chapter 4 (1)
chapter 4 (1)
Functional Requirements
o specifies the software functionality that the developers must build into the
product to enable users to accomplish their tasks, thereby satisfying the
business requirements
o is a state what the system must do
o Example:
o The website shall notify the administrator via email when a user
register with it
Cont…
o are Constraints or standards that the system must have or comply with
o describe aspects of the system that are not directly related to the functional
behavior of the system
o include a broad variety of requirements that apply to many different
aspects of the system, from usability to performance
o These requirements are:
oDirect Observation
oAnalyzing Documents
oQuestionnaires
Interview Questions
o Yields only a small segment of data from a possibly vast variety of data
sources.
Analyzing Documents
o Titles and names of key individuals who have an interest in relevant existing
systems (e.g., the name of a sales manager who has led a study of buying
behavior of key customers)
o Values of the organization or individuals who can help determine priorities for
different capabilities desired by different users (e.g., maintaining market share
even if it means lower short-term profits)
o Special information-processing circumstances that occur irregularly that may
not be identified by any other requirements determination technique (e.g.,
special handling needed for a few large-volume customers who require use of
customized customer ordering procedures)
Questionnaires
o also known as concrete use case models or detailed use case models
2. Actor(s) –
is a person, organization, or external system that plays a role in one or more
interactions with your system
in other term we can say users
are outside the system and usually outside the control of the system.
Identifying Actors
To help find actors in your system, you should ask yourself the following
questions:
Who is the main customer of your system?
Who obtains, supply, use, remove and provides information from this or to
the system?
Who installs, operates and shut-down the system?
What other systems interact with this system?
Does anything happen automatically at a preset time?
Where does the system get information?
Example:
If the person employed as the registrar at a university is also taking courses, he or she may play
the roles of both Student and Registrar. This is perfectly valid from a use case point of view.
To describe an actor, you want to give it a name that accurately reflects its role within your
model. Actor names are usually singular nouns, such as Grade Administrator, Customer, and
Payment Processor.
Cont…
Anything within the box represents functionality that is in scope, and anything
outside the box is not.
oThe symbol looks the following:
Cont…
Extend
Include
Generalization
a taxonomic relationship between a more general use case and a more
specific use case.
It is represented as follows:
Cont…
Generally the following picture shows an example for use case diagram
Cont…
There are several interesting things to note about the use cases:
No time ordering is indicated between use cases.
o Is a collection of standard index cards that have been divided into three
sections, as depicted in figure below:
Example:
Cont…
how do you create CRC models? Iteratively perform the following steps:
Find Classes
Find Responsibility
Define Collaborators
Portable
Limited details
1. business rules:
o defines or constrains one aspect of your business that is intended to
assert business structure or influence the behavior of your business
o often focuses on access control issues
2. Constraints:
ois a restriction on the degree of freedom you have in providing a solution
Example:
Example:
Requirements Validation
Requirements Verification
There are mainly three reasons why we should start testing early and often:
With early and regularly tests we have a much higher chance of catching up
with our due dates.
Testing early and often saves us much effort.
Example 1:
There can be an extension of this use case. In case password is not valid
system will display a message and ask for re-try four times.
If Password, not valid four times system will ban the IP address.
Cont…
Example 2: