Requirements Management

Slides:



Advertisements
Similar presentations
With TimeCard appointments are tagged with information that converts them into time sheets. This way users can report time and expenses from their Outlook.
Advertisements

FlareCo Ltd ALTER DATABASE AdventureWorks SET PARTNER FORCE_SERVICE_ALLOW_DATA_LOSS Slide 1.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
P2P2DSpace Project. Project in the Technion Electrical Engineering Software Lab P2P Network, Map, Background Manager Team members: Vladimir Shulman Ziv.
Data modelling uses two main techniques Entity relationship (E-R) modelling: a top- down approach Normalisation: a bottom-up approach.
Copyright by Scott GrissomCh 1 Software Development Slide 1 Software Development The process of developing large software projects Different Approaches.
Module 5 Understanding SQL Server 2008 R2 Recovery Models.
1 Enabling Secure Internet Access with ISA Server.
Test Review. What is the main advantage to using shadow copies?
Welcome to PC362: Managing Grants. Please set cell phones and pagers to silent Refrain from side discussions. We all want to hear what you have to say!
Module 5: Managing Public Folders. Overview Managing Public Folder Data Managing Network Access to Public Folders Publishing an Outlook 2003 Form Discussion:
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
Computer Emergency Notification System (CENS)
SE: CHAPTER 7 Writing The Program
Module 13 Implementing Business Continuity. Module Overview Protecting and Recovering Content Working with Backup and Restore for Disaster Recovery Implementing.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Overview Managing a DHCP Database Monitoring DHCP
Requirements Reference: Chapters 5, 6, & 8. CMSC 345, Fall Objectives To introduce the concepts of user and system requirements To explain functional.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Slide 12.1 Chapter 12 Implementation. Slide 12.2 Learning outcomes Produce a plan to minimize the risks involved with the launch phase of an e-business.
Ambiguous TermImprovement acceptable, adequateDefine what constitutes acceptability and how the system can judge this. as much as practicableDon’t leave.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
COMP 106 Practical 2 Proposal 5 Slide 1. Designing an Interface (1) The user must be able to anticipate a widget's behaviour from its visual properties.
Master Data Management & Microsoft Master Data Services Presented By: Jeff Prom Data Architect MCTS - Business Intelligence (2008), Admin (2008), Developer.
AR350: Maintaining Customers Welcome to AR350: Maintaining Customers.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
Unit 1 - Introducing Abstract Data Type (ADT) Part 1.
Human Computer Interaction Lecture 21 User Support
ITIL: Service Transition
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Data Virtualization Demoette… ODBC Clients
Nithyamoorthy S Core Mind Technologies
Custom Profile Options
Improving searches through community clustering of information
Using E-Business Suite Attachments
Authentication & .htaccess
PastPerfect.
Theory and Practice of Web Technology
SCC P2P – Collaboration Made Easy Contract Management training
Creating an Oracle Database
Systems Analysis and Design
Requirements Analysis and Specification
Start at 17th March 2012 end at 31th March 2012
By Dr. Abdulrahman H. Altalhi
Requirements Management
THE DEVELOPMENT SERVICE
DBM 380 AID Lessons in Excellence-- dbm380aid.com.
DBM 380 AID Perfect Education/ dbm380aid.com.
DBM 380 HELP Perfect Education/ dbm380help.com.
Requirements Management
INEOGroup presents:.
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
Software life cycle models
Using JDeveloper.
Requirements Management
Software Requirements Specification Document
Programming in JavaScript
Requirements Management
Static Class Members March 29, 2006 ComS 207: Programming I (in Java)
Object Oriented Practices
Requirements Management
Ambiguity and Specificity
Programming in JavaScript
CIS 4328 – Senior Project 2 And CEN Engineering of Software 2
Enabling Unambiguous GRDDL Results
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Requirements Analysis
DBOS DecisionBrain Optimization Server
Software Requirements
Presentation transcript:

Requirements Management Requirement Ambiguity Instructor Slides Exercise Module Number: RM09 This course material was developed with NSF – TUES award # 1245036

Ambiguous Terms to Avoid acceptable, adequate as much as practicable at least, at minimum, not more than, not to exceed between depends on efficient user-friendly, simple, easy flexible improved, better, faster, superior including, including but not limited to, and so on, such as maximize, minimize, optimize normally, ideally optionally reasonable, when necessary, where appropriate acceptable, adequate robust seamless, transparent, graceful several shouldn’t state-of-the-art sufficient support, enable Source: Adapted from Karl E. Wiegers, More about Software Requirements, Microsoft Press, 2006

Task Identify the ambiguity (or ambiguities) in the given statements; discuss and propose how that may be corrected.

Ambiguous Sentence 1 For a web-based system, it is required that loading of all web pages must be completed within a reasonable time duration. What do the students say?

Ambiguous Sentence 1 For a web-based system, it is required that loading of all web pages must be completed within a reasonable time duration. The requirement "reasonable" time duration may be too vague. On the other hand, web application performance measured on the client side also depends on network traffic situation. Instructor: For a web-based system, we may need to specify performance requirements on the server side rather than on the client side, unless we can acquire a network with guaranteed Quality of Service.

Ambiguous Sentence 2 Access right to the data is limited to the individuals with managerial rank, but those with access rights may also grant access rights to others. What do the students say?

Ambiguous Sentence 2 Access right to the data is limited to the individuals with managerial rank. But those with access rights may also grant access rights to others. Can the right of granting access rights be granted also to another user? The details of access right control need to be fully analyzed - therefore understood - for design and implementation. "Managerial Rank" also needs clear definition. Instructor: An access control matrix generally defines operations (Read/Write… etc) by different roles for different objects (files, folders, etc). A full analysis is necessary, and the right to grant access rights will make this more complicated, often leaving dangerous loop holes.

Ambiguous Sentence 3 Even though the (stock) market is open only during business hours, access to stock prices should be available 24/7, supporting client access to the market at the clients' time and locale. What do the students say?

Ambiguous Sentence 3 Even though the (stock) market is open only during business hours, access to stock prices should be available 24/7, supporting client access to the market at the clients' time and locale. The requirement means that the access to information should be there all the time. But that high-lights the need to include locale information when we time-stamp any operation in the log. Instructor: While the requirement itself is simple to understand, the implication is that globalization will involve many details, one of which is the locale information in time-stamping.

Ambiguous Sentence 4 A user should be able to customize the system behavior to cater to his/her own needs. Yet the system should provide a reasonable default case for everyone. What do the students say?

Ambiguous Sentence 4 A user should be able to customize the system behavior to cater to his/her own needs. Yet the system should provide a reasonable default case for everyone. It is a design requirement -stating what we (users) want. But for the SRS document, we will need to specify all the details - that is, all the configuration parameters involved, and the appropriate default. Instructor: The principle is flexibility in customization but too much flexibility often makes a system difficult to use. An appropriate default setting often will yield a good solution.

Ambiguous Sentence 5 Every book is identified by the ISBN in the catalog. When a member of the library takes a book out on loan, the system must also identify which copy of the book was loaned out, so that the member will be responsible for any damage on that specific copy of the book upon return. What do the students say?

Ambiguous Sentence 5 Every book is identified by the ISBN in the catalog. When a member of the library takes a book out on loan, the system must also identify which copy of the book was loaned out, so that the member will be responsible for any damage on that specific copy of the book upon return. Note that we have two concepts involved: (1) the published book, identified by ISBN, and (2) the physical copy of a book, identified by ID for the copy - the ID may be an extension of the ISBN, but we need to distinguish every physical copy. Instructor: This would be a good exercise in Database Analysis and Design, working with the details of Entity-Relationship modeling. The ISBN is acceptable for identifying both the published book and the physical copy only when exactly one copy of each published book exists in the catalog.

Questions