Identify user roles for the application

Assignment Help Operating System
Reference no: EM132838207 , Length: 2000 words

PREPARATION FOR THE ASSESSMENT

You are required to use the scenario to do the following:

a) Read through the CASE STUDY
b) Identify stakeholders and categorise them as primary, secondary, tertiary or facilitating
c) Build a power/interest matrix and decide how you will communicate with stakeholders during the project
d) Identify User Roles for the application and consolidate them
e) Choose 2 important user roles and create a persona for each one.
f) Create a low-fidelity prototype
g) Create a set of user stories using the user roles and low-fidelity prototype to help you. Check your user stories with INVEST
h) Create acceptance tests for 10 of your user stories
i) Estimate all of your stories using story points, prioritise them and identify the MVP
j) Create a release plan
k) Reflect on the strengths and weaknesses of the agile approach to requirements gathering and planning

Submit a 2,000-word REPORT with the following 4 sections.
1) Stakeholder analysis
a) Stakeholder identification
List stakeholder groups for the scenario, stratified into four categories: primary, secondary, tertiary, and facilitating.
About 100 words
b) Communication plan
Present a power/interest matrix for the stakeholder groups identified above.
Describe how you will communicate with the different stakeholder groups during the project.
About 200 words
c) Stakeholder discussion
Explain why it is important to identify and engage with a wide range of stakeholder during IT projects,
including a discussion about how IT projects need to deliver business value.
Justify the approach you have taken to stakeholder communication. About 250 words
2) User analysis
d) User roles Present a consolidated list of user roles (you can do this as a list or a diagram)
Briefly describe each of the user roles
About 150 words
e) Personas
Present two personas based on two of the user roles you think are the most important.
About 200 words
f) Low-fidelity prototype
Present a low-fidelity prototype to identify key features that each of the user roles might need.
About 200 words

3) User Stories
g) User stories
Present an initial set of user stories for the application listed in priority order.
For ONE of your user stories explain how it is independent, negotiable, valuable to customers or users,
estimable, small, and testable.
About 200 words
h) Acceptance tests
Present the acceptance tests for 10 or your user stories.
About 20 words
4) Planning
i) Estimate and plan
Present comparative story point estimates for your stories and an indicative release plan, including an
indication of the MVP.
About 200 words
j) Reflection
Discuss the strengths and weaknesses of the agile approach to requirements gathering and planning.
About 300 words
5) References
List the references that you have cited in the text. See the REFERENCE GUIDE (attached)

CASE STUDY - Lauretti's Leather Belts Web and Mobile Order Handling Service

Attachment:- Assignment.rar

Reference no: EM132838207

Questions Cloud

What is the value of the shareholder equity account for firm : What is the value of the shareholders' equity account for this firm? Alesha, Inc., has current asset of $6,000, net fixed assets of $25,100, current liabilities
Define your suggestion to improve us health care system : What would your suggestion be to improve this pathetic image of the US health care system? I would be interested in hearing your thoughts.
External forces affect nursing and health care organizations : What external forces affect nursing and health care organizations? How does the external environment affect strategic management in the health care industry?
Compute the closing account balances of each of raw material : Compute the closing account balances of each of the three inventory accounts: Raw Materials, Work in Process, and Finished Goods.
Identify user roles for the application : Identify User Roles for the application and consolidate them and Identify stakeholders and categorise them as primary, secondary, tertiary or facilitating
Distinguish between the different types of competition : Distinguish between the different types of competition? Which is the most/least worrisome? Why?
Key elements of successful employee evaluation process : What are the key elements of a successful employee evaluation process? How should a manager prepare for the event?
What is the project npv : What is the project's NPV, IRR, MIRR, PI, playback period & discounted payback period
How good of a deal is Vinny offering : The YTM on these bonds is 7.8% (use semiannual compounding). How good of a deal is Vinny offering you for his bond portfolio

Reviews

len2838207

3/23/2021 11:55:27 PM

Submit a well-written, spell-checked, and grammar-checked report that meets the brief instructions and includes relevant references using Harvard or numbered formatting. The assignment will go through.

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd