Professional Documents
Culture Documents
Activity 4 Final
Activity 4 Final
4
REQUIREMENT DETERMINATION
FUNCTIONAL REQUIREMENTS
NON-FUNCTIONAL
SYSTEM REQUIREMENTS
REQUIREMENTS
Technical The system can be used even when
2.1 Environment the network is unavailable or offline.
OPERATIONAL The system must be able to
interface with other programs and
tools used by the Cadet Officers of
System
Integration the 1202nd CDC, including systems
for email and messaging, training
management, and other similar
programs.
The system must be designed to be
easily portable to other
Portability environments, such as different
operating systems, hardware
configurations, or cloud platforms.
The system must be designed to be
easily maintained, including making
updates and bug fixes, and adding
new features.
The code should be well-
Maintainability
documented, easy to understand,
and follow industry best practices.
The system should also be designed
to facilitate testing and debugging, to
make maintenance easier.
The system must be designed to
2.2
provide fast response times to user
Performance
requests.
Speed The system should also be
optimized for fast database queries
and efficient use of system
resources.
The system must be designed to
handle a large number of concurrent
Capacity users.
The system should also be able to
handle a large amount of data.
The system must be available to
users at all times.
The system should also be designed
to recover quickly from any failures
or disruptions.
The system must be designed to be
Availability and
Reliability reliable, with a minimum of 99.9%
successful transactions per day.
The system should also be designed
to handle errors and exceptions
gracefully, with appropriate error
messages and error handling
procedures.
The system must be designed to
2.3 provide accurate and reliable value
Security estimates for user accounts and
System Value
Estimates data.
The system should also be designed
to store and retrieve value estimates
quickly and efficiently.
The system must be designed to
provide secure access control, to
ensure that only authorized users
have access to the system and user
Access Control data. This includes measures such
as password policies, multi-factor
authentication, and role-based
access control, with a minimum of
two-factor authentication for
privileged users.
Encryption and The system must be designed with
Authentication encryption and authentication in
mind, to protect user data and
prevent unauthorized access. This
includes measures such as
encryption of sensitive data, secure
login and authentication procedures,
and secure communication
protocols.
The system must be designed to
protect against viruses, malware,
and other malicious software, with
appropriate virus control measures
Virus Control in place. This includes measures
such as regular virus scans, virus
definition updates, and firewalls, with
a maximum time of 24 hours for
virus definition updates.
At least three languages must be
2.4
supported by the system, which
Cultural and
must be built to support multiple
Political
Multilingual languages. Additionally, the system
needs to be created with concise
and clear language translation tools
to make it simple to translate user
interface components.
The system must be designed to
allow customization, to meet the
specific needs of different users and
organizations. This includes
Customization measures such as customizable
user interfaces, customizable
workflows, and customizable
reporting tools, with a maximum of
10 customization options.
The system must be built to make
implicit norms explicit in order to
prevent misunderstandings and
misconceptions. A maximum of
Making Unstated
Norms Explicit three clicks are required to obtain
any help or documentation, and this
includes measures like clear and
simple user manuals, help and
documentation, and tooltips.
The system must be designed to
comply with all legal requirements,
including data protection and privacy
laws. This includes measures such
Legal as secure data storage and
transmission, data retention policies,
and clear and concise privacy
policies, with a minimum of 90 days
of data retention.