COS10009 Introduction to Programming : Software Development

Industry Practice Guest Lecturer Report

Write a 1–2-page report on each presentation (each guest lecture). Write the report on each of the lectures separately covering the tools and techniques discussed in the lectures and if the unit learning outcomes were met for each lecture and how each unit learning outcomes are met. Some discussion questions for each lecture would be provided which should be discussed briefly in your report (DON’T just answer the questions, discuss how those points are covered in the lecture, see the samples for better understanding). The unit learning outcomes are also given below for you to look at. There is also a sample format given for your understanding. Also below are some examples of a HD and D level report from previous semesters. Note that these sample reports are for single guest lectures. You will be
completing ONE report for each guest lectures.

Note: Each report should be written separately showing clear titles which lecture it is covering with no more than 2 pages for each lecture.

1. Describe the activities in software deployment and apply these in a problem context. (K3, K4,S1, A1, A2)

2. Apply knowledge of software environments to plan development and deployment. (K3, K6, S1)

3. Describe and classify issues that drive software maintenance. (K1, K2, K3, K6, A1, A4)

4. Describe latest practices in software development deployment and evolution. (K1, K2, K4, K5, K6, S1, A1, A2, A4)

5. Draw on industry practice to evaluate the maintainability and design consistency of a software system. (K4, K5, A4)

Discussion Questions

1. Where has Scott Clements worked and what other things has he done?

2. What is MST and what happens at TConf?

3. What do the abbreviations CD, CI-CD stand for?

4. Why is Continuous Delivery good (industry view)?

5. What is the cycle of operations in CI?

6. What are the four levels of DevOps maturity?

7. What are the advantages of micro-services and what are they?

8. Explain Blue-Green deployment briefly.

9. What is Behavioural-Driven Development?

10. How is code refactoring and how is it relevant to software testing?

11. What tools are suggested for CI?

12. What tools are used for CD?

13. Why is containerisation useful for and why is cloud deployment useful?

14. What tools and services assist in monitoring software use?

Lecture 2

1. Where has Matt worked and what other things has he done?

2. What are his projects on Github?

3. What is a “High Functioning Company”?

4. What is the process of publishing code?

5. What Can go wrong with building binaries on your computer?

6. What are the benefits of using a build server?

7. What are the benefits of CI?

8. What are the CI principles (according to Martin Fowler)?

9. How are L.E.A.N. manufacturing principles interpreted for Continuous Delivery?

10. What are the CI principles (according to continuousdelivery.com)?

11. What are the “The Three Ways” in terms of software development?

12. How is DevSecOps different to DevOps testing?

13. What aspects of DevOps are implemented by Octopus Deploy?

Lecture 3

1. Give examples of industries/pursuits that don’t scale. Why not?

2. How does software capture knowledge?

3. Why do more programmers not make software development faster?

4. What is the anomaly of cheap software complexity?

5. What are the competing expectations of sales/marketing compared to customers and DevOps?

6. What is the “network effect”? How does it affect software quality?

7. How does “reconciliation” ensure software quality?

8. Why does OpEx encourage low software quality?

Lecture 4

1. How will the approach taken to writing software change is a software developer expects to maintain the same software for 10 years?

2. How does the amount of “stuff” deployed influence the amount of attacks?

3. What is meant by “dual-use” in software engineering and security?

4. Why was the internet not designed for security?

5. Why do Terms of Service / End User Licence Agreements fail to inform users of legal liabilities?

6. Discuss how hackers could use multiple compromised computers to build a malware distribution system.

7. Compare APT and DoS attacks.

8. What does a ‘money mule’ do and how are they involved in cybercrime?

9. Discuss the types of Crimeware and Crimeware systems.

10. How do governments help increase Cybercrime?

Reference no: EM132069492

WhatsApp
Hello! Need help with your assignments? We are here

GRAB 25% OFF YOUR ORDERS TODAY

X