

}

Output

Enter the shape (1 for rectangle,2 for triangle, 3 for circle): 1

Enter height:2

Enter width: 3

The perimeter of the rectangle is 10 and the area is 6

Write an If - Then statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

An If-Then statement that sets the variable hours to 10 when the flag variable minimum is set:

Using an explicit comparison:

if minimum:

   hours = 10

This statement simply checks if minimum is True. If it is, then it assigns 10 to the hours variable.

Why is it important to power on the computer before you begin?

Answers

We power on the computer before we begin because a computer has a special programme in it called operating system which needs to be started for us to use the computer

Answer: so i can turn on and you could do what ever u want

Explanation:

What is the analysis and complexity of a shell sortalgorithms?

Answers

Answer: The shell sort is based on insertion sort. Here the list of elements are divided into smaller sub list which are sorted based on insertion sort.

Its best case time complexity is O(n* logn) and worst case is O(n* log^2 n)

Explanation:

Shell sort is an inplace sorting here we begin by dividing the list into sublist and sorting the list with insertion sort. We create interval for dividing the list into sub list until we reach the smallest interval of 1.

The best case is O(n* logn).

Please answer the question about the economic idea of technology. Which of the statements is true of technology?
a.Technology refers to the processes a firm uses in production.
b.Technology refers most directly to the methods firm managers use to organize overseas operations.
c.Technology is the use of computers and software to create economic efficiency.
d.The economic definition of technology is unrelated to the management skills or training that firm employees may have.

Answers

Answer:

C - Technology is the use of computers and software to create economic efficiency

Explanation:

The economic idea of technology refers to everything that can assist in producing goods more efficiently (faster/cheaper/higher quality). Economists refer to technology as an innovative method of executing things, rather than referring to physical hardware.

Answer:

The Correct Answer is C

Explanation:

Technology, for statisticians, is anything that assists us manufacture things quicker, more reliable or more affordable. When you think of technology there's a great opportunity you think of material things like large devices or high-speed computers. But when statisticians debate about technology, they're imagining more broadly about distinct methods of making things.

What are the 3rdand 4th forms of normalization, explain with examples?

Answers

Answer:

Normalization is a technique in which database are designed and organizes tables in such manner that reduces dependency and redundancy of the data.  It can divide larger tables into the smaller tables and used them using different relationships.

3rd form of normalization is defined as, the table whose non primary key field are dependent on the primary key only and have no dependence any other non key primary field in the tables.

4th form of normalization is defined as, is used in database normalization where they are a non trivial multi value dependency other than candidate key. It builds on the first,second and third normal forms and the Boyce Codd Normal Form.

COMPARE AND DIFFERENTIATE THE SERVER AND WORKSTATION BBRIEFLY?

Answers

Answer: Servers perform actions and replies back to clients when connected in the form of the back end of application being used.

Workstations on the other hand are systems where high performance work is performed for getting a high quality of output.

Explanation:

Examples of servers are the application servers or web server. Examples of workstations include graphics editing and audio editing workstations. If we compare in term so reliability i.e there response to failures or the frequencies of failures, it is found that workstations are more reliable in comparison to servers.

Give three reasons why you think ETL functions are mostchallenging in data warehouse environment.

Answers

Final answer:

ETL functions are challenging in a data warehouse environment due to the high volumes of data, the variety and inconsistency of data formats and structures, and the imperative need to maintain data quality.

Explanation:

ETL, which stands for Extract, Transform, Load, is a critical process in a data warehouse environment. It involves the integration of data from multiple sources, transformation of that data into a format suitable for analysis, and then loading it into the data warehouse.

There are three main reasons why ETL functions can be particularly challenging in this setting:

Data Volume: The sheer amount of data that needs to be processed can be overwhelming. Handling large volumes of data requires robust systems and can be time-consuming, thus posing a significant challenge.

Data Variety: Different data sources can mean inconsistent formats, structures, and quality. Achieving consistency and accuracy in data transformation is a difficult task that demands meticulous attention to detail and sophisticated processes.

Data Quality: Ensuring the correctness, completeness, and reliability of data is paramount. This can be a daunting task due to potential errors in the data and the complexity of data validation rules.

The challenges of ETL highlight the importance of having a well-designed data warehouse architecture and a comprehensive approach to data management.

You can use ____ arguments to initialize field values, but you can also use arguments for any other purpose.

a.
object

b.
constructor

c.
field

d.
data

Answers

B.constructor I think that’s the answer

)What are the approaches used to design a Control unit? Brieflycompare them.

Answers

Answer: Control unit is the main unit of CPU which is responsible for handling of the processor's control action. There are two  ways to design a control unit :-

Hardwired control unitMicro-programmed control unit

Explanation: Comparison of the two control units are as follows:-

Hardwired control is comparatively rapid than the micro-programmed control .Hardwired control is circuit type technology and micro-programmed control is software type technology.Hardwired control is based on the RISC architecture and micro-programmed is based on CISC architecture.

Point out any special purpose programminglanguage and also for what purpose it wasdeveloped.

Answers

Answer: Lisp which is the short for list processing is a special purpose programming language and it was developed for processing strings which is being exploited in the field of artificial intelligence.

Explanation:

Lisp is used for artificial intelligence as it can compute symbolic expressions, so a common lisp which it later came to be known as is used for development of application with artificial intelligence and is being widely used today. Lisp was actually developed in the early 1980s.

Describe how layers in the ISO reference model correspond tolayers in the TCP/IP reference model.

Answers

Answer and explanation : The TCP/IP means TRANSMISSION CONTROL PROTOCOL AND INTERNET PROTOCOL It governs all the communication which are performed over network it has a set of protocol. It defines how different types of conversation are performed without any fault through a network

THERE ARE 5 TYPES OF LAYER IN TCP/IP MODEL

APPLICATION LAYER: It is present at upper level it is used for high level products for the network communicationTRANSPORT LAYER: This layer is used for transfering the message from one end to other endNETWORK LAYER : Routers are present in network layer which are are responsible for data transmission DATALINK LAYER : it is used when there is any problem in physical layer for correcting this datalink are usedPHYSICAL LAYER: Physical; layer are responsible for codding purpose which we used in communication process

In the second form of ____, the binary operation op is applied to the elements in the range.

A.
adjacent_find

B.
adjacent_difference

C.
adjacent_member

Answers

If I remember correctly from my computer science class it is B.

How many times will the following loop repeat?

i = 2; while i <= 16; i = i+2; end

A. 0 times

B. 2 times

C. 8 times

D. 16 times

Answers

Answer:

8 times

Explanation:

The while is execute again and again until the condition is TRUE.

In the question:

the value of i=2, when program enter the loop it check the condition when

2 <= 16, condition TRUE. it update the value i = 4.

Again the loop check condition, 4 <= 16, condition TRUE, i become 6 and so on...

4,6,8,10,12,14,16

when i = 16 loop condition is also TRUE. 16 <= 16. So, it again run the loop and i become 18.

then, the loop condition false and it exit the loop.

so, i run until 18

4,6,8,10,12,14,16,18

Therefore, the answer is 8 times.  

Thetremendous diversity of the source systems is the primary reasonfor their complexity. Do you agree

Answers

Answer:

Yes, i agree with the given statement that the tremendous diversity of the source system is the primary reason for their complexity as, when we storing the large amount of the data and the data warehousing are based on the solution to implemented to the data are get transformed for matched the desired queries. There is also the duplicate entry elimination which increased the complexity of the data.

Construct a SR latchfrom

1) two NAND gates.

2) two NOR gates

3)Also construct SR Latch with a control input.

Answers

Answer:

Refer to the images for different S-R Latches.

There are 3 images attached 1 having S-R latch with 2 NAND gates 2nd having S-R Latch with 2 NOR gates and last having S-R latch with control input.

Difference between NAND gated S-R latch and NOR gated S-R latch is the output is reversed.

In latch with control input the latch will only work when the control input or Enable signal in our image is HIGH or 1.

. How is using 0 / 1 or true / false in specifying digital an abstraction?

Answers

Answer:

Digital electronics involves 2 states which are abstracted as 0/1 or true/false.

Explanation:

Digital electronics involves 2 states. For TTL logic this corresponds to 0 Volt (0) or 5 Volt (1). Analyzing further, a  digital waveform has a square shape  (not necessarily a perfect square) with 2 levels denoting the two states, namely, true(1) or false(0). So a 0 or 1 is not actually absolute but 0 corresponds to voltage level below a threshold voltage whereas 1 corresponds to voltage level above a threshold voltage.

True / False
In general,

embedded system processors are more powerful than general-purpose processors.

Answers

Answer: True

Explanation:

Embedded system processor are more powerful than general purpose processor because the embedded  processors are designed to work in a particular machine for which they get the right amount of RAM and hardware however general purpose processors are to work in every machine which makes them little slow in some machine as they do not get the proper hardware and RAM and have to cope with much more demanding situations.

Given the following code, what is the final value of i at the end of the program? int i; for(i=0; i<=4;i++) { cout << i << endl; }

Question 5 pow(2,3) is the same as pow(3,2). Question 14 options: True False

Question 6 The functions pow(), sqrt(), and fabs() are found in which include file?

cstdlib

cmath

iostream

regular

Answers

Answer:

The final value of i will be 5 at the end of the program.

i=0, i≤4, prints 0.

i=1, i≤4, prints 1.

i=2, i≤4, prints 2.

i=3, i≤4, prints 3.

i=4, i ≤ 4, prints 4.

i=5, i is not ≤ 4, stops here.

Q-5:

pow(2,3) = 8 and pow(3,2)=9, so they are not same.

Q-6:

The functions pow(), sqrt(), and fabs() are found in which cmath

Explanation:

Final answer:

The final value of i is 5. pow(2,3) is not the same as pow(3,2). The functions pow(), sqrt(), and fabs() are located in the cmath include file.

Explanation:

Final Value of Variable i

The final value of i at the end of the loop in the C++ code is 5. This occurs because the loop continues to increment i until the condition i <= 4 is no longer true. After the last execution with i equal to 4, the loop increments i to 5 and then checks the condition, which fails, thus exiting the loop and leaving i with a value of 5.

Power Function Comparison

pow(2,3) is not the same as pow(3,2). The pow function returns the value of one number raised to the power of another. Thus, pow(2,3) calculates 2 to the power of 3 (2*2*2), which equals 8, while pow(3,2) calculates 3 to the power of 2 (3*3), which equals 9.

Function Include Files

The functions pow(), sqrt(), and fabs() are all found in the cmath include file of C++.

This is a form of load balancing where larger workloads are issued to IT resources with higher processing capacities

a. Pay-Per-Use Monitor

b. Asymmetric Distribution

c. SLA Monitor

d. Workload Prioritization

Answers

Answer:

The correct answer is b. Asymmetric Distribution.

Explanation:

Asymmetric Distribution has to do with those larger workloads which are issued to IT resources with higher processing capacities. The Pay-Per-Use Monitor is where the billing system relies on. The Workload Prioritization is where workloads are prioritized according to their level. And the SLA monitor is a contract between a service provider and the customer. So, the most correct answer is b.Asymmetric Distribution.

What is the output of the C++ codeabove?

a.

0 1 2 3 4

c.

0 5 10 15 20

b.

0 5 10 15

d.

5 10 15 20

int list [5] = {0, 5, 10, 15, 20};
int j;
for (j = 0; j < 5; j++)
cout << list [j] << " ";
cout << endl;

Answers

Answer:

c

Explanation:

xxhdudhshshsudjdjd

In a doubly linked list, every nodecontains the address of the next node and the previousnode except for the ____ node.
a. middle

b. last

c. first

d. second to last

Answers

Answer:The answer is (c).first.

Explanation:

In doubly linked list each node possesses the address of next node(except last node) because there is no node present after the last node .

and the address of previous node(except first node) because there is no node present before the first node.

So the conclusion is that the first node does not contain the address of previous node and the last node does not contain the address of the next node.

What effect does the clock rate of a computer have on the execution speed of an instruction?

Answers

Answer:

Clock rate also known as clock speed is the rate at which microprocessor executes instructions.That means clock rate is directly proportional to the execution speed of an instruction.Microprocessor is the core of a computer a system it contains all the functions of a central processing unit.So if the clock rate is more  execution speed of an instruction is more if clock rate is less execution speed of an instruction is less.

Appreciate with dumbsup and need short discription about what is java programming

Answers

Answer:

java programming language is a programming language which is based on the concepts of object oriented programming.

Explanation:

Java program uses the concept of classes and enable to use the classes by making objects of them. Java program is similar in concepts to that of C++. java program can run on a single system or can also be shared across a network. It is considered to be safe and it is interpreted by JVM (Java virtual machine). Some of its characteristics are it exhibits polymorphism, inheritance and overloading and overriding functions.

Java is used for developing many web based application, software's and games. These program are easy to write, debug and compile with perfect GUIs for which it is considered to be user friendly.

Write a programe to add two numbers using function with return type"void".

Answers

Answer:

#include<iostream>

using namespace std;

//create the function which add two number

void addTwoNumber(int num_1,int num_2)

{

   int result = num_1 + num_2;  //adding

   

   cout<<"The output is:"<<result<<endl;  //display on the screen

}

//main function

int main(){

   //calling the function

   addTwoNumber(3,6);

   return 0;

}

Explanation:

First, include the library iostream for using the input/output instructions.

then, create the function which adds two numbers. Its return type is void, it means the function return nothing and the function takes two integer parameters.

then, use the addition operation '+' in the programming to add the numbers and store the result in the variable and display the result.

create the main function for testing the function.

call the function with two arguments 3 and 6.

then, the program copies the argument value into the define function parameters and then the program start executing the function.

To create a window, which of thefollowing classes has to be extended?ContainerJFrameJButtonJTextField

Answers

Answer:

J frame class has to be extended for the creation of a window

Explanation:

J frame needs to be extended to create a window, this is because this class in windows has a title, support buttons components, a border or we can say it has decorations for windows.  

The rest of the classes like J button and J text fields lie within the J frame and the Container class is a super class and provides only outlines to J Frame class.

Distinguish the critical factors that affect the network performance in wireless Mesh Network?

Answers

Answer:

Physical Object and Radio Frequency Interference

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

There are two main factors that affect a networks performance when talking about Wireless Mesh Network. The two factors are Physical Object and Radio Frequency Interference.

Physical Objects can cause interference in mesh networks. Common Objects such as trees and houses are common causes of interference on wireless mesh networks. The best connection is gained with a clear sight from one node to another. Specific objects such as aluminum made objects can cause complete signal severance.

Radio Frequency Interference is the second main factor when dealing with mesh networks. If there are many signals on the same frequency, Information or packets can get lost in the process causing really bad connection.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Just as you can block statements that depend on an if, you can also block statements that depend on a(n) ____.

a.
Boolean expression

b.
operator

c.
else

d.
constant

Answers

D. Constant is the answer I think
Final answer:

The statements that can be blocked in programming, similar to those depending on an if statement, depend on a(n) 'else'. An 'else' statement allows for the conditional execution of a block of code when the 'if' condition is not met.

Explanation:

Just as you can block statements that depend on an if statement, you can also block statements that depend on a(n) c. else. In programming, an else statement is used to execute a block of code when the condition in the if statement is not met. Both if and else statements are structured to handle Boolean expressions which evaluate to either true or false. These control flow statements form the building blocks of logical structures within code and enable conditional execution of code segments.

It's important to distinguish these structures from constants, operators, and statement constants. A constant holds a value that does not change throughout the execution of the program, whereas an operator is used to perform operations on variables and values. A statement constant, on the other hand, is a symbolic representation of a particular statement (or truth value) that remains unchanged within the logical framework of the discussion or argument. Using conditional statements like if-then-else allows programmers to control the flow of execution and make decisions within a program.

What is a traffic controller?what are its functions?

Answers

Answer:

A traffic controller is basically a system design to regulate traffic in a controlled manner with a set of traffic rules to follow so as to ensure public safety .

The main functions of a traffic light controller are listed below:

To direct  and regulate vehicular and pedestrian trafficTo ensure safety of construction workers, emergency response team and public in general in order to avoid accidentsThese also uses CCTV and other monitoring system to manage flow of traffic and suggestion concerned with traffic congestion. These are provided by local or state authorities.To ensure smooth traffic flow in order to save time and chaos.

Other Questions
A defendant is on trial for the crime of menacing due to allegedly making threatening phone calls to a woman living in his apartment building. The prosecution called a female witness who lived in the defendants last apartment building to testify that she also received a number of identical threatening phone calls while the defendant lived in her building. The defense objected to the testimony on the grounds of relevance. The prosecution responded by explaining that it plans to introduce further evidence establishing that the calls received by this witness were made by the defendant.Is the witnesss testimony admissible?No, because calls by an unidentified caller are not relevant to the case.No, because the witnesss statement cannot be admitted prior to the production of evidence establishing that the defendant made the calls to the witness.Yes, on the condition that evidence is introduced later that would permit the jury to reasonably find by a preponderance of the evidence that the caller was the defendant.Yes, on the condition that the court finds by a preponderance of the evidence that the caller was the defendant. which questions could be answered using the scientific process The following graph is the result of applying a sequence of transformations to the graph of one of the six basic functions. Identify the basic function and write an equation for the given graph. Name and discuss theprogramming languages suitable for the following fields: i) Science and Engineering field ii) Education iii) InformationSystem iv) System andNetworks A proton, traveling with a velocity of 4.5 106 m/s due east, experiences a magnetic force that has a maximum magnitude of 8.0 1014 N and a direction of due south. What are the magnitude and direction of the magnetic field causing the force? You just purchased a new router from Cisco and now are in the process of installing it. Upon boot up the router enters the setup mode. You are prompted to enter the enable password and the enable secret password. What is the difference between the two passwords? What are the cerebellar peduncles and where are they located? What is the area of the polygon given below A construction worker is carrying a load of 40 kilograms over his head and is walking at a constant velocity. If he travels a distance of 50 meters, howmuch work is being done? Optics (Lens) Problem A lens forms an image of an object. The object is 16.0cm from the lens. The image is 12cm from the lens on the same side as the object. a. What is the focal length of the lens? Is the lens converging or diverging? b. If the object is 8.5mm tall, how tall is the image? Is it erect or inverted? c. Draw a principal ray diagram. A 1.44 L buffer solution consists of 0.322 M propanoic acid and 0.112 M sodium propanoate. Calculate the pH of the solution following the addition of 0.069 moles of HCl. Assume that any contribution of the HCl to the volume of the solution is negligible. The Ka of propanoic acid is 1.34 10-5. Please assist me with these problems. A force of 36.0 N is required to start a 3.0-kg box moving across a horizontal concrete floor. Part A) What is the coefficient of static friction between the box and the floor? Express your answer using two significant figures. Part B) If the 36.0-N force continues, the box accelerates at 0.54 m/s^2. What is the coefficient of kinetic friction? Express your answer using two significant figures. Which sentence correctly describes this image?The image shows 9:15 as the timeA. Son cuarto para las nueve.B. Son las nueve menos quince.C. Son las nueve y cuarto.D. Son las nueve y cuatro. if we want to describe work, we must have What identifies your skills and interests to help you plan out your careergoals?A. A self-assessmentB. A self-help bookC. A self-examinationD. A bit of self-knowledge Solve the system of equations.y= 2x + 4y = x2 + x - 2 You are conducting research on the Miranda Rights and you collect five sources. All the articlesare written by experts, but one of them has conflicting information that does not match up withthe others. Why would you use this article in your research?You use the article because you researched the author and the sources forcredibility.You use the article without additional research because it is the only credible source.You use the article because you want to give your reader conflicting information.You use the article because it came up in your search which confirms its credibility. After nutrient enrichment from sewage contamination, a lake often becomes inhospitable to fish. Why? what is the total surface area of the rectangular pyramid below