Software Development Life Cycle ASM2
Software Development Life Cycle ASM2
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 M1 M2 D1 D2
❒ Summative Feedback: ❒ Resubmission
Feedback:
Unit Number and Title: Unit 09: Software Development Life Cycle
Academic Year:
Unit Assessor:
Submission Date:
Date:
Submission Format:
Format:
● You must use the Times font with 12pt size, turn on page numbering; set line spacing to 1.3
and margins to be as follows: left = 1.25cm, right = 1cm, top = 1cm, bottom = 1cm. Citation
and references must follow the Harvard referencing style.
Submission:
● Students are compulsory to submit the assignment in due date and in a way requested by the
Tutor.
● The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/.
● Remember to convert the word file into PDF file before the submission on CMS.
Note:
● The individual Assignment must be your own work, and not copied by or from another student.
● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style.
● Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply
this requirement will result in a failed assignment.
Tasks
At this stage, you have convinced Tune Source to select your project for development. Complete the
following tasks to analyse and design the software.
Task 1 – Analysis (1)
1. Identify the stakeholders, their roles and interests in the case study.
Review the requirement definition of the project. Clearly indicate which stakeholder(s) provide
what requirements.
3. Discuss how you would trace these requirements throughout the project by using Requirement
Traceability matrix. You will have to provide real usage of it.
Word limit: 400 – 500 words.
Scope: You only need to construct following items for the system. You will have to include:
Task 3 – Design
Based on the analysis result, discuss how you would conduct the design phase:
1. Discuss how the user and software requirements are addressed in the design phase.
You will explain how Mock-up, and Wireframe are used in the project. You should include
some of the mockup or wireframe (at least 5) design of the Tune Source project to justify that it
matches users’ requirements.
You will explain which architecture (client – server, n-tier, microservices, etc.) is suitable for
the project with clear illustrations and why.
Then you will address which technical solution stack could be suitable to implement the project
with clear explanations.
2. Discuss how activity diagram and pseudocode are used to specify the software behaviour.
3. Discuss how UML state machine can be used to specify the software behaviour. Differentiate
between FSM and extended FSM using the case study.
4. Discuss how the data-driven approach improves the reliability and effectiveness of software.
Word limit: 800 – 1500.
1. Discuss two software quality attributes that are applicable to the project.
2. Discuss two quality assurance techniques that can help improve the software quality in the project.
3. Discuss how the design techniques and approaches that you have used can help improve the
software quality.
Word limit: 400 – 1500.
Learning Outcomes and Assessment Criteria (Assignment 02):
Learning
Pass Merit Distinction
Outcome
P5 Undertake a software
investigation to meet a M3 Analyse how software D3 Critically evaluate
business need. requirements can be traced how the use of the
LO3 Undertake a throughout the software
P6 Use appropriate function design
software lifecycle.
software analysis paradigm in the
development
tools/techniques to carry M4 Discuss two software development
lifecycle
out a software approaches to improving lifecycle can improve
investigation and create software quality. software quality.
supporting documentation.
I. Requirement definition
1. Stakeholders
It has a link with the music business, according to the Tune Source scenario: John Margolis,
Megan Taylor, and Phil Cooper. John and Phil worked together to build multiple brick-and-
mortar stores in southern California selling hard-to-find and classical music, rock, country, and
folk recordings. Tune tune has recently partnered with an online consulting business (ISP). The
initiative is sponsored by Carly Edwards, Assistant Vice President, Marketing. Management: My
organization is now working with Tune Source to create the prototype. ABC's project manager is
myself. Device users include individuals who stream music from the Tune Source website and
those who utilize retail kiosks.
1.1. Internal Stakeholders
Internal Stakeholders are organizations, entities, or groups that have a vested interest in the
corporation's operations. You will have an influence on and be impacted by the entity's success
or failure, regardless of the organization's interests. Primary Stakeholders is the second phrase
for Internal Stakeholders.
Business Analysists
The business analyst serves as a liaison between the project's clients and the technical team of
software engineers. The business analyst for the project met with the project's clients, reviewed
the program, created requirements, reported, described the project to the technical team, and
engaged with them throughout the development process.
A commercial analysis
• Producing a comprehensive business analysis, identifying difficulties, opportunities, and
solutions for a company
• Forecasting and budgeting
• Preparation and oversight
• Financial analysis
• Analysis of Variation
• Costs
• Information gathering and dissemination
• Defining business requirements and communicating them to stakeholders
During the SDLC, the business analyst will do the following tas
• Help with business cases
• Carry out high-level feasibility analyses
• Compile prerequisites
• Develop and/or evaluate test scenarios for use in schools
• Dealing with change requests
• Requirements monitoring throughout implementation
• Managing the Project Scope
• The procedure includes approval, integration, and deployment.
System Analysis
Create an internet music system using the following components:
• Connects to a music distribution system over the internet.
• Data models and system performance
• Models of user interfaces and processes
• The user's perspectiv
• The procedure includes approval, integration, and deployment.
Project Manager
Oversee the whole Tune Source software development project to ensure quality, timeliness, and
budget compliance.
Programmer
As a group, we directly run software such as code configuration routines and database queries.
1.2. External Stakeholders
External stakeholders are persons who are not members of the management team but are
impacted in some manner by the company's activities. Outside parties influence the market
environment. Another term for them is secondary stakeholders. They are the ones that analyze
the company's financial data to learn about its efficiency, profitability, and liquidity. The
following individuals are external stakeholders in the Tune Source software development project
Tune Source’s Owner
Tune Source is situated in Los Angeles, California. Tune Source was developed by music
industry professionals
John Margolis, Megan Taylor, and Phil Cooper. The network chief is in charge of supervising all
operations.
They are in charge of all system work, employee actions, and other system-related activities.
They are in charge of installing and maintaining workstations. A secure login system must be
used to access all customer, employee, product, and service records
Sponsor
The sponsor for Tune Source Project is Carly Edwards
Users
The audience is defined as the general public. This episode is totally interchangeable with the
rest.
The target audience refers to the product's planned client base. This episode is a spin-off from the
original largeaudience show, and it focuses on small groups:
The customer is the one who will buy the merchandise.
Knowing about the product and convincing others to buy it KOL (Key Opinion Leader)
Someone who is aware of a product but has not yet acted on it.
Customers are the most significant stakeholders in network services. To select from Tune
Source's offers, they'll need to use a different login screen. They demand a demonstration of the
most recent products and services offered by Tuning Source. They must also question and offer
feedback on any concerns that develop. Customer = User: The buyer, sometimes referred to as
the User, is the one who pays for the goods. Customers are classified into two types:
Customers in the Trade Utilize the Product Consumer Resale Products = Final Customer = End
User (Trade) Clientele: A consumer may also be referred to as a product user or an end user.
Consumers are those who buy and use physical goods. End user: a person who uses intangible
items.
2. Identify stakeholders for Tune Source project
It has a link with the music business, according to the Tune Source scenario: John Margolis,
Megan Taylor, and Phil Cooper. John and Phil worked together to build multiple brick-and-
mortar stores in southern California selling hard-to-find and classical music, rock, country, and
folk recordings. Tune root has recently partnered with an online consulting business (ISP).
The initiative is sponsored by Carly Edwards, Assistant Vice President, Marketing.
Management: My organization is now working with Tune Source to create the prototype. ABC's
project manager is myself.
Device users include individuals who stream music from the Tune Source website and those who
utilize retail kiosks.
3. Requirement
We will work with stakeholders to develop the specs and include some of the fundamental
responsibilities that the project would necessitate. Let's begin by making an account, looking for
music, listening to it, and then placing an order. Before making an order, customers may also see
invoices and make adjustments to orders directly on the invoice. You may buy the music or pay
for a monthly charge and get unlimited downloads. The consumer can resume the update at any
point during the procedure. Customer information wouldbe kept confidential.
Functional requirements
As an example (Sommerville, 2016) Functional prerequisites These are assertions about the
services that the system should deliver, how the system should respond to inputs, and how the
system should behave in specific scenarios.
In certain circumstances, the functional requirements may expressly indicate what the system
should and should not accomplish.
Functional for Tune Source
Customers may use the internet or retail kiosks to search for and purchase digital music
downloads.
Special features include: • Search for songs in the optical media collection.
• Play the song you've chosen.
• Buy individual downloads for a fixed fee per copy.
• Create a consumer registration account and pay a subscription fee for limitless downloads.
• Purchase download-able tunes and presents.
Music selections will be personalized to the consumer on subsequent visits to the website based
on past sales. Customers' interests may be used to alert them of unique discounts on CDs that can
be purchased at the daily Tune Source web site or in a Tune Source shop.
Nonfunctional Requirements
Follow as (Sommerville, 2016) Non-functional requirements These are constraints on the
services or functions offered by the system. They include timing constraints, constraints on the
event process, and constraints imposed by standards. Non-functional requirements often apply to
the system as an entire instead of individual system features or services.
Nonfunctional for Tune Source
To make music finding easier, a digital music archive would be built.
If a customer's music transfer fails, he or she can choose to restart it or be routed to a backup
download link.
The download speed will be monitored and maintained at an acceptable rate (not too slow)
All client information would be kept strictly confidential.
All payment information will be kept strictly confidential.
1. Interview
As an example (Dennis, 2016) The interview is the most commonly used approach for eliciting
requirements. All things considered, it is normal—if you need to know something, you usually
ask someone. When everything is said and done, interviews are conducted one on one (one
questioner and one interviewee), however due to time constraints, a few persons may be met at
the same time. The meeting method consists of five major steps: selecting interviewees,
designing inquiry questions, preparing for the meeting, leading the meeting, and post-meet
growth.
The interviews are split into two categories:
• A private interview is one in which the interviewer prepares questions ahead of time and tries
to elicit replies from stakeholders.
• An open ended interview is one in which the interviewer does not need to arrange any
questions and the questions are completely random during the interview.
2. Joint Application Development (JAD)
5. Observation
As an illustration (Dennis, 2014) Observation, or the act of observing forms being carried out,
might be a beneficial strategy for integrating information into the current structure. Instead of
listening to how others depict a problem in interviews or JAD sessions, perception allows the
investigator to sense the reality of the issue. Several studies have indicated that many supervisors
do not recall how they function or how they spend their time. Perception may be an excellent
method for validating data obtained from other sources such as interviews and surveys. This
method is commonly used in conjunction with other processes that are required, such as
interviews and document analysis.
As an example (Dennis, 2014) Each of the requirements elicitation methodologies discussed has
advantages and disadvantages. There is no single approach that is always superior to the others,
and most businesses benefit from a combination of methods. As a result, it is vital to understand
the benefits and drawbacks of each method, as well as when to employ each. One point that has
gone unmentioned is the analysts' interaction. In general, report investigation and perception
require the least amount of preparation, whereas JAD sessions are the most difficult.
In general, assessing and viewing materials necessitates the least amount of training time,
whereas JAD sessions provide the most difficult problems. So we went with the technical
interview.
Analysis (2)
Introduce: Modeling techniques are based around the use of algorithms - sequences of
instructions for solving specific problems. You use a particular algorithm to create that type of
model.
Requirements Modelings is the process used in software development projects where
requirements and solutions constantly evolve through collaborative efforts and teamwork.
• Requirements modeling is essentially the planning stage of a software application or system.
• The process will begin when a business or an entity approaches a software development team
to create an application or system from scratch or update an existing one.
• Requirements modeling comprises several stages:
• Scenario-based modeling
• Data modeling
• Flow-oriented modeling
• Class-based modeling
• Behavioral modelling
1. ERD
Figure 6: ERD
The database of Tune Source may be viewed here. Tables such as Gift Code, Customer, Order,
Order Detail, Object, Type, and Admin are provided. The Gift Code table is used to keep track of
gift codes for consumers. The customer table is used to store customer information. The order
table contains information about customer orders. The order detail table stores customer
information. A product table stores song information. Create a table category to contain
information about the type of album
2. Flowchart
Search function
This is the website that customers visit when they are seeking for anything specific. When a
consumer enters a term into the search field, the system locates the answer and presents the full
result information, as well as a link to listen to the album.
Purchase & download function
4.Test case
Table 9: Test case
Conclusion
The following is the research and selection of a suitable plan to add to the Tune Source project. I
wrote the project specs, designed the user interface for Tune Source, and fully tested it
References
Dennis, W. R., 2014. In: B. L. Golub, ed. System analysis & design. s.l.:Don Fowley.
Dennis, W. R., 2016. System analysis & design. 10 ed. s.l.:Don Fowley.
Sommerville, I., 2016. Functional and non-functional requirements. Matt Goldstein ed. s.l.:Trudy
Kimber.
Sommerville, L., 2016. In: M. Goldstein, ed. Software Engineering. s.l.:Trudy Kimber, p. 113.