Professional Documents
Culture Documents
SPECS Document
SPECS Document
SPECS Document
GUIDELINES:
Select a CASE of your interest for Application of Database Management Skills to Write a User
requirements and specification Document based on the discussion we have made on the
( Dream Home and ST-Lawrence CASE Studies).
Organizations have agreed to the scope of the work for the customization and implementation
of an open-source Name of Database Management system.
This section represents the acknowledgement from the key representatives from Your_Client
This section represents the acknowledgement from the Management representatives, who have
pledged support to the Team Leads and Project Managers.
This section represents the acknowledgement from the Project Management representatives,
whose responsibility involve coordination of activities and ensuring successful milestones
Acronyms.
Acronyms Description
1. Introduction
1.1 Purpose
2. Project Scope
The scope of this document describes what will be provided for in the customization of Name
of Database Management system, based on the system requirements described later in this
document. This will cover the following areas:
This section defines the overall business processes for consideration in customizing Name of
Database Management system. Where processes and requirements are exhaustive, they have
been documented as such, while others discuss templates for data capture.
{Describe the step-by-step processes that Name of Database Management system will need to
support. These are the business processes that were determined using the Collaborative
Requirements Development Methodology.
*NOTE: Alternatively, you can document the requirements by writing use cases.}
4. Standardized Data
1. Branch Details
2. Client Details
3. Branch Owner Details
4. Department
5. Division/Section
6. Geographical Country
Information
Region
District
Town/Constituency
Assumptions:
Dependencies:
{List dependencies.}
6. Nonfunctional Requirements
i. Archival Length of time data need to be retained within the Database Application; level of
difficulty to retrieve archived data.
ii. Auditability Ability of the Database Application to show what has happened to it, who did
it and when (audit trail, transaction changes, before/after pictures, etc.); includes
requirements for effective dating.
iii. Authentication Security requirement to ensure "you are who you say you are."
iv. Authorization Security requirement to ensure that users can access only certain functions
within the Database Application (by use case, subsystem, web page, business rule, field-
level, etc.).
vii. Configurability Ability for the end users to change aspects of the Database Application's
configuration easily (through usable user interfaces).
ix. Extensibility Ability to easily incorporate add-on modules of functionality to the Database
Application in production.
xi. Integratibility Ability for this Database Application to easily fit in as part of a larger system.
xii. Interoperability APIs required to allow other Database Applications to talk to this Database
Application easily. This is concerned only with the structure and ease of use of the APIs, not
the industry standard protocols.
xiii. Leveragability / Reuse Ability to leverage common components across multiple products.
xiv. Localization Support for multiple languages on entry/query screens, in data fields, on
reports, etc.; multi-byte character requirements; units-of-measure; currencies.
xv. Maintainability Amount of effort required to maintain and enhance the system.
xvii. Operability Easy of everyday operation; amount of qualification and training required for
operators to oversee and troubleshoot the system.
xviii. Performance Constraints in batch (overnight window) and online.
xix. Personalization Ability for individual users to personalize their view of the Database
Application.
xx. Portability Ability to easily move the Database Application to different hardware platforms,
operating systems, database management systems, network protocols, etc.
xxiii. Robustness Ability to handle error and boundary conditions while running (Internet
connection goes down, power outage, hardware failure/replacement, etc.).
xxiv. Scalability Ability to handle a wide variety of system configuration sizes and requirements.
xxv. Security General security requirements (encryption levels over the Internet, hacker-
proofing, viruses, etc.).
xxvii. Upgradeability Ability to quickly/easily upgrade from a previous version of this system to
a newer version on servers and clients (upgrade scripts versus manual upgrades).
xxviii. Usability / Achievability Level of training required for users to achieve their goals with the
system.
The nonfuctional requirements may also include business rules, such as the following:
Legal requirements
Political requirements
MANDATORY Appendices
Goals:
Needs:
Value:
Key features:
Contextual Diagram:
Decision Table:
Sequence Diagram: