Summarizing a functional requirement of the system

Assignment Help Software Engineering
Reference no: EM13801954

You will read through the fake client's description and extract an essential set of requirements, involved entities (e.g., the users), and the relationships between requirements and entities. Your assignment submission will include the following work products:

1. A list of at least 20 use cases, each one summarizing a functional requirement of the system in a sentence or two. This is also a good place to indicate possible security threats. You can specify security threats and/or system constraints either with individual use cases or as separate list items, or both. This list should be concise and meaningful.

2. A list of definitions of key terms used by the software system. Indicate which definitions are objects, i.e., data structures that the system will use/manipulate.

3. A list of the user types of the system and other entities external to the system. You will also indicate under each entity type the use cases to which the entity has access (i.e., who can do what). For the use cases, you only need to refer to specific use cases in the list produced in #1 (utilize a use case id or name).

4. A Use Case Diagram that illustrates the relationships between entity types and use cases.

Reference no: EM13801954

Questions Cloud

Identify issues that can affect network efficiency : Identify issues that can affect network efficiency based on connectivity type. Provide examples of how ISP connectivity service types, such as DSL, CATV, or FTTH, can dictate what options are available for connectivity
Determine the range r : The ball is kicked from point A with the initial velocity vA=10m/s. Determine the range R, and the speed when the ball strikes the ground
Identify and analyze the approachs to negotiation : Identify and analyze the approach(s) to negotiation that the parties employed. Identify opportunities for employing other kinds of negotiation strategies and suggest how those strategies could have led to different outcomes.
Use work and energy principle to find velocity : A spring stiffness k= 500 n/m is mounted against a 10 kg block. if the block is subjected to a force of 1 KN determine the velocity of the block at s=0.3 m when s=0, the block is at rest and the spring is uncompressed. The coefficient of fricktion is..
Summarizing a functional requirement of the system : A list of at least 20 use cases, each one summarizing a functional requirement of the system in a sentence or two. This is also a good place to indicate possible security threats. You can specify security threats and/or system constraints either w..
Indicate whether the f is statistically significant : 14. For each of the following F values, indicate whether the F is statistically significant at the specified alpha level: a. F = 4.80, df = 4, 40 α = 0.01 b. F = 5.02, df = 3, 60, α = 0.001 c. F = 3.45, df = 3, 27, α = 0.05 d. F = 4.99, df = 2, 150, ..
Suppose an investment analyst takes a random sample of us : a) Suppose an investment analyst takes a random sample of U.S equity mutual funds and calculates Sharp Ratio. The sample size is 100, and the average sharp ratio is 0.45. The sample has a standard deviation of 0.30. Calculate and interpret the 90 per..
Analyze the government''s role in protection of environment : Analyze the government's role in the protection of the environment. Be sure that your analysis includes a look at one of the following: conservation, environmentalism, protection, global warming, and energy concerns. How has the regulation of one ..
The federal government : A new motorcycle is being developed to meet new gas mileage standards recently passed by the federal government. An engineer tested three model designs by randomly assigning the motorcycles in a blind study (the riders recorded the mileage but did no..

Reviews

Write a Review

Software Engineering Questions & Answers

  Create small alu in logisim capable of performing operations

Create a small ALU in Logisim capable of performing the following operations on two 8-bit unsigned numbers, A and B. The 2-bit control, F, indicates the operation to be performed.

  The software development plan is now mostly complete with

the software development plan is now mostly complete with respect to the planning and many steps in the overall process

  Suppose you are tasked with coming up with a system

Suppose you are tasked with coming up with a system development approach for the following project: John's shoe store which operates a chain of local stores in Chicago wants to develop an e-commerce presence on the web so they can sell shoes to a ..

  Describe what design pattern can solve the above problem

Develop the above requirements in to user stories with scenarios and document them to form the product backlog as done in the Scrum methodology.

  Question 1a why is it imperative to use systems analysis

question 1a why is it imperative to use systems analysis and design methodologies when building a system?b describe how

  Assessment briefworking individually and based on the high

assessment briefworking individually and based on the high house case you are required to produce a report

  Define erp and describe its functionalities

Explain the role of MIS in enterprise resource planning (ERP). Conduct research to address the following items. Write a two-page report to the CEO in which you: Define ERP and describe its functionalities

  Discuss cisc, risc, pipelining and parallel processing

Write a 2 page research paper (excluding the title page) on computer architecture, and discuss CISC, RISC, pipelining, and parallel processing.

  Why you consider the statement to be valid or invalid

The statement is made that: ‘... bitmapped graphics have intrinsic advantages over vector graphics when used in a web environment'. By giving a critical assessment of the issues explain why you consider the statement to be valid or invalid. Post y..

  Sketch the dependency diagram

Sketch the dependency diagram. There are suitable examples in reading assignments of dependence diagrams. In what normal form is this table? Describe why.

  Describe the application architecture and process design

Describe the application architecture and process design. Include a high-level description of the security controls you recommend for the design of this HR system.

  Sketch flowchart to represent logic of program

Sketch a flowchart to represent the logic of a program that allows the user to enter five values. The program prints the largest and the smallest number from the five values provided.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd