Information Technology Reference
In-Depth Information
possible attack data, and the consequences of an attack may
be too devastating to ensure a reasonable response after the
attack is completed.
Opponents of a launchonwarning policy point to the poten
tial for error in a response and the consequences of respond
ing incorrectly.
a. Review this launchonwarning approach in light of the
known capabilities and limitations of computer systems.
(You may need to do some additional reading to research
both the launchonwarning strategy and its possible
defects. One Web site to check out is maintained by
CPSR—Computer Professionals for Social Responsibility—
at http://www.cpsr.org.)
b. Take a stand on this policy, either for or against, and write
a strong argument supporting your conclusion.
6. Suppose your task were to catalog and organize all the topics
in a library. Consider the extent to which either the Dewey
Decimal system or the Library of Congress classification sys
tem reflects a topdown methodology, with stepwise refine
ment. (If you are not familiar with either of these systems, this
might be a good time to consult a librarian!)
7. For many schools, the goal is to provide a solid overall edu
cation. To accomplish this, schools often have various gen
eraleducation requirements as well as requirements for vari
ous majors. Discuss how this framework of requirements fits
within a topdown methodology to satisfy the overall goal(s)
of the school.
Exercises
1. Consider the words and phrases from the “Terminology from
This Chapter.”
a. Some words and phrases identify types of software, some
relate to elements or techniques within the problemsolving
process, and some involve separate ideas. Organize each of
these terms under the headings “software types,” “problem
solving,” and others. In each case, explain your categoriza
tion.
b. Provide careful definitions for each word or phrase.
Search WWH ::




Custom Search