Topic 3 Flashcards
(26 cards)
The hardware might malfunction, causing erroneous results.
Hardware Errors
Sometimes called bugs.
Are mistakes in either the programming or the design of the software.
Software Errors
Two most important ways a computer might fail to meet
expectations
- Hardware Errors
- Software Errors
involves attempting to use a
computer for the wrong purpose or using one incorrectly for the right
purpose.
Misuse
Software often interacts with humans. Sometimes the person who is prompted for some action misunderstands what is being asked.
Communication Failure
Has been growing more prevalent. In some cases it is simply a form of vandalism.
Malice
It is a software that may affect someone’s safety if it fails to work properly. This category usually includes software that could potentially harm the environment, as that would presumably indirectly harm humans.
Safety-Critical Software
The most obvious approach to making sure a program has no bugs
Testing
Is a place in computer code where the next instruction executed depends on input data.
Decision Point
Programs that control some sort of machinery.
Control Program
Means that the program must do something within a specific
amount of time.
Real Time
Is used to refer to programs that execute at the same time
as one or more other programs.
Multiprocess
Developing any commercial software system, and particularly safety critical software systems, involves multiple-tasks, which are usually performed by many different people.
The Software Development Process
Literally what is required of the software.
Requirements
For large projects, specialists called ”_________________________” interview clients to determine exactly what the system needs to do to best serve the clients.
Requirements Engineers
Once the requirements of a system are established, designers develop the particular set of component
program modules, or subprograms of the software system.
Specification and Design
Programmers then use the design to create code in an appropriate programming language.
Implementation
He is a well known applied ethicist and author from Shippensburg University who analyzed the moral responsibilities of some key people in the Therac-25 case.
Professor Douglas Birsch
Is short for “malicious software”. It can take many forms. The most prevalent types are
Malware
- Worm
- Virus
- Spyware
- Trojan Horse
- Rootkit
A program that makes copies of itself and propagates those copies through a network to infect other computers.
Worm
Malware that is similar to a worm, but which resides in another program. That program must execute in order for the virus to propagate itself.
Virus
A computer program that is secretly installed for the purpose of collecting information about the computer’s user or users.
Spyware
A piece of software that masquerades as an innocent, and perhaps useful, program,
but that is actually designed for a malicious purpose.
Trojan Horse
A program that embeds itself into a computer’s operating system and acquires special
privileges that would normally be available to the operating system.
Rootkit