Professional Documents
Culture Documents
1631 -GCS200454-Vo Hoang Hien - Assignment 2 full-đã chuyển đổi
1631 -GCS200454-Vo Hoang Hien - Assignment 2 full-đã chuyển đổi
Learner’s name:
ID:200454
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P5 P6 P7 M3 M4 M5 M6 D3 D4
Summative Feedback: Resubmission Feedback:
Unit Number and Title: Unit 09: Software Development Life Cycle
Submission Date:
Date:
Submission Format:
Format:
● The submission is in the form of 1 document.
● You must use the Times font with 12pt size, turn on page numbering; set line spacing to 1.3 and
margins to be as follows: left = 1.25cm, right = 1cm, top = 1cm, bottom = 1cm. Citation and
references must follow the Harvard referencing style.
Submission:
● Students are compulsory to submit the assignment in due date and in a way requested by the Tutor.
● The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/.
● Remember to convert the word file into PDF file before the submission on CMS.
Note:
● The individual Assignment must be your own work, and not copied by or from another student.
● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style.
● Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply this
requirement will result in a failed assignment.
Tasks
At this stage, you have convinced Tune Source to select your project for development. Complete the following
tasks to analyse and design the software.
Task 1 – Analysis (1)
1. Identify the stakeholders, their roles and interests in the case study.
Review the requirement definition of the project. Clearly indicate which stakeholder(s) provide what
requirements.
Scope: You only need to construct following items for the system. You will have to include:
Task 3 – Design
Based on the analysis result, discuss how you would conduct the design phase:
1. Discuss how the user and software requirements are addressed in the design phase.
You will explain how Mock-up, and Wireframe are used in the project. You should include some of the
mockup or wireframe (at least 5) design of the Tune Source project to justify that it matches users’
requirements.
You will explain which architecture (client – server, n-tier, microservices, etc.) is suitable for the
project with clear illustrations and why.
Then you will address which technical solution stack could be suitable to implement the project with
clear explanations.
2. Discuss how activity diagram and pseudocode are used to specify the software behaviour.
3. Discuss how UML state machine can be used to specify the software behaviour. Differentiate between
FSM and extended FSM using the case study.
4. Discuss how the data-driven approach improves the reliability and effectiveness of software.
Word limit: 800 – 1500.
5. Discuss two software quality attributes that are applicable to the project.
6. Discuss two quality assurance techniques that can help improve the software quality in the project.
7. Discuss how the design techniques and approaches that you have used can help improve the software
quality.
Word limit: 400 – 1500.
Learning Outcomes and Assessment Criteria (Assignment 02):
P5 Undertake a software
M3 Analyse how software D3 Critically evaluate
investigation to meet a
requirements can be how the use of the
LO3 Undertake a business need.
traced throughout the function design paradigm
software P6 Use appropriate software software lifecycle. in the software
development analysis tools/techniques to
M4 Discuss two approaches development lifecycle
lifecycle carry out a software
to improving software can improve software
investigation and create quality.
quality.
supporting documentation.
5
Project analysis
................................................................................................................................................................
5
Methods of collecting information
................................................................................................................................................................
5
Observational Method
............................................................................................................................................................
5
Interview Method
............................................................................................................................................................
6
Questionnaires/Surveys
............................................................................................................................................................
7
Which method should we use for the current project?
................................................................................................................................................................
9
Step-to-step approach for Questionnaire method
............................................................................................................................................................
9
List of questions
................................................................................................................................................................
9
TASK 2
...................................................................................................................................................................
.
9
P6 Use appropriate software analysis tools/techniques
P a g e | 1 to carry out a software investigation and create
supporting documentation
..................................................................................................................................................................
9
Stackholders:
................................................................................................................................................................
9
Costs
................................................................................................................................................................
9
Security Considering
................................................................................................................................................................
10
Update Software
................................
............................................................................................................................ 10
SQL Injection
................................
............................................................................................................................ 10
Error Messages
................................
............................................................................................................................ 10
Validation of Data
................................
............................................................................................................................ 10
Passwords
............................................................................................................................................................
10
SSL
................................
............................................................................................................................ 10
Use case diagram
................................................................................................................................................................
11
Entity relationships diagram
................................................................................................................................................................
13
DFD
Page| 2
................................
................................................................................................................................ 14
TASK 3
...................................................................................................................................................................
.
22
P7 Explain how user and software requirements have been addressed.
....................................................................................................................................................................
22
Upload function
................................
................................................................................................................................ 23
Browse the song function
................................................................................................................................................................
24
Reference
...................................................................................................................................................................
.
25
TASK 1
P5 Undertake a software investigation to meet a business need.
1 The requirement definition of the project
-Project requirements are conditions or tasks that must be completed to ensure the success or
completion of the project. They provide a clear picture of the work that needs to be done. They're
meant to align the project's resources with the objectives of the organization. The benefits of
effectively gathering project requirements include cost reduction, higher project success rates,
more
effective change management, and improved communication among
stakeholders. 2 stackehotder and thir roles in Tune Source Project
-John Margolis, Megan Taylor, Phil Cooper: Co-Founders of Tune Source
-Carly Edwards: Project Sponsor, Assistant Vice President, Marketing
Costs:
Web Server Free to Pay-as-use
Domain Name $500
Page| 3
SSL certificate $100
Website development team $8000
Website maintenance $400
Contents manager system $900
E-commerce functionality $2000
Function Description
Search for music Help people find their favorite song quickly
purchase individual Download purchased music files to store them locally or to import them to
downloads another media player, like iTunes or Windows Media Player.
2. Non-functional reqirements
1. Operational requirements
- Investigating the factors that drive requirements change is an important prerequisite
for understanding the nature of requirements volatility. This increased understanding will improve the
Page| 4
process of requirements change management. We mainly focus on change analysis to identify and
characterize the causes of requirements volatility. We apply a causal analysis method on change
request data to develop a taxonomy of change. This taxonomy allows us to identify and trace the
problems, reasons and sources of changes. Adopting an industrial case study approach, our findings
reveal that the main causes of requirements volatility were changes in customer needs (or market
demands), developers' increased understanding of the products, and changes in the organization
policy. During the development process, we also examined the extent of requirements volatility and
discovered that the rate of volatility was high at the time of requirements specification completion
and while functional specification reviews were conducted.
2. Performance requirements
-In the process of implementing the software, I always interact regularly with
customers, get reviews as well as feedback from customers to adjust to suit their needs, add closed
comments from customers to build get the best quality
-By using special character on the input, hacker can simply hack into the
Database system and cause damage to the data.
Error Messages
-Too specific error message will give out a ton of information to the outsider – which in
the beginning, does not need to know too much about the system
¶ Validation of Data
- The passwords must be long enough to keep the chance of being hacked low, the
recommendation is at least 8 characters with both number, normal, upper key and special
character
SSL
-Passing personal information between client and server should be done
through SSL
protocol
3.2.4 Cultural and political requirements
-Always check uploaded music that has nothing to do with religion or
politics
4 The relationships between the Ers and NFRs
P6 Use approprilate software analysts tools/techniques to carry out a software investigations and
create supporting documenttation
1. Software requirements modeting(use case diagram-ucd)
2. Use case specification
Page| 6
3.process modeting (data Flow Diagrram-DFD)
Page| 7
Description Buy the song customer want
Actor User
Pre-condition 1. User account have enough currency to purchase the song
2. Song is available to download
Normal Course 1. Search the song using song ID or song Name
2. Purchase the song
Post-condition User successfully purchase the song
Page| 8
Normal Course 1. Search the song admin want to delete
2. Delete the song
3. Save action
Post-condition The song got deleted successfully
Page| 9
Entity relationships diagram
Entity Description
Admin The manager of the whole system
Customer The user of the system
Song Thing being listen/bought by customer
Purchase The detail of what the customer have bought
CD Information of the song being bought by customer
DFD
DFD of the whole system
P a g e | 10
P7. Explian how user and software requirements have been addressed
Tune Source’s project is a big project that provided high quality music for customer with many
other functions, and those functions will be implemented by many other ways (frontend and
backend) to show the behavior and effectiveness of the software For example, the upload function
Upload function
This function can only be used when using admin account. It allows admin to add a new song to
the
database. When upload the new music, the admin will also check with the SQL to see if that song is
existed in the same CD category before.
Front-End for upload function
We can use language like HTML5 and CSS to display the UI so that user will get the better
experience on web browsing
1. Wireframe desgin
1. site map
P a g e | 11
-Back-end for upload function
-We can use C# and connect to SQL to link to the data of Tune Source system so that
P a g e | 12
we can work with the information in there.
1.3 search page
-This function can be used by both customer (the owner of this account) and
admin. This function allows user and admin to search for the available song
(return nothing if there is no matched search result)
-Front-End for Browse function
-We can create a search box to design the interface in HTML5 and CSS so that user
can use it easier
-Back-end for Browse function
We can use C# to retrieve the data from database and return the result to result
page
P a g e | 14
1.5 login page
P a g e | 16
Reference
1. Ngoconnect.net. (2019). [online] Available at: htt
ps://www.ngoconnect.net/sites/default/files/resources/Perf
ormance%20M%26E%20TIPS-
%20Using%20Direct%20Observation%20Techniques.pdf
[Accessed 22 Aug. 2019].
2. Guides.lib.vt.edu. (2019). Research Guides: Research
Methods Guide: Interview Research. [online] Available at:
https://guides.lib.vt.edu/researchmethods/interviews
[Accessed 22 Aug. 2019].
3. shareyouressays. (2019). essay-on-questionnaire-method-of-
data-collection. [online] Available at:
http://www.shareyouressays.com/essays/essay-on-
questionnaire-method-of-data-collection/87509 [Accessed 22
Aug. 2019].
4. Measuringu.com. (2019). observation-role. [online] Available
at: https://measuringu.com/observation-role/ [Accessed 22
Aug. 2019].
5. https://testpoint.com.au/11-ways-to-improve-software-
quality/
P a g e | 17