0% found this document useful (0 votes)
371 views

Assignment 2 Môn SDLC

The document provides details on an assignment for a software development lifecycle unit. It outlines 4 tasks to complete: 1) produce requirements for a music streaming software called Tune Source using requirements gathering techniques, 2) create use case, entity relationship, and data flow diagrams, 3) show how requirements are addressed using software behavioral specification methods, and 4) create a report on improving software quality through tracing requirements and design. It also lists the learning outcomes and assessment criteria for the unit, which focus on undertaking the software development lifecycle and discussing software behavioral design techniques.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
371 views

Assignment 2 Môn SDLC

The document provides details on an assignment for a software development lifecycle unit. It outlines 4 tasks to complete: 1) produce requirements for a music streaming software called Tune Source using requirements gathering techniques, 2) create use case, entity relationship, and data flow diagrams, 3) show how requirements are addressed using software behavioral specification methods, and 4) create a report on improving software quality through tracing requirements and design. It also lists the learning outcomes and assessment criteria for the unit, which focus on undertaking the software development lifecycle and discussing software behavioral design techniques.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

Higher Nationals in Computing

UNIT 5

Software Development Life


Circle
ASSIGNMENT
No.2

Learner’s name: THAI THI THANH

THAO

Assessor name: Huynh Nhat Nam

Class: GCS0805_NX

Learner’s ID: GCS190293

Subject’s ID: 1631

Assignment due:

Assignment submitted: 28TH. NOVEMBER


ASSIGNMENT 2 BRIEF
Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 9: Software Development Life Cycle

Assignment title Undertake a Software Development Lifecycle

Academic Year

Unit Tutor Huynh Nhat Nam

Issue date Submission date

IV name and date

Submission Format:

Format: The submission is in the form of 1 document


You must use font Calibri size 12, set number of the pages and use multiple line spacing at
1.3. Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm. The reference
follows Harvard referencing system.
Submission Students are compulsory to submit the assignment in due date and in a way requested
by the Tutors. The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/
Note: The Assignment must be your own work, and not copied by or from another student or from
books etc. If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style. Make sure that you know how to reference
properly, and that understand the guidelines on plagiarism. If you do not, you definitely get failed

Unit Learning Outcomes:

LO3 Undertake a software development lifecycle


LO4 Discuss the suitability of software behavioural design techniques

Assignment Brief and Guidance:

Task1

Page 1
Now your team had been accepted to create the Software to Tune Source. As a member of a
development team, your task now is to produce the requirements for Tune Source. You also need to
specify the technique(s) or processes you used in order to get these requirements.
Task 2
Based on the requirements which established in Task1 provide the following diagrams: Use Case, ERD,
DFD. which can help to identify more clearly about the system you are going to implement.
Task 3
Based on your understanding about the Tune Source’s requirements in Task1 and Task 2, show how
the requirement can be addressed. Your method could include software behavioural specification
methods and reliability and effectiveness of software.
Task 4
Your client want to improve the software quality. Create a report which shows how software quality
could be improved from tracing requirements and program design.
Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO3 Undertake a software development lifecycle

P5 Undertake a software M3 Analyse how software D3 Critically evaluate


investigation to meet a requirements can be how the use of the
business need. traced throughout the function design paradigm
software lifecycle. in the software
development lifecycle can
P6 Use appropriate M4 Discuss two improve software quality.
software analysis approaches to improving
tools/techniques to carry software quality.
out a software
investigation and create
supporting
documentation.

LO4 Discuss the suitability of software behavioural


design techniques
D4 Present justifications
P7 Explain how user and M5 Suggest two software of how data driven
software requirements behavioural specification software can improve the
have been addressed. methods and illustrate reliability and
their use with an effectiveness of software.
example.

M6 Differentiate between
a finite state machine
(FSM) and an extended-
FSM, providing an
application for both.
Table of Contents
TASK 1..........................................................................................................................................................5
P5 Undertake a software investigation to meet a business need...................................................................5
What is a stakeholder?...............................................................................................................................................5
Project analysis..........................................................................................................................................................5
Methods of collecting information.............................................................................................................................5
Observational Method.......................................................................................................................................................................6
Interview Method..............................................................................................................................................................................7
Questionnaires...................................................................................................................................................................................8
Which method should we use for the current project?............................................................................................10
Step-to-step approach for Questionnaire method.........................................................................................................................10
List of questions:..............................................................................................................................................................................10

TASK 2........................................................................................................................................................10
P6 Use appropriate software analysis tools/techniques to carry out a software investigation and create
supporting documentation..........................................................................................................................10
Stackholders of the current system..........................................................................................................................10
Security Considering.................................................................................................................................................11
Update Software..............................................................................................................................................................................11
SQL Injection....................................................................................................................................................................................11
Error Messages................................................................................................................................................................................11
Validation of Data............................................................................................................................................................................11

TASK 3........................................................................................................................................................23
P7 Explain how user and software requirements have been addressed.......................................................23
Browse the song function.........................................................................................................................................25
Reference...................................................................................................................................................26
TASK 1

P5 Undertake a software investigation to meet a business need.


What is a stakeholder?

A stakeholder is a party that has an interest in a company and can either affect or be affected by the business.
The primary stakeholders in a typical corporation are its investors employees, customers, and suppliers.
However, with the increasing attention on corporate social responsibility the concept has been extended to
include communities,governments,associations.(https://www.investopedia.com/terms/s/stakeholder.asp)

Stakeholders can be internal or external to an organization. Internal stakeholders are people whose interest
in a company comes through a direct relationship, such as employment, ownership, or investment. External
stakeholders are those who do not directly work with a company but are affected somehow by the actions
and outcomes of the business. Suppliers, creditors, and public groups are all considered external
stakeholders.

Stackholders of the current system


 John Margolis, Megan Taylor, Phil Cooper: Co-Founders of Tune Source
 Carly Edwards: Project Sponsor, Assistant Vice President, Marketing
 Huynh Nhat Nam: Project Manager

Project analysis
In order to obtain the data required for project development, interactions between designers and clients
are required in every phase of scheme growth. The customer data on implementation issues should be
searched and analyzed at every point. When analyzing feasibility, the broader questions are relatively
general, for example: What is the scope of the problem, what is the best way to automate? No, or financial
viability...
If we have to analyze the project-related information or project related objects during the analysis phase,
then what feasible options can be used for the project and information. Details about this? There was a
mistake. So how can we collect sufficient information to help develop applications?

Methods of collecting information


Many common methods are employed to collect business users ' requests. There are a number of software
system-specific techniques or some kind of user interface, some of which may be used in any working
method.
This illusion contains the picture description for Observational method (measuring 2019)
Observational Method

Developers often use observation techniques to leverage and evaluate data through professional observation
and teaching, or working environments. This method is used to determine how requirements, growth
possibilities or a business method can be identified, to establish and evaluate the effectiveness of proposal, to
recommend and to offer the highest quality alternatives for developing a design. Furthermore, this technique
is often used together with other techniques to verify the precision of the information being collected.
There are two basic approaches to observation techniques: Active and passive
Active Method: The investigator will ask any concerns concerning data about the problems necessary
to create the software project when monitoring the method of operating on an object. Although this
technique creates an unsafe working flow disturbance of the job or observer item, designers can rapidly
comprehend why hidden activities and procedures are involved in a workflow.

Passive Method: The way the participants observe and gather data on the work process of the observant's
item is the technique through which they silently observe and retrieve. The advantage of this method helps
designers to see how actually the piece of nature functions. The best way to gather the information needed
to develop the project is to provide assessments and analysis. In order to best gather data, researchers can
use special technical equipment.
Interview Method
Method for questioning chosen topics is the information gathering technique. This is the only way to know
the opinions and plans of our customers. But there are also certain disadvantages to the interview method.
It is elevated price, time consuming and sometimes the gathered data is not adequate and needs the
interviewer to have some expertise or operating environment.

This illusion contains the picture description for Observational method (guides 2019)
Today, many techniques of interview are available, for example individual surveys, concentrate community
meetings, telephone and courier surveys. The benefits and disadvantages of each technique will be their
own.

Personal interviews: The method of interviewing and interviewing persons to meet and discuss directly is
personal interview techniques. The interviewer can change questions or explain issues if the respondent
fails to understand the matter. This technique offers a greater flexibility than others.
Direct interviews will probably obtain more data from the client-replying questionnaire, as the interviewer
can see to obtain further information on the interviewer by observation (environmental work, attitude,
behaviour, costumes). The ability to interview and communicate or negotiate will be implemented and the
quality and quantity of information obtained shall be determined.
Group Interview: The interviewer will encounter with a team of 5 to 10 individuals in a pleasant
atmosphere in the focus group study method, which helps interviewees and interviewed persons to think
safe. Closer to the ceiling and close. The interviewer will prepare the open questions during the interview
process to encourage the customers to discuss the issues raised freely. In order to gain a better
understanding of the client's position on a problem, the interviewer can make consecutive questions. The
aim of collective interview methods is to provide ideas and ideas to be evaluated and further evaluated by
means of surveys and data obtained. This method is also used to learn more about the behavior of
consumers. Nevertheless, the method of immediate contact has elevated price disadvantages; the
interviewer has a lengthy history in leading and suggesting various questions during the debate.

Phone interviews and Mail interviews:


Phone interviews: is an analysis subject method by telephone. The feasibility of this technique is increased
with the support of technological equipment. High capability responses can be collected. The advantage of
telephone interviews is that access to them is quick, easy to manage, regardless of distance. The downside
of this technology is not suitable for complex interviews with nature; the behavior of changing objects is
not observed.

Mail interview: is the technique by e-mail to the interviewee by issuing a questionnaire. The receiver simply
has to check and send the questions to the interviewer. The benefit is that the designer does not need
communication or negotiation skills because he is not faced with the test, the test findings are not partial.
Costs for interviews are significantly smaller than for other interviews. The disadvantage of this method is
that it is time consuming and not suitable for specialized problems.

Due to their own advantages and disadvantages in each data collection method. Consequently, individuals
often merge various techniques for collecting and assessing the finest in project development.

Questionnaires

You must have excellent information if you want to get a nice research paper. And if you want excellent
data, a nice questionnaire or study must be designed and implemented. Data collection techniques for
generating a useful study paper are quite distinct.
This illusion contains the picture description for Questionnaires/Survey method (Shareyouressays 2019)
The most prevalent and simplest study to do, however. This way you can create a survey, then submit it to
many individuals, then use these responses for analyzing and evaluating information.
In other words, you will use questions to rate your consent and usually ask questions like the image above
in the questionnaire article. Moreover, you can also collect information by using YES / NO questions.
Good data collection. You have to make sure that those who reply to your questionnaire have to respond
responsibly, seriously and not randomly. If too many people harass, the data you collect will not be
different from a stack of waste and bad results. Then, how can good data collection be guaranteed?

 In the case of the respondent, it is very difficult for people, especially if people have no benefit, to
ask them to answer their questionnaire fully seriously. So, I want excellent information. Give the
answering individual a tiny donation that will assist them to respond more severely.

 The questionnaire should be translated into a language that is familiar to you. If you write a
questionnaire in competent English it is not permissible for the respondents to fully comprehend or
misinterpret the material that contributes to inaccurate responses. This helps you to achieve better
results.
 Take charge of the questionnaire slightly by slightly, do not be careless about it, look for a
questionnaire issue or time to reply all questions How soon does it take? Please put yourself in the
situation of the respondent to see if your survey is dull or hard to reply. Before you give it to the
user, please check and check many times.
Which method should we use for the current project?
If the decision is left to me alone to decide, I would like to take the Questionnaires methods. We will get
valuable information just from UX, and we also collect the necessary information (which may become
crucial) to aid to our decision.

Step-to-step approach for Questionnaire method


 Step 1: Determine the important information we need to
know
 Step 2: Who will the Survey be sent
 Step 3: Which collection methods will be used (mail, email,
phone) Step 4: What kind of questions will be asked
 Step 5: Make sure the questions can only give out the potential respondents, revise questions if
necessary
 Step 6: Distribute the questionnaire
 Step 7: Chase for the
answer
 Step 8: Analyze the
result
 Step 9: Make use of the
result

List of questions:
1. How big is the current Tune Source’s system?
2. What is the scope of this Tune Source’s project?
3. How the risk being controlled in the past Tune Source’s system?
4. How big is the budget for this current project?
5. How is this project being paid? (following successive paying method?)
6. Which function will be needed for this project?
7. What data will be handled to us (the IT company) to process?
8. How will this project end?
9. What is our (the IT company) rights?
10. When is the deadline?

TASK 2
P6 Use appropriate software analysis tools/techniques to carry out a software investigation and create
supporting documentation
Stackholders of the current system
- John Margolis, Megan Taylor, Phil Cooper: Co-Founders of Tune Source
- Carly Edwards: Project Sponsor, Assistant Vice President, Marketing
- Huynh Nhat Nam: Project Manager
Costs:
Web Server Free to Pay-as-use
Domain Name $500
SSL certificate $100
Website development team $8000
Website maintenance $400
Contents manager system $900
E-commerce functionality $2000

Security Considering
Over the years, system safety is one of the worst issues. Today's technology is increasing, and the risks to
safety are also more advanced and harmful. We also evaluated and provided some safety alternatives for
the digital music devices in response to safety hazards for TuneSource's internet initiative, and we will
subsequently provide a few alternatives. Tune Source scheme has been used for security.

Update Software
An Up-to-date software will help a lot with security since almost all the visible bugs has been handled by a
third-party company

SQL Injection
By using special character on the input, hacker can simply hack into the database system and cause
damage to the data.

Error Messages
Too specific error message will give out a ton of information to the outsider − which in the beginning, does
not need to know too much about the system

Validation of Data
Should be done from both side, server and client

Passwords
The passwords must be long enough to keep the chance of being hacked low, the recommendation is at
least 8 characters with both number, normal, upper key and special character

SSL
Passing personal information between client and server should be done through SSL protocol
Entity relationships diagram
DFD
DFD of the whole system
Flowchart

Name Flowchart

Browse
Listen the
Song
Purchase
Manage
information
of user
Upload
Song
Delete
Song
Edit Song
State Machine
TASK 3

P7 Explain how user and software requirements have been addressed

Tune Source’s project is a big project that provided high quality music for customer with many other
functions, and those functions will be implemented by many other ways (frontend and backend) to show the
behavior and effectiveness of the software

For example, the upload function

Upload function
This function can only be used when using admin account. It allows admin to add a new song to the
database. When upload the new music, the admin will also check with the SQL to see if that song is existed
in the same CD category before.

Front-End for upload function


We can use language like HTML5 and CSS to display the UI so that user will get the better experience on
web browsing

Back-end for upload function


We can use C# and connect to SQL to link to the data of Tune Source system so that we can work with the
information in there.
Another example of Browse (search) function

Browse the song function


this function can be used by both customer (the owner of this account) and admin. This function allows
user and admin to search for the available song (return nothing if there is no matched search result)

Front-End for Browse function


We can create a search box to design the interface in HTML5 and CSS so that user can use it easier

Back-end for Browse function


We can use C# to retrieve the data from database and return the result to result page
Reference

1. Ngoconnect.net. (2019). [online] Available at:


https://www.ngoconnect.net/sites/default/files/resources/Performance%20M%26E%20TIPS-
%20Using%20Direct%20Observation%20Techniques.pdf [Accessed 22 Aug. 2019].
2. Guides.lib.vt.edu. (2019). Research Guides: Research Methods Guide: Interview Research. [online]
Available at: https://guides.lib.vt.edu/researchmethods/interviews [Accessed 22 Aug. 2019].
3. shareyouressays. (2019). essay-on-questionnaire-method-of-data-collection. [online] Available at:
http://www.shareyouressays.com/essays/essay-on-questionnaire-method-of-data-collection/87509
[Accessed 22 Aug. 2019].
4. Measuringu.com. (2019). observation-role. [online] Available at:
https://measuringu.com/observation-role/ [Accessed 22 Aug. 2019].

You might also like