Sie sind auf Seite 1von 5

6.

0 Requirements Specification for Evaluation



The study aims to thoroughly evaluate the packet tracer by the
researchers. Furthermore, the evaluators would like to know what are the
major strengths and major weaknesses of the software to use as a basis for
recommendation for future modification and enhancement. Packet Tracer is
important because it allows students to experiment with network behavior
without the need for real equipment and it also allows the teachers/instructors
to assess the skills of a student. The impact of our evaluation is to make the
packet tracer more efficient, reliable, and scalable for the users of this
software will be satisfied.

6.1 Software Evaluation Criteria
The researchers used the standardized criteria to understand the
functions and to evaluate the software. They only covered four (4) aspects of
the software.
The criteria to evaluate are the only appropriate to the software.
For each applicable criterion, rate the program:
5 = Outstanding 4 = Good 3 = Satisfactory 2 = Poor 1 = Unsatisfactory

6.1.1 Information in the Program
These information criteria cover the following aspects of the
program: relevance to the audience, appropriate language,
organization of the information, and information quality.

6.1.2 User Interaction
These criteria cover the user's interaction with the program, the
objectives and features of the program, and your analysis of it.

6.1.3 Technical Aspects of the Software and Materials
These criteria cover aspects of the computer hardware and
programs.


1. The information is clear, concise, and informative to the
intended audience
5 4 3 2 1
2. The content is free from spelling and grammatical errors 5 4 3 2 1
3. The information for each topic encourages comparisons
among schools or occupations
5 4 3 2 1
4. Information about educational programs covers program
objectives, specialties, degrees conferred, sample courses, and
schools offering the program
5 4 3 2 1
1. The language in the program and in the user's guide is clear
to the intended audience
5 4 3 2 1
2. The individual can operate the program independently,
creating his or her own sequence of presentation and review
5 4 3 2 1
3. The program acknowledges input. Feedback on user
responses is employed effectively

5 4 3 2 1
4. Invalid commands are handled constructively. The program
tolerates variations in command formats (e.g., upper or lower
case, extra spaces, etc.)
5 4 3 2 1
5. Individuals can easily start and exit the program. It is easy to
back up, change answers, and give commands

5 4 3 2 1
6.1.4 Career Development Process
These criteria evaluate the compatibility of the program
with important career development principles.


1. Computer capabilities such as graphics, color, or sound are
used for appropriate instructional reasons
5 4 3 2 1
2. If the program requires special equipment, the requirements
are minimal and clearly stated by the developer

5 4 3 2 1
3. The program is reliable in normal use. Software is bug free 5 4 3 2 1
4. The program provides a copy or summary of its basic
information to the user for future reference
5 4 3 2 1
5. Updates can be loaded easily into the system

5 4 3 2 1
1. The program motivates individuals to develop their own career
plans
5 4 3 2 1
2. The program fosters self-knowledge relevant to work and
learning

5 4 3 2 1
3. The program helps individuals to integrate and develop their
values, interests, abilities, skills, and goals

5 4 3 2 1
4. Using the program broadens an individual's awareness of
current options for employment and education

5 4 3 2 1
5. The program provides information that can be useful in
instruction
5 4 3 2 1


6.2 Software Testing Procedures

6.2.1 Interface Test
The interface of the software was tested by the researchers to
check if they work properly. The researchers validate that the functionality of
the interfaces has no problem.

6.2.2 Usability
The researcher verifies that the user interface is easy to use and
understand.

6.2.3 Security
Testing is done by the researchers which confirm that the program can
restrict access to authorized personnel and that the authorized personnel can
access the functions available to their security level.

7.0 Software Enhancement Specification
Indeed the software selected by the researchers contains primarily
necessary functions for its purpose. However, there are possibility for enhancements
and opportunities identified by evaluators as main components and factors to attract
more users such as students, teachers, and even network engineer to use the
software product, creates a more engagement with users, eliminate unnecessary
procedures which prolong the navigation of users before it can use a certain
function.


7.1 Proposed Additional Features and Functions















The researchers thought of taking an additional tool for designing
network cable lines. Having this new feature, the user is able to control the
flow of the cables. It is necessary to arrange the cables properly when
presenting a logical network layout.

Das könnte Ihnen auch gefallen