Chapter 7 Requirements Engineering. Software Engineering: A Practitioner s Approach, 6th edition by Roger S. Pressman

Size: px
Start display at page:

Download "Chapter 7 Requirements Engineering. Software Engineering: A Practitioner s Approach, 6th edition by Roger S. Pressman"

Transcription

1 Chapter 7 Requirements Engineering Software Engineering: A Practitioner s Approach, 6th edition by Roger S. Pressman 1

2 What is requirement engineering? Requirement engineering helps software engineers to better understand the problem they will work to solve. It encompasses the set of tasks that lead to an understanding of what the business impact of the software will be, what the customer wants, and how end users will interact with the software. 2

3 Why is it important? Designing and building an elegant computer program that solves the wrong problem serves no one s needs. That s why it is important to understand what the customer wants before you begin to design and build a computer based system. 3

4 What are the steps? 1 Requirements engineering begins with inception: A task that defines the scope and nature of the problem to be solved. It moves onward to elicitation A task that helps the customer to define what is required, and them elaboration Where basic requirements are refined and modified. As the customer defines the problem, negotiation occurs 4

5 What are the steps? 2 What are the priorities, what is essential, when is it required? Finally, the problem is specified in some manner and then reviewed or validated to ensure that your understanding of the problem and the customers understanding of the problem coincide. 5

6 Requirements Engineering Inception Establish a basic understanding of the problem and the nature of the solution. Elicitation Draw out the requirements from stakeholders. Elaboration Create an analysis model that represents information, functional, and behavioral aspects of the requirements. Negotiation Agree on a deliverable system that is realistic for developers and customers. Specification Describe the requirements formally or informally. Validation Review the requirement specification for errors, ambiguities, omissions, and conflicts. Requirements management Manage changing requirements. 6

7 Inception Ask context free questions Who is behind the request for this work? Who will use the solution (product/system)? What will be the economic benefits? How would you characterize good output from the system? What problems does this solution address? What environment will the product be used in? Are you the right person to answer these questions? Are these question relevant? Can anyone else provide additional information? Should I be asking you anything else? 7

8 Getting Requirements Right The hardest single part of building a software system is deciding what to build. No part of the work so cripples the resulting system if done wrong. No other part is more difficult to rectify later. Fred Brooks The seeds of major software disasters are usually sown within the first three months of commencing the software project. Capers Jones We spend a lot of time the majority of project effort not implementing or testing, but trying to decide what to build. Brian Lawrence 8

9 Eliciting Requirements Why is it so difficult to clearly understand what the customer wants? Scope The boundary of the system is ill defined. Customers/users specify unnecessary technical detail that may confuse rather than clarify objectives. Understanding Customers are not completely sure of what is needed. Customers have a poor understanding of the capabilities and limitations of the computing environment. Customers don t have a full understanding of their problem domain. Customers have trouble communicating needs to the system engineer. Customers omit detail that is believed to be obvious. Customers specify requirements that conflict with other requirements. Customers specify requirements that are ambiguous or untestable. Volatility Requirements change over time. 9

10 Collaborative Requirements Gathering Meetings are attended by all interested stakeholders. Rules established for preparation and participation. Agenda should be formal enough to cover all important points, but informal enough to encourage the free flow of ideas. A facilitator controls the meeting. A definition mechanism (blackboard, flip charts, etc.) is used. During the meeting: The problem is identified. Elements of the solution are proposed. Different approaches are negotiated. A preliminary set of solution requirements are obtained. The atmosphere is collaborative and non threatening. 10

11 Quality Function Deployment Function deployment determines the value (to the customer) of each function required of the system. Information deployment identifies data objects and events. Task deployment examines the behavior of the system. Value analysis determines the priority of requirements. 11

12 Elicitation Work Products Statement of need and feasibility. Statement of scope. List of participants in requirements elicitation. Description of the system s technical environment. List of requirements and associated domain constraints. List of usage scenarios. Any prototypes developed to refine requirements. 12

13 Use Cases A use case scenario is a story about how someone or something external to the software (known as an actor) interacts with the system. Each scenario answers the following questions: Who is the primary actor, the secondary actor(s)? What are the actor s goals? What preconditions should exist before the story begins? What main tasks or functions are performed by the actor? What exceptions might be considered as the story is described? What variations in the actor s interaction are possible? What system information will the actor acquire, produce, or change? Will the actor have to inform the system about changes in the external environment? What information does the actor desire from the system? Does the actor wish to be informed about unexpected changes? 13

14 Elements of the Analysis Model Scenario based elements Use case How external actors interact with the system (use case diagrams; detailed templates) Functional How software functions are processed in the system (flow charts; activity diagrams) Class based elements The various system objects (obtained from scenarios) including their attributes and functions (class diagram) Behavioral elements How the system behaves in response to different events (state diagram) Flow oriented elements How information is transformed as if flows through the system (data flow diagram) 14

15 Use Case Diagram 15

16 Activity Diagram for RE 16

17 Class Diagram 17

18 State Diagram 18

19 Analysis Patterns Pattern name: Captures the essence of the pattern. Intent: What the pattern accomplishes or represents. Motivation: A scenario that illustrates how the pattern solves a problem. Forces and context: External issues (forces) that affect how the pattern is used, and external issues resolved when the pattern is applied. Solution: How the pattern is applied to solve the problem; emphasizes structural and behavioral issues. Consequences: What happens when the pattern is applied; what trade-offs exist during its application. Design: How the pattern can be achieved via known design patterns. Known uses: Examples of uses within actual systems. Related patterns: Patterns related to the named pattern because (1) they are commonly used with the named pattern; (2) they are structurally similar to the named pattern; (3) they are a variation of the named pattern. 19

20 Negotiating Requirements Identify the key stakeholders These are the people who will be involved in the negotiation Determine each of the stakeholders win conditions Win conditions are not always obvious Negotiate Work toward a set of requirements that lead to win win 20

21 Validating Requirements Is each requirement consistent with the objective of the system? Have all requirements been specified at the proper level of abstraction? Is the requirement really necessary? Is each requirement bounded and unambiguous? Does each requirement have attribution? Do any requirements conflict with other requirements? Is each requirement achievable in the system s technical environment? Is each requirement testable, once implemented? Does the model reflect the system s information, function and behavior? Has the model been appropriately partitioned? Have appropriate requirements patterns been used? 21

22 Example CRG Meeting First CRG meeting of the SafeHome project. After Q&A session (inception meeting), stakeholders write a two page product request, which is delivered to those attending the first CRG meeting. Attendees are asked to make a rough list of objects, services, constraints, and performance criteria for the product. At the meeting, a combined list is created in each topic. Subgroups write mini specifications for each list item. Relevant features in mini specifications are added to the list. 22

23 Example CRG Meeting Our research indicates that the market for home management systems is growing at a rate of 40 percent per year. The first SafeHome function we bring to market should be the home security function. Most people are familiar with alarm systems so this would be an easy sell. The home security function would protect against and/or recognize a variety of undesirable situations such as illegal entry, fire, flooding, carbon monoxide levels, and others. It ll use our wireless sensors to detect each situation, can be programmed by the homeowner, and will automatically telephone a monitoring agency when a situation is detected. 23

24 Example CRG Meeting Objects control panel, smoke detectors, window and door sensors, motion detectors, an alarm, an event (sensor has been activated), a display, a PC, telephone numbers, a telephone call, Services configuring the system, setting the alarm, monitoring the sensors, dialing the phone, programming the control panel, reading the display, Constraints System must recognize when sensors are not operating, must be user friendly, must interface directly to a standard phone line, Performance criteria Sensor event should be recognized within one second, an event priority scheme should be implemented, 24

25 Example CRG Meeting Mini specification for Control Panel The Control Panel is a wall mounted unit that is approximately 9 x 5 inches in size. The control panel has wireless connectivity to sensors and a PC. User interaction occurs through a keypad containing 12 keys. A 2 x 2 inch LCD display provides user feedback. Software provides interactive prompts, echo, and similar functions. 25

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated

More information

Sofware Requirements Engineeing

Sofware Requirements Engineeing Sofware Requirements Engineeing Three main tasks in RE: 1 Elicit find out what the customers really want. Identify stakeholders, their goals and viewpoints. 2 Document write it down (). Understandable

More information

Use Case Diagram. Tom Polanski, Analex Corporation CSCI 6448 - Object-Oriented Analysis and Design (Spring 2001) Homework #3 Use Cases

Use Case Diagram. Tom Polanski, Analex Corporation CSCI 6448 - Object-Oriented Analysis and Design (Spring 2001) Homework #3 Use Cases Tom Polanski, Analex Corporation CSCI 6448 - Object-Oriented Analysis and Design (Spring 2001) Homework #3 Use Cases Use Case Diagram Homeowner Intruder Trigger Wireless Sensor Trigger Access Point Monitor

More information

Applying Use Cases to Microcontroller Code Development. Chris Gilbert Cypress Semiconductor

Applying Use Cases to Microcontroller Code Development. Chris Gilbert Cypress Semiconductor Applying Use Cases to Microcontroller Code Development Chris Gilbert Cypress Semiconductor Agenda Why Use Cases Microcontroller Project Development Use Cases Defined Use Cases Composition General Example

More information

A GUIDE TO PROCESS MAPPING AND IMPROVEMENT

A GUIDE TO PROCESS MAPPING AND IMPROVEMENT A GUIDE TO PROCESS MAPPING AND IMPROVEMENT Prepared by the CPS Activity Based Costing Team December 2012 CONTENTS 1. Introduction Page 3 2. What is process mapping? Page 4 3. Why process map? Page 4 4.

More information

Requirements Engineering Process

Requirements Engineering Process Software Engineering Requirements Engineering Process Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To describe the principal requirements engineering activities and d their

More information

W E B B A S E D M E E T I N G S C H E D U L E R S Y S T E M

W E B B A S E D M E E T I N G S C H E D U L E R S Y S T E M 1 W E B B A S E D M E E T I N G S C H E D U L E R S Y S T E M Project phase 2.2 CS 6361 ADVANCED REQUIREMENTS ENGINEERING, SPRING 2010 UNIVERSITY OF TEXAS AT DALLAS S Y S T E M R E Q U I R E M E N T S

More information

Requirements Engineering Processes. Feasibility studies. Elicitation and analysis. Problems of requirements analysis

Requirements Engineering Processes. Feasibility studies. Elicitation and analysis. Problems of requirements analysis Requirements engineering processes Requirements Engineering Processes The processes used for RE vary widely depending on the application domain, the people involved and the organisation developing the.

More information

Fourth generation techniques (4GT)

Fourth generation techniques (4GT) Fourth generation techniques (4GT) The term fourth generation techniques (4GT) encompasses a broad array of software tools that have one thing in common. Each enables the software engineer to specify some

More information

SOFTWARE ENGINEERING IT 0301 Semester V B.Nithya,G.Lakshmi Priya Asst Professor SRM University, Kattankulathur. School of Computing, Department of IT

SOFTWARE ENGINEERING IT 0301 Semester V B.Nithya,G.Lakshmi Priya Asst Professor SRM University, Kattankulathur. School of Computing, Department of IT SOFTWARE ENGINEERING IT 0301 Semester V B.Nithya,G.Lakshmi Priya Asst Professor SRM University, Kattankulathur School of Computing, Department of IT 1 Analysis Modeling Cardinality and Modality Cardinality

More information

SOFTWARE REQUIREMENTS

SOFTWARE REQUIREMENTS SOFTWARE REQUIREMENTS http://www.tutorialspoint.com/software_engineering/software_requirements.htm Copyright tutorialspoint.com The software requirements are description of features and functionalities

More information

Using Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting

Using Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting Using Use Cases for requirements capture Pete McBreen 1998 McBreen.Consulting petemcbreen@acm.org All rights reserved. You have permission to copy and distribute the document as long as you make no changes

More information

Course Outline. Foundation of Business Analysis Course BA30: 4 days Instructor Led

Course Outline. Foundation of Business Analysis Course BA30: 4 days Instructor Led Foundation of Business Analysis Course BA30: 4 days Instructor Led Prerequisites: No prerequisites - This course is suitable for both beginner and intermediate Business Analysts who would like to increase

More information

Software Requirements Specification (SRS)

Software Requirements Specification (SRS) Software Requirements Specification (SRS) Meeting Scheduler MANISH BANSAL ABHISHEK GOYAL NIKITA PATEL ANURAG MAHAJAN SMARAK BHUYAN - 1 - VERSION RECORD Version record showing the amendments effected to

More information

To be used in conjunction with the Invitation to Tender for Consultancy template.

To be used in conjunction with the Invitation to Tender for Consultancy template. GUIDANCE NOTE Tendering for, choosing and managing a consultant Using this guidance This information is not intended to be prescriptive, but for guidance only. Appointing consultants for relatively small

More information

Ten steps to better requirements management.

Ten steps to better requirements management. White paper June 2009 Ten steps to better requirements management. Dominic Tavassoli, IBM Actionable enterprise architecture management Page 2 Contents 2 Introduction 2 Defining a good requirement 3 Ten

More information

Develop Project Charter. Develop Project Management Plan

Develop Project Charter. Develop Project Management Plan Develop Charter Develop Charter is the process of developing documentation that formally authorizes a project or a phase. The documentation includes initial requirements that satisfy stakeholder needs

More information

Business Requirements Guidelines

Business Requirements Guidelines August 25, 2001 Version 1.0 1 Important Information This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes

More information

Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases. Use Case Diagram: Home Security System. Alarm System

Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases. Use Case Diagram: Home Security System. Alarm System Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases Use Case Diagram: Home Security System Alarm System Use Case #1: Issue Smoke Alarm Primary Actor: Smoke detector Goal in Context: Smoke detector detects

More information

Residential & Commercial Alarm Systems by Gross Security, LLC

Residential & Commercial Alarm Systems by Gross Security, LLC 151 Main Street, Suite, 1, Get these great features with a landline or cellular alarm system from Gross Security, LLC Alarm system prices include installation Base system includes one hour of training

More information

Workflow and Process Analysis for CCC

Workflow and Process Analysis for CCC Section 3.6 Design Workflow and Process Analysis for CCC This tool introduces the importance of workflow and process improvement in a community-based care coordination (CCC) program, describes the value

More information

Stakeholder analysis CHAPTER 25 : HATCHED. Will Allen and Margaret Kilvington

Stakeholder analysis CHAPTER 25 : HATCHED. Will Allen and Margaret Kilvington CHAPTER 25 : HATCHED Will Allen and Margaret Kilvington Summary The increasing scope and ambition of many environmental and resource initiatives e.g. integrated coastal and catchment management requires

More information

CS 6361, SPRING 2010 Advanced Requirements Engineering Web Based Meeting Scheduler- Project Plan

CS 6361, SPRING 2010 Advanced Requirements Engineering Web Based Meeting Scheduler- Project Plan 1 W E B B A S E D M E E T I N G S C H E D U L E R S Y S T E M Project Plan Version 4.0 CS 6361 ADVANCED REQUIREMENTS ENGINEERING, SPRING 2010 UNIVERSITY OF TEXAS AT DALLAS R E Q U I R E M E N T S E N G

More information

STRATEGIC APPROACH TO INTERVIEWING BEST PRACTICES FOR THE MBA MARKET

STRATEGIC APPROACH TO INTERVIEWING BEST PRACTICES FOR THE MBA MARKET STRATEGIC APPROACH TO INTERVIEWING BEST PRACTICES FOR THE MBA MARKET TOP 10 INTERVIEW COMPETENCY CHECKLIST COMPETENCY Craft a targeted positioning statement that highlights your experience, expertise,

More information

Module 0. Facilitating Adult Learning. (September 2004)

Module 0. Facilitating Adult Learning. (September 2004) Module 0 Facilitating Adult Learning (September 2004) Table of Contents a. Preparing to conduct a training... 1 b. Developing training objectives... 1 c. Designing training content... 1 d. Using principles

More information

Guardian Home Security System

Guardian Home Security System Guardian Home Security System Project Proposal Bryce Woodland Western Washington University Fall 2011 1 I. Summary The Guardian Home Security System is an integrated security solution designed to be used

More information

SECURITY SYSTEM MANUAL

SECURITY SYSTEM MANUAL SECURITY SYSTEM MANUAL CONTACT NUMBERS: Phase 3 Security 403-783-2199 Technical Difficulties, Account Updates, & Any Other Inquiries: Consolidated Monitoring 1-800-232-7290 False Alarms & Holiday Procedures

More information

Skills Knowledge Energy Time People and decide how to use themto accomplish your objectives.

Skills Knowledge Energy Time People and decide how to use themto accomplish your objectives. Chapter 8 Selling With a Strategy Strategy Defined A strategy is a to assemble your resources Skills Knowledge Energy Time People and decide how to use themto accomplish your objectives. In selling, an

More information

CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed.

CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. CS 389 Software Engineering Lecture 2 Chapter 2 Software Processes Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. Topics covered Software process models Process activities Coping

More information

Software Requirements Specification

Software Requirements Specification 1 of 7 17.04.98 13:32 Software Requirements Specification The sub-sections : 1. What is a Software Requirements Specification 2. Why is a Software Requirement Specification Required 3. What is Contained

More information

Software Requirements Engineering: What, Why, Who, When, and How By Linda Westfall

Software Requirements Engineering: What, Why, Who, When, and How By Linda Westfall Software Engineering: What, Why, Who, When, and How By Linda Westfall Key words: requirements engineering, requirements elicitation, requirements analysis, requirements specification, requirements management,

More information

Galaxy Flex SECURITY THAT FITS WITH YOUR BUSINESS AND LIFESTYLE. Protect your property

Galaxy Flex SECURITY THAT FITS WITH YOUR BUSINESS AND LIFESTYLE. Protect your property Galaxy Flex SECURITY THAT FITS WITH YOUR BUSINESS AND LIFESTYLE Protect your property As Safe As Houses Are you looking for a security system that is... Highly effective but easily affordable? Extremely

More information

Introduction to Systems Analysis and Design

Introduction to Systems Analysis and Design Introduction to Systems Analysis and Design What is a System? A system is a set of interrelated components that function together to achieve a common goal. The components of a system are called subsystems.

More information

A Consumer s Awareness Guide To Choosing The Right Home Security System

A Consumer s Awareness Guide To Choosing The Right Home Security System 503-577-5559 www.principlenw.com Support@PrincinpleNW.com A Consumer s Awareness Guide To Choosing The Right Home Security System Read This Short Guide To Discover What To Look For When Choosing A Security

More information

Use Cases. Massimo Felici. Massimo Felici Use Cases c 2004 2011

Use Cases. Massimo Felici. Massimo Felici Use Cases c 2004 2011 Use Cases Massimo Felici Use Cases 1 Support requirements engineering activities and the requirement process Capture what a system is supposed to do, i.e., systems functional requirements Describe sequences

More information

Project Management. Software Projects vs. Engineering Projects

Project Management. Software Projects vs. Engineering Projects Read Chapters (a) Project Management, (b) Project Scheduling and (c) Risk Management from Pressman for this lecture. Project Management Rahul Premraj + Andreas Zeller reliability of data questioned! Software

More information

<project name> COMMUNICATIONS PLAN

<project name> COMMUNICATIONS PLAN COMMUNICATIONS PLAN Version [n.n Month Day, Year] Project Sponsor: [Name of Business Sponsor] Project Manager: [Name of Project Manager] Project Number: [Number Assigned to the Project] Document History

More information

IDS. Users Guide to Keypad Functions S E C U R I T Y MANUAL NO. 700-171-01B ISSUED AUG 2002 VERSION 1.18

IDS. Users Guide to Keypad Functions S E C U R I T Y MANUAL NO. 700-171-01B ISSUED AUG 2002 VERSION 1.18 INHEP DIGITAL IDS S E C U R I T Y Users Guide to Keypad Functions MANUAL NO. 700-171-01B ISSUED AUG 2002 VERSION 1.18 Summary of Operation A rm/ disarm [#] + [USER CODE] Quick Quick Quick Away Arm Stay

More information

Requirements Analysis that Works!

Requirements Analysis that Works! Requirements that Works! Robert Halligan, FIE Aust Managing Director, Project Performance International Email: rhalligan@ppi- int.com Introduction: Innumerable studies have concluded that requirements

More information

Software Quality Assurance Plan

Software Quality Assurance Plan For Database Applications Document ID: Version: 2.1a Planning Installation & Acceptance Integration & Test Requirements Definition Design Development 1 / 54 Copyright 2000-2006 Digital Publications LLC.

More information

Welcome to Bell Aliant NextGen Home Security

Welcome to Bell Aliant NextGen Home Security Quick Start Guide Welcome to Bell Aliant NextGen Home Security Congratulations! Your home is now protected by the most advanced security technology available. This guide is intended to familiarize you

More information

2.1 Initiation Phase Overview

2.1 Initiation Phase Overview 2.1 Initiation Phase Overview The is the conceptualization of the project. This section describes the basic processes that must be performed to get a project started. Accordingly, the purpose of the is

More information

(Refer Slide Time: 01:52)

(Refer Slide Time: 01:52) Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

More information

Quality Meets the CEO

Quality Meets the CEO Quality Meets the CEO Jeffery E. Payne jepayn@rstcorp.com Reliable Software Technologies Corporate management does not care about quality. This is the cold, hard reality of the software world. Management

More information

Building an Effective Business Architecture & Metrics Capability

Building an Effective Business Architecture & Metrics Capability Building an Effective Business Architecture & Metrics Capability Building an effective business architecture capability is fundamentally about organisational change management. A siloed business architecture

More information

GSM Alarm System User Manual

GSM Alarm System User Manual GSM Alarm System User Manual For a better understanding of this product, please read this user manual thoroughly before using it. Quick Guider After getting this alarm system, you need to do the following

More information

MENTAL HEALTH ACT - SECTION 5(2)

MENTAL HEALTH ACT - SECTION 5(2) Psychiatry > Scenario 11 MENTAL HEALTH ACT - SECTION 5(2) MODULE: MHA ASSESSMENT FOR SECTION 5(2) TARGET: PSYCHIATRY TRAINEES ST4-6 BACKGROUND: Trainees are often asked to assess voluntary patients who

More information

Test Plan Template (IEEE 829-1998 Format)

Test Plan Template (IEEE 829-1998 Format) Test Plan Template (IEEE 829-1998 Format) Test Plan Identifier Some type of unique company generated number to identify this test plan, its level and the level of software that it is related to. Preferably

More information

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS BUSINESS PROJECT MANAGEMENT CERTIFICATE/DIPLOMA IN K/502/5459 LEVEL 3 UNIT 18

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS BUSINESS PROJECT MANAGEMENT CERTIFICATE/DIPLOMA IN K/502/5459 LEVEL 3 UNIT 18 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS BUSINESS PROJECT MANAGEMENT K/502/5459 LEVEL 3 UNIT 18 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 BUSINESS PROJECT

More information

Chapter 10 Practical Database Design Methodology and Use of UML Diagrams

Chapter 10 Practical Database Design Methodology and Use of UML Diagrams Chapter 10 Practical Database Design Methodology and Use of UML Diagrams Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 10 Outline The Role of Information Systems in

More information

AGILE SOFTWARE TESTING

AGILE SOFTWARE TESTING AGILE SOFTWARE TESTING Business environments continue to rapidly evolve, leaving many IT organizations struggling to keep up. This need for speed has led to an increased interest in the Agile software

More information

PROJECT MANAGEMENT PLAN CHECKLIST

PROJECT MANAGEMENT PLAN CHECKLIST PROJECT MANAGEMENT PLAN CHECKLIST The project management plan is a comprehensive document that defines each area of your project. The final document will contain all the required plans you need to manage,

More information

Effective Business Requirements (Virtual Classroom Edition)

Effective Business Requirements (Virtual Classroom Edition) Developing & Confirming Effective Business Requirements (Virtual Classroom Edition) Eliminate Costly Changes and Save Time by Nailing Down the Project Requirements the First Time! Pre-Workshop Preparation

More information

An Introduction to PRINCE2

An Introduction to PRINCE2 Project Management Methodologies An Introduction to PRINCE2 Why use a Project Methodology and What Does PRINCE2 Enable? PRINCE - PRojects IN Controlled Environments - is a project management method covering

More information

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53 Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software

More information

JAD Guidelines. Description

JAD Guidelines. Description Joint Application Development (JAD) sessions are highly structured, facilitated workshops that bring together customer decision makers and IS staff to produce high-quality deliverables in a short time

More information

Job Description Head of CRM

Job Description Head of CRM Date 10/15 Job Title Head of CRM Solutions Job Grade Management Location London/Solihull Department Client Services Reports to job title Managing Director Job purpose (A concise statement of why the job

More information

AGILE - QUICK GUIDE AGILE - PRIMER

AGILE - QUICK GUIDE AGILE - PRIMER AGILE - QUICK GUIDE http://www.tutorialspoint.com/agile/agile_quick_guide.htm Copyright tutorialspoint.com AGILE - PRIMER Agile is a software development methodology to build a software incrementally using

More information

15 Most Typically Used Interview Questions and Answers

15 Most Typically Used Interview Questions and Answers 15 Most Typically Used Interview Questions and Answers According to the reports made in thousands of job interviews, done at ninety seven big companies in the United States, we selected the 15 most commonly

More information

Writing a Requirements Document For Multimedia and Software Projects

Writing a Requirements Document For Multimedia and Software Projects Writing a Requirements Document For Multimedia and Software Projects Rachel S. Smith, Senior Interface Designer, CSU Center for Distributed Learning Introduction This guide explains what a requirements

More information

Requirements Engineering Processes. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 7 Slide 1

Requirements Engineering Processes. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 7 Slide 1 Requirements Engineering Processes Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 7 Slide 1 Objectives To describe the principal requirements engineering activities and their relationships

More information

Software Process for QA

Software Process for QA Software Process for QA Basic approaches & alternatives CIS 610, W98 / M Young 1/7/98 1 This introduction and overview is intended to provide some basic background on software process (sometimes called

More information

CHAPTER_3 SOFTWARE ENGINEERING (PROCESS MODELS)

CHAPTER_3 SOFTWARE ENGINEERING (PROCESS MODELS) CHAPTER_3 SOFTWARE ENGINEERING (PROCESS MODELS) Prescriptive Process Model Defines a distinct set of activities, actions, tasks, milestones, and work products that are required to engineer high quality

More information

Netstar Strategic Solutions Practice Development Methodology

Netstar Strategic Solutions Practice Development Methodology Netstar Strategic Solutions Practice Development Methodology Netstar Corporation Abstract This document contains a high level description of the development methodology used by the Netstar Strategic Solutions

More information

Lecture 9: Requirements Modelling

Lecture 9: Requirements Modelling A little refresher: What are we modelling? Lecture 9: Requirements Modelling Requirements; Systems; Systems Thinking Role of Modelling in RE Why modelling is important Limitations of modelling Brief overview

More information

TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.

TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended. Previews of TDWI course books are provided as an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews can not be printed. TDWI strives

More information

Mind Mapping to Gantt Charts

Mind Mapping to Gantt Charts International Journal of Scientific and Research Publications, Volume 5, Issue 8, August 2015 1 Mind Mapping to Gantt Charts Devina Rastogi Syscom Corporation Ltd Abstract- In this paper starting with

More information

Some of the prime advantages of having a good project management team for a company are as follows:

Some of the prime advantages of having a good project management team for a company are as follows: PROJECT MANAGEMENT Project management is the discipline of planning, organizing, securing, and managing resources to achieve specific goals. A project is a temporary endeavor with a defined beginning and

More information

Then a web designer adds their own suggestions of how to fit the brand to the website.

Then a web designer adds their own suggestions of how to fit the brand to the website. Branding Small to Medium-Sized Businesses For small businesses, the idea of branding can start with a desire to present a uniform image to the world. The challenge comes when the brand is created without

More information

ICT Project Management

ICT Project Management THE UNITED REPUBLIC OF TANZANIA PRESIDENT S OFFICE PUBLIC SERVICE MANAGEMENT ICT Project Management A Step-by-step Guidebook for Managing ICT Projects and Risks Version 1.0 Date Release 04 Jan 2010 Contact

More information

Senior Information Technology Systems Analyst

Senior Information Technology Systems Analyst Career Service Authority Senior Information Technology Systems Analyst Page 1 of 6 GENERAL STATEMENT OF CLASS DUTIES Performs full performance level professional work analyzing, refining and documenting

More information

Object-oriented design methodologies

Object-oriented design methodologies Object-oriented design methodologies An object-oriented methodology is defined as the system of principles and procedures applied to object-oriented software development. Five years ago, there was no standard

More information

Darshan Institute of Engineering & Technology Unit : 10

Darshan Institute of Engineering & Technology Unit : 10 1) Explain management spectrum or explain 4 p s of software system. Effective software project management focuses on the four P s: people, product, process, and project. The People People factor is very

More information

The Competent Communicator Manual

The Competent Communicator Manual The Competent Communicator Manual Speech 1: The Ice Breaker For your first speech project, you will introduce yourself to your fellow club members and give them some information about your background,

More information

Name Chapter 1: Introduction to Project Management Description Instructions

Name Chapter 1: Introduction to Project Management Description Instructions Name Chapter 1: Introduction to Project Management Description Instructions Modify Question 1 / 0 points Modify Remove Question Until the 1980s, project management primarily focused on providing schedule

More information

Partnering for Project Success: Project Manager and Business Analyst Collaboration

Partnering for Project Success: Project Manager and Business Analyst Collaboration Partnering for Project Success: Project Manager and Business Analyst Collaboration By Barbara Carkenord, CBAP, Chris Cartwright, PMP, Robin Grace, CBAP, Larry Goldsmith, PMP, Elizabeth Larson, PMP, CBAP,

More information

Issues in Internet Design and Development

Issues in Internet Design and Development Issues in Internet Design and Development Course of Instructions on Issues in Internet Design and Development Week-2 Agile Methods Saad Bin Saleem PhD Candidate (Software Engineering) Users.mct.open.ac.uk/sbs85

More information

Hardware and Logic Implementation of Multiple Alarm System for GSM BTS Rooms

Hardware and Logic Implementation of Multiple Alarm System for GSM BTS Rooms Hardware and Logic Implementation of Multiple Alarm System for GSM BTS Rooms Arifa Ferdousi 1 and Sadeque Reza Khan 2 1 Dept. of Computer Science and Engineering, Varendra University, Rajshahi, Bangladesh

More information

http://www.io4pm.org IO4PM - International Organization for Project Management

http://www.io4pm.org IO4PM - International Organization for Project Management THE ONLY BOOK CAN SIMPLY LEARN PROJECT MANAGEMENT! Page 1 Contents ABOUT THE AUTHOR... 3 WHAT IS PROJECT MANAGEMENT?... 5 ORGANIZATIONAL INFLUENCES AND PROJECT LIFECYCLE... 11 PROJECT MANAGEMENT PROCESSES...

More information

Fire Alarm Engineering Best Practices. CFAA NCA Technical Seminar 2014

Fire Alarm Engineering Best Practices. CFAA NCA Technical Seminar 2014 Fire Alarm Engineering Best Practices CFAA NCA Technical Seminar 2014 2 Overview Code Compliance Equipment Selection and Layout Drawings, Specifications Commissioning and Acceptance Miscellaneous Goals

More information

Customer Relationship Team reporting to Product Manager

Customer Relationship Team reporting to Product Manager Position Description Employee: Position title: Location: Grade: Organisation: Head Office: 60-68 Moorabool Street, Geelong. Technical Specialist Customer Relationship Team reporting to Product Manager

More information

Software Engineering. Session 3 Main Theme Requirements Definition & Management Processes and Tools Dr. Jean-Claude Franchitti

Software Engineering. Session 3 Main Theme Requirements Definition & Management Processes and Tools Dr. Jean-Claude Franchitti Software Engineering Session 3 Main Theme Requirements Definition & Management Processes and Tools Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical

More information

HDI Certified Instructor Program. A document of understanding for HDI Certified Instructors

HDI Certified Instructor Program. A document of understanding for HDI Certified Instructors HDI Certified Instructor Program A document of understanding for HDI Certified Instructors As of November 1, 2009 Table of Contents Section 1: About HDI... 3 Introduction to HDI... 3 Overview of Training

More information

Rogers Smart Home Monitoring QUICK START GUIDE ROG_6093_QST_GDE_EN.indd 1 9/22/12 8:29 AM

Rogers Smart Home Monitoring QUICK START GUIDE ROG_6093_QST_GDE_EN.indd 1 9/22/12 8:29 AM Rogers Smart Home Monitoring QUICK START GUIDE STAY CONNECTED TO YOUR HOME AND YOUR FAMILY. This Quick Start Guide is designed to help you get the most out of your new system right away and help ensure

More information

New GSM Alarm System. User s Manual. Profile For a better understanding of this product, please read this user manual thoroughly before using it.

New GSM Alarm System. User s Manual. Profile For a better understanding of this product, please read this user manual thoroughly before using it. New GSM Alarm System User s Manual Profile For a better understanding of this product, please read this user manual thoroughly before using it. Chapter 1. Features Chapter 2. Alarm Host Introduction Chapter

More information

Setting SMART Objectives Checklist 231

Setting SMART Objectives Checklist 231 Setting SMART Objectives Checklist 231 Introduction Objectives set out what a business is trying to achieve. They should be based on organisational strategy and be aligned with corporate vision, mission

More information

The Job of the Project Manager. Robert Youker World Bank (retired) 5825 Rockmere Drive Bethesda, Md. USA 20816 bobyouker@worldnet.att.

The Job of the Project Manager. Robert Youker World Bank (retired) 5825 Rockmere Drive Bethesda, Md. USA 20816 bobyouker@worldnet.att. The Job of the Project Manager Robert Youker World Bank (retired) 5825 Rockmere Drive Bethesda, Md. USA 20816 bobyouker@worldnet.att.net For any organization and for any project manager it is vitally important

More information

The University of Adelaide Business School

The University of Adelaide Business School The University of Adelaide Business School MBA Projects Introduction There are TWO types of project which may be undertaken by an individual student OR a team of up to 5 students. This outline presents

More information

How PRINCE2 Can Complement PMBOK and Your PMP Jay M. Siegelaub Impact Strategies LLC. Abstract. About PRINCE2

How PRINCE2 Can Complement PMBOK and Your PMP Jay M. Siegelaub Impact Strategies LLC. Abstract. About PRINCE2 How PRINCE2 Can Complement PMBOK and Your PMP Jay M. Siegelaub Impact Strategies LLC Abstract PMBOK is the recognized (de facto) standard of project management knowledge. In the UK and Europe, PRINCE2

More information

4.4 What is a Requirement? 4.5 Types of Requirements. Functional Requirements

4.4 What is a Requirement? 4.5 Types of Requirements. Functional Requirements 4.4 What is a Requirement? It is a statement describing either 1) an aspect of what the proposed system must do, or 2) a constraint on the system s development. In either case it must contribute in some

More information

Advanced Software Test Design Techniques Use Cases

Advanced Software Test Design Techniques Use Cases Advanced Software Test Design Techniques Use Cases Introduction The following is an excerpt from my recently-published book, Advanced Software Testing: Volume 1. This is a book for test analysts and test

More information

A Case study based Software Engineering Education using Open Source Tools

A Case study based Software Engineering Education using Open Source Tools A Case study based Software Engineering Education using Open Source Tools Sowmya B J Dept. of CSE M. S. Ramaiah Institute of Technology sowmyabj@msrit.edu Srinidhi Hiriyannaiah Dept. of CSE M.S. Ramaiah

More information

44-76 mix 2. Exam Code:MB5-705. Exam Name: Managing Microsoft Dynamics Implementations Exam

44-76 mix 2. Exam Code:MB5-705. Exam Name: Managing Microsoft Dynamics Implementations Exam 44-76 mix 2 Number: MB5-705 Passing Score: 800 Time Limit: 120 min File Version: 22.5 http://www.gratisexam.com/ Exam Code:MB5-705 Exam Name: Managing Microsoft Dynamics Implementations Exam Exam A QUESTION

More information

4180: Defined Processes, Evidence, and Rescuing Corporate Knowledge: Achieving Standards Compliance in Agile and Lean Environments

4180: Defined Processes, Evidence, and Rescuing Corporate Knowledge: Achieving Standards Compliance in Agile and Lean Environments 4180: Defined Processes, Evidence, and Rescuing Corporate Knowledge: Achieving Standards Compliance in Agile and Lean Environments SEPG Conference March 2012 Dr. Richard Bechtold : Overview Problem Statement

More information

Business Analyst Work Plan. Presented by: Billie Johnson, CBAP CSM

Business Analyst Work Plan. Presented by: Billie Johnson, CBAP CSM Business Analyst Work Plan Presented by: Billie Johnson, CBAP CSM Agenda Topic Introduction Overview of a Business Analysis Work Plan Initiating a Business Analysis Effort Components of the Business Analysis

More information

Using Use Cases on Agile Projects

Using Use Cases on Agile Projects Using Use Cases on Agile Projects Ivar Jacobson with Ian Spence Agenda What are agile teams looking for? Cards, conversations, and confirmations Knowing what to do and when it s done Being agile with use

More information

Potential Interview Questions

Potential Interview Questions Potential Interview Questions Listed below are some questions commonly asked by employers during interviews along with some hints about how to best answer each question. Outline or write out your responses

More information

CODE OF CONDUCT April 2014

CODE OF CONDUCT April 2014 All correspondence to: The Breastfeeding Network PO Box 11126, Paisley PA2 8YB Tel: 0844 412 0995 e-mail: admin@breastfeedingnetwork.org.uk www.breastfeedingnetwork.org.uk PURPOSE CODE OF CONDUCT April

More information

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI Available online at www.apije.com ASIA PACIFIC INTERNATIONAL JOURNAL OF ENGINEERING SCIENCE Vol. 02 (01) (2016) 37 41 AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI A.Arun Raja

More information

REQUIREMENTS SPECIFICATION AND MANAGEMENT. Requirements Analysis and Specification

REQUIREMENTS SPECIFICATION AND MANAGEMENT. Requirements Analysis and Specification REQUIREMENTS SPECIFICATION AND MANAGEMENT In this note we give the requirements process in a software organization, a template for the requirements document, and the process to manage changes to the requirements.

More information