Question Home

Position:Home>Philosophy> Would efforts like Collins submarine computerization typically possess these sor


Question:1/"Generally there is a transparent logging algorithm to catch anyone manipulating the figures in the software."

2/"People can mess with the software.
But important/secure use software (such as banking software) is often checked by independant programmers and companies."
4 minutes ago - 3 days left to answer.
Additional Details
1 minute ago

3/"After the code is written for each module part of the review process of any complex system is a walk-through of the code for each module with several other programmers who critique the code, line by line, and attempt to find bugs and sloppy code that needs to be corrected before it goes to the next step of quality assurance, where it is tested against a complex set of tests, sometimes called alpha testing. Any unauthorized code would be caught in a walk-through.

If it is internet software, it might also have beta testing where you invite users to test your code.


Best Answer - Chosen by Asker: 1/"Generally there is a transparent logging algorithm to catch anyone manipulating the figures in the software."

2/"People can mess with the software.
But important/secure use software (such as banking software) is often checked by independant programmers and companies."
4 minutes ago - 3 days left to answer.
Additional Details
1 minute ago

3/"After the code is written for each module part of the review process of any complex system is a walk-through of the code for each module with several other programmers who critique the code, line by line, and attempt to find bugs and sloppy code that needs to be corrected before it goes to the next step of quality assurance, where it is tested against a complex set of tests, sometimes called alpha testing. Any unauthorized code would be caught in a walk-through.

If it is internet software, it might also have beta testing where you invite users to test your code.

Definately. Military devices contain generally 3 backups. Thats just for hardware, software would undergo rigorous testing, similar to what you find for medical software. A heart valve monitor can kill a patient. Similarly your sonar equipment failing to blip the oncomming sea mines is a certain death sentance.

Why would you want to know this?