Requirements and scope document for development

Assignment Help Basic Computer Science
Reference no: EM131514185

Assignment Overview

The software architecture process incorporates many steps. For this assignment, you will consider scope and stakeholders. Read the following Fantasy Games scenario so that you can apply this step of the process to this scenario.

Fantasy Games Scenario

Your consulting company has been hired by the CIO to design the software architecture for Fantasy Games. The company is adding a new game titled Asteroids to its catalog and intends to build a multiplayer environment for this new game. An entirely new subcomponent needs to be added to their existing Web community in order to support this game, and you are to create a software architecture proposal for this new subsystem. As part of your proposal, you have been asked to develop a single-player, working prototype of the game itself.

The Fantasy Games community currently has 1.2 million users, and they expect that user activity will grow tremendously with the addition of this new environment. Your design must be flexible enough to accommodate the current number of users plus all anticipated and unanticipated future growth.

The Asteroids Web component, or subsystem, for this game should include many of the same features found on other popular online gaming sites such as chat, instant messaging, user-rank functionality, and high-score display. Although Fantasy Games currently has a few other multiplayer games available within their overall community, they would like this project to set the new standards for how similar subsystems will be added in the future.

Assignment Preparation

For this assignment, you will need to consider these four Fantasy Games stakeholders:

  • An avid online gamer.
  • The Vice President of Operations.
  • The Lead Software Developer.
  • The Lead Software Architect.

Consider what type of questions and facts you would ask of these stakeholders when developing the scope of the project. It will be up to you to develop all the Fantasy Games user requirements, business needs, facts, and assumptions to drive your architecture design. This assignment will include writing and using Visio to create a UML Use Case diagram.

In order to prepare for your assignment, view the following media pieces linked in the Resources.

  • Project Stakeholders.
  • Conversation About Goals.
  • Conversation about Constraints and Scope.

Assignment Instructions

Once you complete your preparation, create a 3-4 page professional paper in which you complete the following:

In this assignment, you will create a Requirements and Scope document for this development. Complete the following:

  1. Determine the types of questions you would need to ask the stakeholders.
  2. Determine the architectural scope of the project.
  3. Create a UML use case diagram of the project that presents a high-level picture of the system's boundaries and adjacent external entities. Use Visio to complete this diagram.
  4. Determine constraints on the project.
  5. Determine the team necessary to work on this project and clarify the roles of each team member.

Reference no: EM131514185

Questions Cloud

Evaluation of the technologies and techniques : Provide a summary on analysis and planning for the evaluation of the technologies and techniques examined for protection of client data in transit.
How would the main character go about solving the crime : How would the main character go about solving the crime and identifying the perpetrator using the tools you've learned about?
Identify what tool could be used and give an example : In the cells identify what tool could be used and give an example from the labs, videos, or readings of how to use the tool.
What edition of windows will be used for each server : What edition of Windows will be used for each server (e.g., Standard, Datacenter)? Will Server Core be used on any servers? Where are each of servers located?
Requirements and scope document for development : In this assignment, you will create a Requirements and Scope document for this development. Complete the following:
Progression of an infection to bacteraemia : Progression of an infection to bacteraemia in immuno-suppressed mice - Write a scientific report using the correct conventions
Create presentations using cascading style sheets and dhtml : Create presentations using Cascading Style Sheets and DHTML. Summarize Web standards in terms of specifications, guidelines, software, and tools.
How you intend to use technology to complete the project : A written outline of how you intend to use technology and why you chose that particular technology to complete the project
Disaster recovery-forensics-security : How much testing of your Disaster Recovery Plan is necessary? How often should it be done? How deep should the test be? Why?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Program that keeps track of the feeding of zoo animals

The program feed-animal should consume a structure that represents an animal and the name of a feeding time. It should switch the corresponding field in the animal structure to true.

  Can this segment be mistaken by alice''s computer

initiating a SYN + ACK segment from Bob. Can this segment be mistaken by Alice's computer as the response to the new SYN segment? Explain.

  Explain the principle of comparative advantage

Explain the principle of comparative advantage

  Using 2''s complement binary arithmetic

Write a program in MIPS assembly that would ask user for number of Fibonaci numbers to be generated and will store it in $s0. The program will push that many number of Fibbonacci sequence into stack. Include complete program.

  Development of critical thinking

There is one individual assignment. As all items, it is graded based on the development of critical thinking, analysis, and support for points. You are to prepare a brief paper, but recommended length is about two - three single-spaced (four to si..

  You can''t keep a woman down

Read "You Can't Keep a Woman Down" by Alice Walker and write a paragraph summary. Talk about and explain the overall theme.

  Calculate the economic feasibility of make or buy

Should the probability of defects change if we produce 18,000 units as opposed to 10,000 units?

  Design an asymmetric encryption protocol

Again based on 1 above, is it possible to continue operating a sensor network with a selected number of sensors taken out? Is it possible to identify those nodes?

  Planning documents

Describe the respective roles of top management and middle managers in the development of each of the following planning documents:the strategic plan - annual report - major project proposal - due diligence review.

  Write a recursive function named summer

Write a recursive function named summer that takes two parameters - an array of doubles and the size of the array - and returns the sum of the values in the array.  The size parameter does not have to be the actual size of the array.  It will be at t..

  What can you do to reduce the risk of laptop theft

List and describe the three fundamental ways that data can be intercepted. How does a physcial security program protect against each of these data interception methods?

  Define a class set that uses a dictionary

Suppose that we want to implement the ADT set. Recall from Project 1 of Chapter 1 that a set is an unordered collection of objects where duplicates are not allowed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd