1. Consider functional and nonfunctional requirements as explained in page 1. (a) Think about one product...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
1. Consider functional and nonfunctional requirements as explained in page 1. (a) Think about one product you want to answer in this question (it can be a software from Microsoft as illustrated before, it can be a car, a computer, but it can be any other product coming to your mind). Explain briefly why you want to pick this product. (b) Define three functional requirements of this product. Define or explain each requirement in at least two lines. (c) Now find / identify three nonfunctional requirements as shown in Figure 1, that you want to explain. You can also have / make your own nonfunctional requirements not listed in Figure 1; just make sure you can justify these requirement. (d) General definitions: Define or explain what these three requirements mean in general (just like a glossary section or a dictionary). For example, what does it mean by security requirements, with the definition common for all different products. You also know that safety requirements are different from security requirements even though the terms sound very similar. Note that the detailed security requirements of different products can be different (as a car uses an alarm for security, while a computer uses a fingerprint for security (and MS Word uses some other way for security, not alarm, neither fingerprint). However security means a way to guard the product, which is different from safety, a way to protect the user's life for example. Your answer for (d) will be the same whether the product is car or computer or anything else such as "a way to guard the product" but you may use different words". (e) Specific Definitions: Now explain the three requirements (picked in part (c)) specific to the product you picked in part (a). Notice a computer's security requirements will be different from a car's security (and different from MS Word's security requirements) in this part (e) (as you saw that a computer could use fingerprint while a car uses an alarm), but the general definition of security requirements for car, computer, and MS Word are all the same for part (d). (f) How would you design the specific requirements you explained in part (e)? For example, our labs can be secured by door access, but how is door access designed (or implemented)? It can be designed using lock and keys, using Bronco card, using fingerprint etc. 1. Consider functional and nonfunctional requirements as explained in page 1. (a) Think about one product you want to answer in this question (it can be a software from Microsoft as illustrated before, it can be a car, a computer, but it can be any other product coming to your mind). Explain briefly why you want to pick this product. (b) Define three functional requirements of this product. Define or explain each requirement in at least two lines. (c) Now find / identify three nonfunctional requirements as shown in Figure 1, that you want to explain. You can also have / make your own nonfunctional requirements not listed in Figure 1; just make sure you can justify these requirement. (d) General definitions: Define or explain what these three requirements mean in general (just like a glossary section or a dictionary). For example, what does it mean by security requirements, with the definition common for all different products. You also know that safety requirements are different from security requirements even though the terms sound very similar. Note that the detailed security requirements of different products can be different (as a car uses an alarm for security, while a computer uses a fingerprint for security (and MS Word uses some other way for security, not alarm, neither fingerprint). However security means a way to guard the product, which is different from safety, a way to protect the user's life for example. Your answer for (d) will be the same whether the product is car or computer or anything else such as "a way to guard the product" but you may use different words". (e) Specific Definitions: Now explain the three requirements (picked in part (c)) specific to the product you picked in part (a). Notice a computer's security requirements will be different from a car's security (and different from MS Word's security requirements) in this part (e) (as you saw that a computer could use fingerprint while a car uses an alarm), but the general definition of security requirements for car, computer, and MS Word are all the same for part (d). (f) How would you design the specific requirements you explained in part (e)? For example, our labs can be secured by door access, but how is door access designed (or implemented)? It can be designed using lock and keys, using Bronco card, using fingerprint etc.
Expert Answer:
Answer rating: 100% (QA)
a I am going to pick the car as my product I want to pick this product because it is a very common p... View the full answer
Related Book For
Systems analysis and design
ISBN: 978-0136089162
8th Edition
Authors: kenneth e. kendall, julie e. kendall
Posted Date:
Students also viewed these general management questions
-
Why is it useful to define the nonfunctional requirements in more detail even if the technical environment requirements dictate a specific architecture?
-
Think Like an Entrepreneur Perhaps you have fantasized about one day owning your own company, or maybe you have already started a business. Proposals are offers to a very specific audience whose...
-
Can you think of any products for which one or several of the elements of service, quality, and cost are not important to the customer? If so, explain why.
-
The time it takes to get a cars oil changed at Speedy Lube is distributed normally with a mean of 12 min and a standard deviation of 2 min. Compute the probability that a customer will have her or...
-
Equipment was acquired at the beginning of the year at a cost of $250,000. The equipment was depreciated using the double-declining-balance method based upon an estimated useful life of 10 years and...
-
At the beginning of the current (non-leap) year, Charles owns all of Pearl Corporations outstanding stock. His basis in the stock is $80,000. On July 1, he sells all his stock to Donald for $125,000....
-
Which of the following costs are irrelevant to business decisions? a. sunk costs b. costs that differ between alternatives c. variable costs d. avoidable costs
-
The operations manager for Superfast Airlines at Chicagos OHare Airport noticed an increase in the number of delayed flight departures. She brainstormed possible causes with her staff; Aircraft late...
-
Transcribed image text: Assume a company's activity-based costing system includes three activities with the following activity rates: Activity Cost Pool Activity Rate Travel $ 2 per mile driven...
-
Organic Chemistry Structure and Function by Peter Vollhardt and Neil Schore 6th Edition, exercise 19-9. Someone please teach me. Exercise 19-9 Try It Yourself Using chemical equations, show how you...
-
Denial of service (DoS) attacks can cripple an organization that relies heavily on its Web application servers, such as online retailers. What are some of the most widely publicized DoS attacks that...
-
In a Proell governor, the mass of each ball is 5 kg and central load on sleeve is 50 kg. The length of each upper and lower arms is 250 mm. The minimum and maximum radii are 120 mm and 180 mm...
-
What is conjugate action in gears?
-
How a four-wheeled vehicle is affected by gyroscopic couple?
-
Explain path of recess and path of approach.
-
The arms of a Proell governor are 250 mm long. The upper arms are pivoted on the axis of rotation, while the lower arms are pivoted at a radius of 35 mm. Mass of each ball is 5 kg and is fixed to the...
-
If a right circular cone has a circular base with a diameter of length 16 cm and a volume of 3207 cm find its lateral area in square centimeters cm
-
A company pledges their receivables so they may Multiple Choice Charge a factoring fee. Increase sales. Recognize a sale. Collect a pledge fee. Borrow money. Failure by a promissory notes' maker to...
-
List three ways to use completed data flow diagrams.
-
Using the interview data you gained from the group exercise on Maverick Transport in Project 1, meet with your group to brainstorm the design of a questionnaire for the hundreds of truck drivers that...
-
List the two types of team leaders.
-
On the next assignment, the air force officer must leave from Travis Air Force base, visit Beal, Edwards, and Vandenberg Air Force bases each exactly once and return to Travis Air Force base. There...
-
False. Short-term bond prices are less sensitive than long-term bond prices to interest rate changes because funds invested in short-term bonds can be reinvested at the new interest rate sooner than...
-
A cashier rings up a sale for \(\$ 4.63\) cents in U.S. currency. The customer pays with a \(\$ 5\) bill. The cashier would like to give the customer \(\$ 0.37\) in change using the fewest coins...
Study smarter with the SolutionInn App