CptS 401 Adam Carter. Announcement  Executive decision: no class Thursday! (CH 8.3-8.4 and exam review will take place tomorrow instead)  Be sure that.

Slides:



Advertisements
Similar presentations
A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers.
Advertisements

Overview CNS 3320 – Numerical Software Engineering.
ADMINISTRATION REVISION – BLOCK 2 HEALTH AND SAFETY.
Social Implications of a Computerized Society Computer Errors Instructor: Oliver Schulte Simon Fraser University.
1 Software Engineering Lecture 11 Software Testing.
©1999 Addison Wesley Longman Slide 13.1 Information System Security and Control 13.
Applied Software Project Management Andrew Stellman & Jennifer Greenehttp:// Applied Software Project Management Introduction.
Applied Software Project Management INTRODUCTION Applied Software Project Management 1 5/20/2015.
Slides prepared by Cyndi Chie and Sarah Frye. Fourth edition revisions by Sharon Gray. A Gift of Fire Fourth edition Sara Baase Chapter 8: Errors, Failures,
CptS 401, Fall /2/10 Chapter 8: Errors, Failures, and Risk See Dilbert cartoons about errors, failures, and risk:
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Errors, Failures and Risks CS4020 Overview Failures and Errors in Computer Systems Case Study: The Therac-25 Increasing Reliability and Safety Dependence,
Applied Software Project Management 1 Introduction Dr. Mengxia Zhu Computer Science Department Southern Illinois University Carbondale.
The material in this presentation is the property of Fair Isaac Corporation. This material has been provided for the recipient only, and shall not be used,
People: Usability COMP 101 November 12, 2014 Carolyn Seaman Amanda Mancuso Susan Martin University of Maryland Baltimore County.
Seminar Series Seminar Series MERCURY CONSULTING Seminar Topic: IBM WebSphere Business Integration Sreenivas Angara Solution Architect Mercury Consulting.
Database Systems COMSATS INSTITUTE OF INFORMATION TECHNOLOGY, VEHARI.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 8: Errors, Failures, and Risks Version modified by Cheryl.
Applied Software Project Management Andrew Stellman & Jennifer Greenehttp:// Applied Software Project Management Chapter 1: Introduction.
Faye Business Systems Group presents: The Top 10 Reasons Why CRM Implementations Fail.
CptS 401 Adam Carter Section 4.3.
Information System Security and Control
Chapter 8: Errors, Failures, and Risk
1 Can We Trust the Computer? What Can Go Wrong? Case Study: The Therac-25 Increasing Reliability and Safety Perspectives on Failures, Dependence, Risk,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 8: Errors, Failures, and Risks.
Topics Covered: Data processing and its need Data processing and its need Steps in data processing Steps in data processing Objectives of data processing.
Basic of Software Testing Presented by The Smartpath Information System An ISO 9001:2008 Certified Organization
CptS 401 Adam Carter. Change in schedule  Updated online copy  Tomorrow: read
THE ACT TEST Austin English 11. What’s on the Test?????? in English 1.45 minutes – 75 items 1.Tests you knowledge on: Punctuation USAGE & GrammarMECHANICS.
1 IE 590D Applied Ergonomics Lecture 26 – Ergonomics in Manufacturing & Automation Vincent G. Duffy Associate Prof. School of IE and ABE Thursday April.
Database Terminology Database Terminology. DATA: Data is a collection of raw facts and figures and is represented in alphabets, digits and special characters.
CptS 401 Adam Carter. Question  Which of the following is commonly cited as a benefit to telecommuting? A. Increased productivity B. Higher job satisfaction.
A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 Can We Trust the Computer?
1 Ch. 1: Software Development (Read) 5 Phases of Software Life Cycle: Problem Analysis and Specification Design Implementation (Coding) Testing, Execution.
1 Legacy Code From Feathers, Ch 2 Steve Chenoweth, RHIT Right – Your basic Legacy, from Subaru, starting at $ 20,295, 24 city, 32 highway.
CptS 401 Adam Carter. Last Week (yay!)  Last reading on Wednesday  Will go over the exam on Thursday  Exam & Final paper due on Friday!
Iteration 1 Looping Structures. Iteration 2 The Plan While not everyone understands: 1.Motivate loops 2.For loops 3.While loops 4.Do-while loops 5.Equivalence.
Topic Distributed DBMS Database Management Systems Fall 2012 Presented by: Osama Ben Omran.
New Product planning and Development
Software Engineering Saeed Akhtar The University of Lahore.
CptS 401 Adam Carter. Final Review  Similar structure to the midterm: Multiple choice Matching (probably quotes from Daemon) Essay  Most questions will.
Risk Identification. Hazards and Risk Section 2: ACCIDENT THEORIES 2.1 Single Factor Theories  This theory stems from the assumption that an accident.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
Administrative: “Create New Game” Project Apply the principles of Iterative Design –First run of games in class: March 28 th in class Short document describing:
Knowledge Based Systems ExpertSystems Difficulties in Expert System Development u Scarce resources – new technology – demand for trained personnel u Development.
Topic: Reliability and Integrity. Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence.
Topic 2 Input devices. Topic 2 Input devices Are used to get raw data into the computer so that it can be processed Include common input devices such.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Chapter 8: Errors, Failures, and Risk Zach Archer Daniel O’Hara Eric Strittmatter.
1 Chapter 1- Introduction How Bugs affect our lives What is a Bug? What software testers do?
Can We Trust the Computer? FIRE, Chapter 4. What Can Go Wrong? What are the risks and reasons for computer failures? How much risk must or should we accept?
Input devices.
HARDWARE The hardware is the part you can see the computer, ie all components of their physical structure. The screen, keyboard, and mouse tower of the.
Difficulties in Expert System Development
Input devices.
Numeric Accuracy and Precision
Fail Fail Poor Communication Lack of Documentation Poor Execution.
Systems Design Chapter 6.
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
Reliability and Safety
Implementation of IS strategic plan
Week 13: Errors, Failures, and Risks
In the Senior Design Center
Reliability and Safety
A Gift of Fire Third edition Sara Baase
Presentation transcript:

CptS 401 Adam Carter

Announcement  Executive decision: no class Thursday! (CH and exam review will take place tomorrow instead)  Be sure that you submit a digital copy of your final submissions! Failure to do so may result in a reduced grade

Quiz Question The cause of computer system failures can be attributed to A. Faulty design B. Slow computers C. A & B D. None of the above 3

Answer  A “…faulty design, sloppy implementation, careless or insufficiently trained users, and poor interfaces” (405) 4

Quiz Question The following is not a factor that contributes to the problems that computer databases cause for people: A. A large population B. Automated processing without human intervention C. Inaccurate biometric data D. Errors in data entry E. Lack of accountability for errors 5

Answer: C Several Factors Contribute to Database Problems  A large population (many with similar names)  Automated processing can’t always recognize special cases or doesn’t use common sense  Overconfidence in accuracy of data  Human errors in data entry  Data are not updated or maintained  Humans aren’t accountable for problems (blame it on computer!) 6

Quiz Question In the context of Ch. 8, RSI stands for A. Redundant System Inputs B. Recalibrated System Integrity C. Repetitive Safety Isometrics D. Redundant Safety Information E. None of the above 7

Answer: RSI = Repetitive Strain Injuries (E) (see gray box on p. 411)  Have you experienced pain from using a keyboard or mobile device for extended periods of time? A: Yes B: No 8

Quiz Question A strategy mentioned by the book for making electronic voting machines less vulnerable to fraud and sabotage is A. requiring the machines to be housed in a locked cabinet B. requiring the software they use to be public C. keeping the software they use secret D. All of the above E. None of the above 9

Answer  B (416)  Is having open-source software on voting machines a good idea? 10

Quiz Question The book discusses the failures of complex computer systems at three different airports. What was a common reason all three failed? A. They had not undergone sufficient testing B. They were unable to handle incorrect user input C. They were too complex to work properly D. None of the above 11

Answer  A (419)  The book implies that all three systems were rushed.  Do any of our students from Hong Kong remember the airport incident there? 12

Quiz Question  In the past 10 years, the number of fatal accidents in relation to total flights A. Has gone up B. Has gone down C. Has stayed the same

Answer  B (424)

Discussion  Has anyone in this class been the victim of computer error?

Class Discussion  Do software errors worry you?

Discussion  So far, the Daemon’s plans have executed perfectly. Given what we know about software failure, does this seem likely?

Discussion  The book provides several examples of people placing complete trust on computer results. Is this a positive (good) trend? A. Yes B. No

Discussion  The book mentions that at the time of the writing (2008), 30,000 people have been falsely identified as terrorists. More than likely, this number has gone up.  Given that there are probably significantly less than 30,000 terrorists in the world, do our precautions work?

Discussion  Y2K : Real or hype?