Who are the intended users and stakeholders

Assignment Help Computer Engineering
Reference no: EM131290739

Systems anlysis

You have been selected to elicit requirements; design; and formulate testing, development, and implementation plans for a software application or system of your choosing. Throughout this course, you will be developing components of the overall specification document that will culminate in the final Key Assignment. Additional information and the deliverables for each Individual Project will be provided in the assignment description for this project.

Project Selection

The first step will be to select an application or a system as the target for developing a comprehensive System Requirements, Design, and Implementation Specification that will have sections from requirements, analysis, high-level, and detail models as well as design, development strategy, testing strategy, and an implementation plan. This project will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:

• Nontrivial: The selected software application or system should be a scope that is not too large to develop all of the requirements in a 5.5-week period. A few examples of possible projects include, but are not limited to, the following:

o An ordering system (such as pizza)
o An inventory control system (for a small number of parts)
o A labor tracking or time-card system (for a small company)
o An online appointment request system
o An employee emergency contact system

• Domain knowledge: Students should be familiar enough with the application or system to allow focus on their specification documentation.

Select an enterprise that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.

Assignment

For the assignments in this course, you will be developing an all-inclusive System Requirements, Design, and Implementation Specification. Your first task in this process will be to select an application or system to use as the basis of your projects. You will also create the shell document for the final Key Assignment project deliverable that you will be working on during each Unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project. Appropriate research should be conducted to support the analysis in your report, and assumptions may be made when necessary.

The project deliverables are as follows:

• Submit your project proposal to your instructor for approval.
• System Requirements, Design, and Implementation Specification

o Use Word
o Title page

- Course number and name
- Project name
- Your name
- Date

o Table of Contents (TOC)

- Use an autogenerated TOC.
- This should be on a separate page.
- This should be a maximum of 3 levels deep.
- Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.

o Section Headings (create each heading on a new page with "TBD" as content, except for Week 1)

- System or Application Overview
- Requirements Specification
- System or Application Design
- Test and Quality Assurance Plan
- Development Strategy
- Integration and Deployment Plan

• System or Application Overview

o Provide a brief description of the system or application's capabilities.
o Who are the intended users and stakeholders?
o Who is the project initiator or sponsor?
o Be sure that this project is approved by the instructor before you proceed.

• Requirements Specification

o Include the overall goals and objectives of the application or system.
o Include elicitation methods that are used to gather requirements.
o Describe functional requirements.

- Include a short description of the function being supported, a detailed description of the requirements, and how they will be measured during testing.

o Describe the nonfunctional requirements, also known as attributes of the system addressing areas such as usability, security, and performance.

- Include a short description of attribute category, a detailed description of the requirements, and how they will be measured during testing.

o Include assumptions and constraints to frame the scope of the project.

Reference no: EM131290739

Questions Cloud

The criteria for your ideas of a best practice : Class, What are some important aspects of best practices and what is the criteria for your ideas of a best practice?
What are the basic modules of a c program called : What are the basic modules of a C program called? What is a syntax error? Give an example of one from English and one from C. What is a semantic error? Give an example of one from English and one from C.
State and explain two reasons why firms hedge : A major bread maker is planning to purchase wheat in the near future. Identify and explain the appropriate hedging strategy ? Explain how the implied repo rate on a spread transaction differs from that on a nearby futures contract
Furniture design and manufacturing company : One of your best friends is asking you for advice. She is starting a furniture design and manufacturing company. She wants to know if she should outsource manufacturing of her furniture to Asia, outsource manufacturing to Canada, or keep manufactu..
Who are the intended users and stakeholders : Provide a brief description of the system or application's capabilities. Who are the intended users and stakeholders? Who is the project initiator or sponsor?
Calculate the profit from a hedge : Determine the original basis. Then calculate the profit from a hedge if it is held to expiration and the basis converges to zero. Show how the profit is explained by movements in the basis alone.
Furniture design and manufacturing company : One of your best friends is asking you for advice. She is starting a furniture design and manufacturing company. She wants to know if she should outsource manufacturing of her furniture to Asia, outsource manufacturing to Canada, or keep manufactu..
Responsible for preventing child labor : Children are especially vulnerable to unsafe working conditions. To what extent should a company be responsible for preventing child labor? What is the difference between sweatshop labor and human trafficking? Are there any arguments to be made fo..
Determine whether to buy or sell futures when hedging : What is the price sensitivity hedge ratio? How are the price sensitivity and minimum variance hedge ratios alike? How do they differ?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd