Approved-online-essay-writers

Electric Vehicles Software Systems – IT Computer Science Assignment Help

Assignment Task


Task 

Context And Project Information

A-Plus Writing Help For University Students

Get expert assistance in any academic field. All courses and programs covered.

Get Help Now!

Context: 
Autonomous vehicles are slowly gaining market share. In 2019, there were some 31 million with at least some level of automation in operation worldwide and their number is expected to surpass 54 million in 2024. Correspondingly, the global autonomous car market is projected to grow as well. Although the market shrank by around three percent in 2020 due to the economic slowdown caused by the Covid-19 pandemic, it is forecast that between 2020 and 2023, the market will grow by almost 60 percent.. (See Figures 1A and 1B).  Software capabilities are helping driverless electric cars eliminate many pain points. Even better, software systems can more easily introduce new features to the vehicle. For example, in the future car companies will constantly provide over-the-air software updates for its cars. 


Although there are many advantages of owning an electric car there are also disadvantages.  Provided below are some disadvantages of driverless electric cars that inhibit their adoption:

1. The human factor may never be eliminated from driving.
Even if you owned and operated a self-driving car that could provide you several advantages, you would still need to know how to operate the vehicle in emergency situations. All drivers will likely need to go through an education course to learn how the technology works, how to use it to their advantage, and what it would take to disengage the self-driving mode. Owners will also be required to maintain the vehicle properly to ensure the vehicle remains safe to use.

2. Electric cars place the decisions in the hands of the computer.
There are times when split-second decisions are necessary because of rapidly changing circumstances. What would a driverless car decide to do if it encountered an individual crossing the street who ignored the red signal crossing light? Would it run into that person or decide to take the vehicle off-road, placing the occupants at a higher risk for harm? There are times in our society where we are more comfortable with a human behind the wheel because we have an instinct to find a third alternative that artificial intelligence does not necessarily account for. Until we can program these uncertain use cases into computers, the future of this technology will always be in question.

3. There are security issues to consider with driverless cars.
We already have computers operating numerous facets of the driving experience today that are susceptible to hacking. People can access specific control mechanisms in some makes and models to the extent that the driver loses control over their automobile. This disadvantage would rise to a new level with driverless cars. There would need to be new levels of security installed as a firewall around the vehicle to ensure it would not be used in an inappropriate manner. Although we could program computers to stop potentially violent actions, such as a vehicle attack, there would be a risk that terrorists could program a driverless car to engage in such actions without the permission of the owner.

4.Self-driving cars would collect a lot of personal information.
If you were to use a self-driving car, then the computer would store information about your trip. It could keep records about your destinations, such as the stores you prefer to visit, the restaurants you like, or even how much you’re willing to spend on snacks. This data would be a treasure trove of info that marketers would want to use to create individualized advertising. Unless there are privacy protections in place that would prevent automobile manufacturers from selling this data to third parties, this technology could further erode what few protections are already available.

5. Current technologies may prohibit safe use in challenging weather conditions.
There are times when human drivers would still be required to navigate roads, such as, in poor weather conditions. Snowy roadways where chains are required may not provide enough visual resources for the sensors on the vehicles to operate properly. When there are heavy rains occurring, then serious problems with the laser sensors mounted on the vehicle can occur. That means humans would be responsible for navigating through potentially severe issues, which means there must still be a skill taught for driving even if we fully adapt to this technology.

6. Driverless cars cannot interpret human traffic signals with current technologies.
Our current use of driverless cars operates using a system of cameras, radar, and LIDAR sensors. (See Figure 2) This technology makes it possible for the computers of the vehicle to “see” the environment around them, detect traffic, or stop when it encounters an obstacle. There are times when emergency situations require law enforcement, utility workers, firefighters, or other first responders to direct traffic using hand signals. If a driverless car were to encounter such a situation, then it wouldn’t know what to do.

7. Driverless cars must have access to accurate mapping systems for this technology to be successful.
The success that we currently experience with driverless technologies 


SECTION 1B 
INTRODUCTION:
The good news is your nomination for the ADSS – SVC Subsystem software project manager (PM) has been tentatively accepted by senior management; however, there are a few questions and requests for you to address prior to “officially” being announced by senior management as the PM for the ADSS – SVC Subsystem software project.


QUESTIONS:

1. Develop a “External Context Diagram” (i.e., external interface diagram) for the new ADSS – SVC subsystem.

2. Discuss the meaning and associated benefits of the following terms in your Capabilities-Based Iterative Incremental Integrated (CB3I) lifecycle process development approach: 
a. Capabilities-Based
b. Iterative
c. Incremental
d. Integrated

3. Discuss why the CB3I development approach or similar approaches are often being employed in industry versus the continuance of the highly predictive (e.g., “Waterfall”) process development model.

4. Address the question: Are Agile Development technologies different than Development/Security/Operations, Development/Quality/Operations or CB3I technologies? Please discuss your response from a management perspective.

5. Address the question: Are Agile approaches limited to Development or can these approaches be applied across the entire lifecycle?.

6. Discuss possible differences between the ADSS – SVC system’s architecture, which is based on system hierarchical decomposition (“is a part of”) and the ADSS – SVC software architecture based on (1) system decomposition (“is a part of”), (2) behavior (”is controlled by”) and (3) functional (“is used by”) relationships. 

7. Identify your selection and discuss the seven ADSS – SVC Subsystem innovative driverless electric-vehicle related capabilities you plan to implement that will excite the customer into awarding GIPS the contract.  Please note that these capabilities should address the seven disadvantages of driverless electric cars that inhibit their adoption: Please see Section 1 for a list of disadvantages. 

8. Provide a table that presents each of these innovative capacities and the associated disadvantage associated with driverless electric vehicles discussed in SECTION 1A.

9. What are the differences between requirements and capabilities (features) of the system? Please provide an example. 

10. Provide a table that lists requirements across the top and capabilities down the side like the one presented in class.

11. Please identify each of the requirements to a component in the ADSS – SVC Subsystem.

12. Develop an Architecture Decomposition View (ADV) of the ADSS – SVC Subsystem that includes all new components (if any). Pease see the ADSS – Vehicle Cabin subsystem presented in Figure 5 for an example.

13. Provide a mapping of the new ADSS – SVC Subsystem requirements/capabilities to the ADV elements of the ADSS – SVC Subsystem. 

14. Why is it important to have a one-to-one relationship among requirements and subsystem components?

15. Provide a level-5 Work Breakdown Structure (WBS) for the ADSS – SVC Subsystem software project using the ADV you developed for the ADSS – SVC as an input.

16. Provide one WBS work package for the ADSS – SVC Subsystem software.

17. Discuss how you would collect an estimate of the effort it would take to complete the above WBS work package.

18. Discuss why your professor suggest the “budgeted resources” associated with project risk should be “hidden” in the work packages versus placed in an undistributed budget. 

19. Present your CB3I ADSS-IS Software Process Development Model (i.e., include the 12-MVPs; 3-MCVRs; and NCPR) for the ADSS – SVC Lifecycle.

20. Provide a list of the new capabilities for the proposed ADSS – SVC Subsystem software project that you plan to deliver in each of the three (3) MVCRs.

21. Given an approved PMP occurs on 16 May 2022 and your project can begin work at that time, provide an ADSS-IS lifecycle project Gantt chart including all five lifecycle phases (i.e., development, release, deployment, maintenance, and sustainment).

22. Identify the principal project activities during the ADSS – SVC Release; Deployment; and Operational (Sustainment and Maintenance) phases.

23.Provide the budget estimate for the development of one MVP – please show your work based on the information provided above (e.g., MVP activity schedule, labor types, etc.). 

24. Provide a bottoms-up budget estimate for the development of one MVCR – please show your work, including a list of assumptions.

25. Discuss how you could check this budget estimate using alternative methods.

26. Provide a budget estimate for the development phase (i.e., development of MVCRs 1,2, and 3). 

27. How would you validate your total estimation budget? 

28. Use the COCOMO Model to compare your result for one MVP. Please show your work.

29. On what circumstances and how often should a budget estimate be reviewed on the project?

30. Discuss the statement” “All models are bad, but some models provide useful information”. 

31. What is the purpose of the Project Charter and who signs it?

32. Why is it important for the Program Manager (PM) to document “assumptions”, “constraints”, “budget estimates” etc., in the Project Charter?

33. Are there any assumptions or constraints you would add in addition to the ones listed in Section 1A for the ADSS-IS software project? 

34. Identify one specific ADSS-IS software project success factor of each of the following stakeholders: yourself as the PM; your boss; the vice president of GIPS Engineering Division; the Capital Systems customer; the GIPS configuration control manager and the GIPS CEO.

35. Relative to “risk” which stakeholder, GIPS or Capital Systems, has the highest risk on a fixed-price contract and why?

36. You are keenly aware the Capital Systems (i.e., Advanced Car Automation Simulation Education Division (ACASED)) evaluation team is concerned about the ability of the winner to effectively handle risks.   Please identify three risk items and discuss your mitigation approach to address each of these risks for the ADSS – SVC Subsystem software project

37. Why did the creators of the CMMI place the Risk Management Process Area at CMMI Level 3?

38. Define the following terms: (1) standard, (2) policy, (3) process, (4) method; and (5) procedure.

39. Define the following terms: (1) guideline, (2) project essential requirements; (3) CMMI Generic Practices; (4) risk triggers; and (5) evolutionary rework.  

40. Does the ADSS – SVC Subsystem fit the definition of a “system”? Discuss your response?

41. Name one IEEE Engineering Standard that would be important to software engineers and managers; and discuss why this standard is important to the ADSS – SVC Subsystem software project team.

42. Obtain a copy of above standard and provide a copy (pdf).

43. Discuss what is implied when someone states their project has a “weak” matrix organization?

44. Given you are the PM, discuss why it may be important you have a “strong” matrix organization?

45. Discuss what it means for your project to operate at CMMI 2 in terms of satisfying the goals of the CMMI Planning Process Area. 

46. Why is it important to use a “rolling wave” approach when planning a project?

47. What does the term “Battle Rhythm” mean in terms of developing a network chart for the ADSS IS software project?

48. Provide a network chart for one MVPR in the Development Phase.

49. What does the term “critical path” mean? 

50. For the development phase of the ADSS – SVC Subsystem software effort, either develop the critical path or discuss how you would calculate the critical path.  

51. Discuss your staffing plan for developing the ADSS – SVC Subsystem software project (i.e., staff loading profile) for one MVP. – please show your work based on the information provided above (e.g., MVP activity schedule, labor types, etc.). 

52. What is the Rayleigh Curve and why is its significance to the activities associated with software development?

53. Discuss why the 40-hour rule of thumb developed by Dr. Fairley is important for gathering measurement data from development team members.

54. Discuss the meaning of the “95% complete syndrome”.

55. What is the role of project managers when the basis of estimate of size is provided to them as an estimate of effort for a program? For example, the determination of the “size” of software applications can be a difficult task.  However, “size” is used in most cost estimating models as the principal independent variable in the computations of effort and schedule.  

56. Discuss your measurement plan: (i.e., list some measures (base measures, derived measures, and indicators) you plan to use in each phase (e.g., development, release, deployment, sustainment, and maintenance) based on your information needs of your CB3I lifecycle approach?  

57. What is the principal purpose of measurement? 

58. Provide a control chart using a indicator to inform a project manager on how well an information need associated with product quality is going to be satisfied on the ADSS – SVC Software project.

59. Discuss your documentation plan (i.e., what documents do you plan to produce)?

60. It is often argued that in building User documentation, the User needs to participate in the development of the documentation along with developer because the User has a better operational feel for the use of the software once it is delivered.  Discuss your views with respect to this argument.

61. Software engineers like other types of engineers are not noted for their writing skills.  Given that a significant amount of documentation is often required on a software project, what steps would you take to ensure the documentation is developed on time, within cost and has good quality?

62. Discuss a few aspects of the GIPS software support environment (i.e., tools, methods, processes, etc.) you would leverage for the ADSS – SVC Subsystem software project

63. Discuss the use of private cloud technology for hosting a common ADSS – SVC Subsystem software support environment.

64. How would you define the terms “quality” and “customer product value” as these terms relate to the ADSS – SVC Subsystem software project? Hint: quality is composed of several components, such as, reliability, availability, maintainability, security, etc. and customer product value is often associated with satisfaction of customer strategic goals.

65. Identify some of the principal stakeholders who are responsible for writing the Software Project Management Plan for the ADSS – SVC Subsystem software project and identify some of the plans that may be incorporated directly or by reference into the Software Project Management Plan.

66. Suppose the contract contains a penalty clause of $40,000 per month for a late delivery of the ADSS – SVC project deliverables and assume there is a 50% probability of being late by one month, a 10% probability of being late by two months and a 5% probability of being late by three months.  What is the ADSS– IS Software project manager’s risk exposure?

67. Suppose you could reduce by fifty percent (50%) of a known project debt of $100,000 to a $20,000 project debt by means of an insurance policy that will cost $10,000. What is the risk financial leverage, and would you buy the insurance?  Please provide your rationale. 

68. Given risk is a potential problem, how much risk money would you allocate on your project’s $11M to control and manage risks? Please provide your rationale

69. Discuss why “Earned Value” is important.  Can the value for earned value be negative for this project? 

70. True or false. Organizations using the Earned Value Measurement System (EVMS), (Cost and Schedule Control Systems Criteria (CSCSC)) for reporting information on contracts can use similar (but different) equations if the information is consistently used and can be correctly interpreted. 
 
71. Provide a sample earned value graphic for this effort (please note, I am only interested in representative information (i.e., the shape of the curve and associated labeling of the graph) versus using values from this project.

72. Provide a Table of Contents for the Software PMP for the ADSS – SVC subsystem (i.e., assume that the customer did not specify a format).

73. How would you determine how much effort it would take to prepare the project management plan for the ADSS – SVC Subsystem software project effort?  Provide a rough order of magnitude (ROM) estimate for your project management plan and associated calculations. 

74. Provide a list of concerns that a project manager might have in producing an ADSS – SVC Subsystem Software Project Management Plan.

75. Why is the project management plan important to: (1) the project manager, (2) the customer, (3) upper management and (4) the technical team?

76. Of the four project stakeholders mentioned in the question above, select one of the project stakeholders (i.e.  project manager, customer, upper management, or technical team) that is more interested in (1) effort, (2) dollars, (3) profit, and (4) all three. You cannot repeat any selection.

77. Discuss why a project plan is often cited as both a “living” and “controlling” document.

78. Discuss the term “project stakeholder”.  

79. Define the following laws as they relate to this course: 
a. Law of Diseconomy of Scale
b. Brooks’ Law
c. Ken’s Law
d. Martec’s Law

80. The name of the “First Lady of Software” is Grace M. Hopper.  Why does Dr. Hopper deserve to be famous?  

81. In addition to the essential properties of software described by Dr. Fred Brooks (i.e., complexity, conformity, changeability, and invisibility), the author of your textbook suggests additional factors distinguish software projects from other kinds of engineering projects. For example, “software development is team oriented and an intellectual endeavor”. Discuss your views on how well your team performed on your class project.

82. Pick one of the following technologies that will impact project management and provide a short discussion of its’ potential impact on the field of project management.
a. Business Pipeline
b. Digital Twin
c. Cloud Computing
d. Model Based Development
e. Artificial Intelligence/Machine Learning
f. Advanced Cyber Security
g. Quantum Computing
h. Internet of Things
i. Software Factory

83. Pick one of the following “Motivation Environment” researcher results and provide a short discussion on the contribution of this effort to the project management. 
a. Maslow’s Hierarchy of Needs
b. Douglas McGregor’s: Theory X and Theory Y
c. McClelland’s Theory of Needs
d. Victor Vroom’s Expectancy Theory
e. Frederick Herzberg’s Motivation and Hygiene Factors
f. Myers-Briggs Type Indicator® (MBTI®) – Dimensions of Social Styles

84. What was your informal Myers-Briggs Type Indicator® (MBTI®) test result, and do you concur with the result?

85. Discuss the meaning of term “slack” as it relates to a network path. Assume you have a LST of 30, an EST of 18, and a LFT of 36. What is the total “slack”? Circle the correct answer below (i.e., a, b, c, or d).
a. 12
b. 16
c. 6
d. 4

86. The author of the course text notes that the common “personality types” for a software engineer are “INTJ” and “ISTJ”.  Given the author is correct, discuss why your professor placed emphasis on your reading of project management related materials – especially articles reviewed by editorial boards.


SECTION 2

PROBLEM STATEMENT:
Wow! Based on you and your team’s work on the ADSS-SVC software project, you have been promoted to a new position with more responsibility in the Global International Performance Systems (GIPS) Inc in their Medical Division organization.  You are part of their internal Information Resource Management/Total Quality Management program.  The Medical Division has an on-going set of software intensive projects.  Their intensive software efforts provide support across all Global Health divisions. They use CMMI and EVMS techniques on almost all their projects.  

The Medical Division has just conducted a Software Process Assessment and determined that they have a CMMI Maturity rating of Level 2.  During CMMI maturity level 2 assessments, the Medical Division was striving to produce a product with zero defects and wanted to ensure any processes developed or improved would be effective and efficient across the organization. With the achievement of earning a CMMI maturity level 2 rating, Medical Division’s process capability improvement foundation is well established. Medical Division decided to next work to earn a higher maturity level to have better control and predictability in its processes and projects.

The senior vice-president of Engineering has given you and your process improvement team $500,000 to improve the processes they are using to develop software.  The vice president’s objective is to move the Medical Division organization from CMMI Maturity Level 2 to CMMI Maturity Level 3 within one year.  You have also been provided three additional full-time staff for this improvement opportunity. With the increase, your process improvement team now has a total of six FTE staff members. The total labor force for the Medical Division is 1000 FTE staff members. You will be interfacing with vice presidents of GPIS’ Medical Division. You are currently a Principal Software Engineer (a respected individual technical contributor versus a manager)

QUESTIONS:

1. Do you think, based on what you are being asked to accomplish, your job title as a Principal Software Engineer is appropriate?  If not, why not and what job title would you recommend?

2. Is the Medical Division goal to produce a product with zero defects realistic?  If not, why not? 

3. What is the definition of a defect?

4. How and when would you assess Medical Division products to see if they had defects?

5. Since correction of defects are a significant cost, especially in maintenance and sustainment, some firms have initiatives called “Shift Left” to reduce the number of defects being released into the operational phase.  How does the CBI3 lifecycle process model support the “Shift Left” initiative? 

6. What is the difference between Specific Goals and Practices and Generic Goals and Practices in CMMI-DEV Version 1.3?

7. What is the difference between a Process Area and a Process in CMMI-DEV Version 1.3?

8. Does CMMI-DEV Version 1.3 contain processes?  If not, why not? 

9. Provide an example of the project planning process. 

10. Your senior vice president’s goal to reach CMMI Level 3 in one year does not appear reasonable given most organizations take at least two years. How would you go about educating your senior vice president on how unrealistic this goal is to achieve given you want to keep this job?

11. Discuss your process improvement plan with respect to improving the organization’s assessment maturity level. (Note: The initial phase of the Software Process Assessment ends with a report entitled “Recommendations and Findings”).  The next step is for the Medical Division to develop a Software Engineering/Enterprise Improvement Plan (SIP/EIP) Action Plan which provides a set of actions in priority order to move the corporation to the next level of maturity (i.e., to CMMI Maturity Level 3).  Provide your approach to develop the Medical Division’s SIP/EIP and provide a rough cut of the schedule of activities. You can assume that the major weaknesses that you are going to encounter are in the Process Areas entitled: Requirements Development; Requirements Management; Planning; and Risk Management.

12. List several different ways you might spend the allocated money to improve the progress areas and associated processes.

13. Of the various ways listed in the above response, what percent of the $500,000 would you spend on each? 

14. What does the term “Kaizen” mean and how is the meaning related to “continuous improvement”? Do you agree with the idea of continuous improvement?

15. What is the fundamental purpose and or objectives of the following? Please address five (5) of the items listed below:
a. Commercial industry
b. End User
c. Acquisition Agency
d.Customer
e. Significant Stakeholder
f. Information Need
g. Special Cause of Variation
h. Traversing the Valley of Death
i. IEEE Standard
j. Project Management
k. Project Management Plan
l. Gartner® Magic Quadrant™
m. Common Cause of Variation

16. What does the acronym “GQM” mean and what is the purpose of GQM methodology approach?

17. Discuss the following quote: “It’s not about how to achieve your dreams. It is about how to lead your life.  If you lead your life the right way, the karma will take care of itself.  The dreams will come to you.”  Source: Randy Pauch, Carnegie Mellon University

18. What is the main role of the Chief Financial Officer relative to your project?

19. What is the main role of the Procurement Office relative to your project?

20. What is the main role of the Total Quality Office relative to your project?

21. The following 10 people have made contributions to the field of computer science and/or software engineering.  Which one do you think you would “respect” the most and which one do you think you would “trust” the most? Discuss your results. Note: There is no right answer.
a. Elon Musk
b. Linus Torvalds
c. David Axmark
d. John D. Carmack
e. Ben Goodger
f. Bill Gates
g. Mark Zuckerberg
h. Larry Page
i. Sergey Brin
j. Tim Berners-Lee

22. Discuss each of the four essential properties of software:
a. Complexity
b. Invisibility
c. Conformity
d. Changeability

23. Other people who have contributed to the field of software engineering and computer science are listed below. Please respond to three (3} questions presented below.
a. Who was Watts Humphrey and what area of software engineering did he work?
b. Who was Ada Lovelace and what was her famous contribution?
c. Who was Katherine Johnson and what was her famous contribution?

24. Why is it difficult to successfully manage and lead a large software intensive project?


SECTION  3

1. Find and discuss an article in the literature that is applicable to this course, and you find interesting – Please electronically furnish a copy of the article as part of your response and note the source of the article.  Please limit your response to 100 words or less. Bullet format is acceptable.

2. What is the meaning of the following statement: “A caution for those project managers who are predominantly of type “Judging” per the MBTI test result include: “They tend to confuse the plan with the project?””

3. What is the project management purpose behind the concept of: “Rolling-Wave Planning and Tracking”? 

4. Discuss the importance of using “binary tracking” when applying Earned Value Management. 

5. Discuss the importance of using a “SWOT” technique relative to project risk identification.

6. A software engineering competency model (SWECOM) describes competencies for software engineers who participate in development of and modifications to software-intensive systems. What does the term “competency” mean?  

7. Discuss the following statement “Software is a part of the very fabric of civilization, living in its interstitial spaces — it is not only shaping what we do but also shaping who we are!”. 

8. Provide three differences between the fields of software engineering and a systems engineering. 

9. Do you sense the fields of software engineering and systems engineering need to be more intertwined? Please discuss your response.  

10. What does it mean when someone says, “Software intensive systems are often hardware defined and software enabled”? 

11. Given most current and future systems will be software enabled, do you see the role of the software engineer becoming more important? Please discuss your response.

12. Discuss three important concepts that you have learned in this course.


This IT Computer Science Assignment has been solved by our IT Computer Science Expert at TV Assignment Help. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing Style. Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. 

You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turn tin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Welcome to our Online Essay Writing Agency. Securing higher grades costing your pocket? Order your assignment online at the lowest price now! Our online essay writers are able to provide high-quality assignment help within your deadline. With our homework writing company, you can order essays, term papers, research papers, capstone projects, movie review, presentation, annotated bibliography, reaction paper, research proposal, discussion, or another assignment without having to worry about its originality – we offer 100% original content written completely from scratch

We write papers within your selected deadline. Just share the instructions

PLACE YOUR ORDER