Identify user roles for the application

Assignment Help Operating System
Reference no: EM132838207 , Length: 2000 words

PREPARATION FOR THE ASSESSMENT

You are required to use the scenario to do the following:

a) Read through the CASE STUDY
b) Identify stakeholders and categorise them as primary, secondary, tertiary or facilitating
c) Build a power/interest matrix and decide how you will communicate with stakeholders during the project
d) Identify User Roles for the application and consolidate them
e) Choose 2 important user roles and create a persona for each one.
f) Create a low-fidelity prototype
g) Create a set of user stories using the user roles and low-fidelity prototype to help you. Check your user stories with INVEST
h) Create acceptance tests for 10 of your user stories
i) Estimate all of your stories using story points, prioritise them and identify the MVP
j) Create a release plan
k) Reflect on the strengths and weaknesses of the agile approach to requirements gathering and planning

Submit a 2,000-word REPORT with the following 4 sections.
1) Stakeholder analysis
a) Stakeholder identification
List stakeholder groups for the scenario, stratified into four categories: primary, secondary, tertiary, and facilitating.
About 100 words
b) Communication plan
Present a power/interest matrix for the stakeholder groups identified above.
Describe how you will communicate with the different stakeholder groups during the project.
About 200 words
c) Stakeholder discussion
Explain why it is important to identify and engage with a wide range of stakeholder during IT projects,
including a discussion about how IT projects need to deliver business value.
Justify the approach you have taken to stakeholder communication. About 250 words
2) User analysis
d) User roles Present a consolidated list of user roles (you can do this as a list or a diagram)
Briefly describe each of the user roles
About 150 words
e) Personas
Present two personas based on two of the user roles you think are the most important.
About 200 words
f) Low-fidelity prototype
Present a low-fidelity prototype to identify key features that each of the user roles might need.
About 200 words

3) User Stories
g) User stories
Present an initial set of user stories for the application listed in priority order.
For ONE of your user stories explain how it is independent, negotiable, valuable to customers or users,
estimable, small, and testable.
About 200 words
h) Acceptance tests
Present the acceptance tests for 10 or your user stories.
About 20 words
4) Planning
i) Estimate and plan
Present comparative story point estimates for your stories and an indicative release plan, including an
indication of the MVP.
About 200 words
j) Reflection
Discuss the strengths and weaknesses of the agile approach to requirements gathering and planning.
About 300 words
5) References
List the references that you have cited in the text. See the REFERENCE GUIDE (attached)

CASE STUDY - Lauretti's Leather Belts Web and Mobile Order Handling Service

Attachment:- Assignment.rar

Reference no: EM132838207

Questions Cloud

What is the value of the shareholder equity account for firm : What is the value of the shareholders' equity account for this firm? Alesha, Inc., has current asset of $6,000, net fixed assets of $25,100, current liabilities
Define your suggestion to improve us health care system : What would your suggestion be to improve this pathetic image of the US health care system? I would be interested in hearing your thoughts.
External forces affect nursing and health care organizations : What external forces affect nursing and health care organizations? How does the external environment affect strategic management in the health care industry?
Compute the closing account balances of each of raw material : Compute the closing account balances of each of the three inventory accounts: Raw Materials, Work in Process, and Finished Goods.
Identify user roles for the application : Identify User Roles for the application and consolidate them and Identify stakeholders and categorise them as primary, secondary, tertiary or facilitating
Distinguish between the different types of competition : Distinguish between the different types of competition? Which is the most/least worrisome? Why?
Key elements of successful employee evaluation process : What are the key elements of a successful employee evaluation process? How should a manager prepare for the event?
What is the project npv : What is the project's NPV, IRR, MIRR, PI, playback period & discounted payback period
How good of a deal is Vinny offering : The YTM on these bonds is 7.8% (use semiannual compounding). How good of a deal is Vinny offering you for his bond portfolio

Reviews

len2838207

3/23/2021 11:55:27 PM

Submit a well-written, spell-checked, and grammar-checked report that meets the brief instructions and includes relevant references using Harvard or numbered formatting. The assignment will go through.

Write a Review

Operating System Questions & Answers

  What is the purpose of system programs

What is the purpose of system calls and what are the major activities of an operating system with regard to process management - What is the purpose of system programs

  A borg unimatrix has 40-bit virtual addresses

A Borg Unimatrix has 40-bit virtual addresses and 32-bit physical addresses. Pages are 32 KB in size. How many entries are needed for the page table? Give all formulas, steps, and compute out the final number as an integer(in humanly readable deci..

  Identify various hardware components and network topologies

VaryNet Corporation wishes to create 4-individual offices across the globe. They wish to be able to connect these offices over the internet, and they want to make sure that each network is available to each other,

  Characterize page fault rate-process first start execution

When a process first start execution, how would you characterize the page fault rate? Once the working set for a process is loaded into memory, how would you characterize the page fault rate?

  Question 1a give three technical merits of unixb

question 1a give three technical merits of unix.b differentiate between clustered systems and real-time systems.c

  Discuss five computer forensics tools

Use Library and internet resources to analyze five computer forensics tools. For each tool, list the vendor and its functions.

  Security monitoring activities in it

Discuss and explain the security monitoring activities that should be conducted in an company with both internal IT and e commerce applications.

  Saving the customer user accounts

A local beauty corporation has implemented a website to boost sales and awareness of products they manufacture. The website will contain data about the firm and all products available.

  Write a page fault handler process that can be invoked

Write a page fault handler process that can be invoked by the interrupt dispatcher when a page fault occurs. The address space and page number of the missing page are made available to the fault handler by the addressing hardware.

  Article and your own research

Using the above article and your own research, write a 3- to 5-page paper comparing 3-4 of the operating systems you find in the readings and other materials from your research. Compare both technical and non-technical features and explain what you b..

  Write a pseudo-code program

Create 10 child processes and each child process will in turn create a grandchild process.

  Determine the types of operating systems

ITS1101: Research types of operating systems that are currently available and provide a scenario in which the operating system you chose.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd