Monday, December 23, 2019

Methods of Identifying System Requirements - 1790 Words

Adzraku Setsoafia Edem B020909031 BIT Level 200 morning System Analysis Design (ICT 231) Five Methods for Identifying System Requirement and How They are Applied in any System Development Venture System requirement are the specification that define the functions or performance to be provided by a system logically and physically. The objective of identifying the system requirement is to understand the business functions and develop a system with the necessary specification that will meet those functions. To develop any system the systems analyst needs to collect facts and all relevant information to identify or clarify what the organization wants out of the system to accomplish their objectives or goals. For the success of any†¦show more content†¦For example, observations made provide the knowledge needed to test various recommendations and help build the relationship between the users and the new system. The systems analyst plans his observations in advance by preparing a checklist of specific tasks that he wants to observe and question about the current system. The systems analyst may consider the following techniques when observing: * Ask sufficient question, to ensure a complete understanding of the present system’s operation. * Observe the entire step in a transaction and note the documents, inputs, outputs and processes involved. * Examine each form, record and report. Determine the purpose each item of information serves * Consider each user who works with the system and how much support does the user require. * Talk to the people who use the current system to see whether the system is timely, accurate and in a useful form. Ask whether the current system can be eliminated or improved upon. The advantage of this technique is that actual methods of procedures and workings of the system examined, also data is collected in real time and tends to be more accurate. Some problems about observation is that, it is time consuming and expensive. Questionnaires In projects where it is desirable to obtain inputs from a large number of people, questionnaire can be a valuable technique. Questionnaire is a document containing a number of standard questions sent to many individuals orShow MoreRelatedMethods of Identifying System Requirements1797 Words   |  8 Pagesmorning System Analysis Design (ICT 231) Five Methods for Identifying System Requirement and How They are Applied in any System Development Venture System requirement are the specification that define the functions or performance to be provided by a system logically and physically. The objective of identifying the system requirement is to understand the business functions and develop a system with the necessary specification that will meet those functions. To develop any system the systems analystRead MoreThe Job Of The Analyst1361 Words   |  6 PagesThe part of the job of the analyst in identifying a business need that looks interesting and enjoyable to me would be engaging the stakeholders (organization management, sponsors/champions, and system users among other stakeholders) in identifying the various business requirements. This, in my view, is one of the crucial areas because it would allow me as an analyst to understanding the state of an existing system and determine how a new system would impact on the business performance of an organizationRead MoreAn Advanced Framework For Requirements1654 Words   |  7 PagesFra mework for Requirements Elicitation Jaydeep Lunagariya (012630083) California State University, Long Beach, CA, USA Introduction Requirement elicitation is a critical and essential activity in the requirement engineering processes. It is a finite set of activities that complied in determination process of the system requirements. This includes identification of the system’s stakeholders, analysis of the current problem definition in application domain, an operating environment of the system and of allRead MoreNaval Technical Bureau ( Cpeng ) And A Qualified Project Manager974 Words   |  4 Pagesprofessional, motivated, and experienced Chartered Mechanical/Systems Engineer (CPEng) and a qualified Project Manager (PM) from UNSW Canberra (ADFA) working with Naval Technical Bureau (NTB) from 2008 to current for Australian Department of Defence (DoD). My employer’s primary role is to support technical integrity of ADO Maritime material in platform systems engineering through the evolution of Maritime Material Seaworthiness Requirement Set (MSRS)(DEF AUST (5000). The document captures the technicalRead MoreSoftware Engineering : Design Rules For All Components935 Words   |  4 PagesIn software engineering, requirements from user met with available components, then following activities needs to be performed 1) Component Qualification: System requirements and architecture define the components that will be required. Reusable components (whether COTS or in house) are normally identified by the characteristics of their interfaces. That is, â€Å"the services that are provided, and the means by which consumers access these services† are described as part of the component interface. ButRead MoreThe Paradigm Of Multilateral Security1124 Words   |  5 PagesToday, the established way for describing security requirements, as reflected for example in the Common Criteria, an international standard to achieve comparability of independent IT security evaluations, starts with a description of the functional requirements, the system architecture, and its working environment. It then continues with a threat analysis that describes envisaged threats, possibly followed by an evaluation of the severity of threats through a risk analysis and ends with the definitionRead MoreThe Software Developme nt Life Cycle1303 Words   |  6 Pagesfor the software arose, the deliverables or outcome expected from the software or system and also identifies the various requirements for the development. It is very important to involve users, stakeholders and working engineers in this phase, to ensure that the â€Å"Why† criteria is thoroughly fleshed out. A well worked out analysis phase will help developers and architects to successfully work on the given requirements in the design phase. The design phase might also involve building several use casesRead MoreApproaches to Risk Analysis Essay912 Words   |  4 Pagesintroduced two approaches to the risk assessment of an information security system. Bhattacharjee and associates’ method is a two-stage method, with a consolidated analysis, identifying a single risk value for each asset, and a detailed analysis, which defines a threat-vulnerability pair for each risk factor (Bhattacharjee, Sengupta, Mazumdar, Sankar Barik, 2012) . The method first identifies assets and defines seven requirements factors for each: confidentiality, integrity, availability, authenticityRead MoreDegree of Membership of a Value in a Fuzzy Set761 Words   |  3 Pageszero value to the unused requirements in the retrieved case with respect to given input requirements.Adjust the given input to the value 100 % by reducing the requirement value with equal priority.Generating the fuzzy input requirement value [0,1] Defuzzification ïÆ'Ëœ Fuzzy output set in given as input to this phase. i.e., the best case from retrieved cases.Converting the fuzzy output to the Boolean value for the acceptance of cases. 1. Input: Given the input requirements as {r1, r2,} 2. Retrieve allRead MoreThe Steps That I Follow For Requirements Determination1121 Words   |  5 Pages)The steps that i follow for requirements determination are: 1. BPA,BPI,BPR are the three major techniques which helps in defining the needs of the new system. Define the purpose of the project. Gather information from various sources to better acknowledge the system. Analyzing the gathered information. Validate mutual understanding of the requirements. Stakeholder analysis. 2.The major entities that i would like to consider for my information gathering are Interviews,Document analysis,JAD .These

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.