Sie sind auf Seite 1von 26

Software requirements

specification
"Fundamentals of Information
Systems“
Section No. 4
“Software Requirements”

CH: 2/2
4 Software Requirements
4.1 Requirements for the structure and
functioning of the IS.
4.2 Reliability requirements.
4.3.Security requirements.
4.4 Operation requirements.
4.5 Technical requirements.
4.6. Specific requirements.
4 Software requirements
4.1 Requirements for the structure and functioning of the IS.
4.1. 1 Software technology used.
4.1.2 IS Model.
4.1.2.1 Selection of the model.
4.1.2.2 Justification of the model chosen.
4.1.2.3 Construction of the general model.
4.1.3 IS Architecture.
4.1.4 information support requirements.
4.1.5. Software requirements.
4.1.6 Requirements to the construction of the algorithm.
IS Model
Model - a simplified representation of reality.
Model - a drawing of the system: it may be either
a detailed plan and a more abstract representation
of the system.
A good model always includes elements that
significantly affect the result, and does not
include those that are insignificant at this level of
abstraction.
Models allow us to demonstrate the desired
structure and behavior of the system.
Selection of the model
Main types of models to determine the type model suitable
for your problem:
Conceptual model,
 Model management,
ERD model for relational database
 Model complexity of educational content items
information model.
The choice of model has a decisive influence on the
approach to the problem and the way it will look like a
solution. In other words, the approach to the selection
model thoughtfully
examples of IS model
4.1.3 IS Architecture
the basic organization of the system represented in
its hardware, software and information
components and their relationships with each other
and with the environment, as well as the principles
governing the IS design and development.
Example 1: Architecture
Example 2: Architecture IS
Interface trainee

Module registration and The theo-retical Analytical data Practical module Control element
login module

DB
DB MS SQL
Mathematical Server 2000
  models
BR
Application
server.

Data analysis subsystem subsystem subsystem diagnostics expert


content subsystem

Block management control author module Module settings


(training parameters)
(loading rate)

Interface teacher
4.1.4 Requirements for IS information
support (Database )

Database Structure - data-logical (ER-


diagram or info-logical, physical
model). According to the UML,
Database is a class diagram with
relationships between database tables
Class Diagram example
An example of the IS video library database
structure (ERD)
4.1.6.2 Data Access Technology
ODBC- (Open Database Connectivity) Application
Programming Interface (API) for accessing
database management systems (DBMS). Designing ODBC
aimed to make Accessing DBMS independent of
database systems and operating systems.
OLE DB – (Object Linking and Embedding Database)
hybrid of ODBC and COM, to facilitate and access to
application data of different file formats, including
spreadsheets, structured query language (SQL)- database
management systems (DBMS), indexed-sequential files.
COM , Component Object Model, object-oriented system for
creating binary software components that can interact in a large
range of programming languages.
Data Access Technology, cont.,
MDAC- Microsoft Data Access Components - is the
common name for ODBC, OLE DB and ADO.
RDO- Remote Data Objects, is an application program
interface (API) from Microsoft that lets programmers writing
Windows applications, get access to and from both Microsoft and
other database providers.
DAO - Data Access Objects. provides an interface to some
type of database or other persistence mechanism
ADO- ActiveX Data Object. collection of software
components providing a programmatic interface to access
the data sources from client applications.
ADO.NET - The new generation of facilities for working
with data, where NET. components. are used instead of
ActiveX-components
4.1.6.3 Requirements to the user data
queries from the database
Query - output data, structured in a certain way
Example Higher Education Institutions (HEI)
DB:
o Give the list of IT student names beginning with A who
have at least one failure in the spring semester.
o Give the list of IS teachers of the first year whose students
showed the lowest academic performance but who score
highly in the "Teacher through the eyes of students“ survey.
4.1.6.4 Requirements to the source
code/programming languages
Specify the environment in which the programming
system will be implemented:
PHP
MS Visual Basic
MS Visual Basic.Net
MS Visual C++
MS Visual C#
MS Visual Java# etc.
4.1.6.5 Modern theories and methods of IS
development
Modern theories of IS development:
Decision theory
Expert systems
Decision tree
Game Theory
Neural networks and Neuroinformatics
Modern methods of IS development:
Methods and algorithms
Systems modeling and UML
Numerical methods
Cluster analysis
Database and knowledge base
Genetic algorithms and natural selection
4.1.7. OS requirements
Choose the Operating system that the software will
operate on.

4.1.8 Construction of the algorithm


There is no single "true" definition of "algorithm“
"Algorithm – is a finite set of rules /that defines the
sequence of operations/ to solve a specific set of tasks/
which has five important features: completeness,
certainty, input, output, efficiency." (D. E. Knuth)
Structural components of algorithms
 Terminator. Beginning or end of the
algorithm

 Data. Data Input and Output

 Process. Processing data of any kind

 Decision. switching off in decision-making

 Preparation. Command modification for


cyclic parameters.
4.2 Reliability requirements:
4.2.1 Requirements to ensure reliable operation of the IS
Reliability - is the probability of IS failure.
4.2.2 Recovery time after a failure.
Determine the recovery time of the program in case of IS failure.
4.2.3. Failures due to incorrect actions of the system users
Indicate what kind of failures may occur, and what actions need
to be taken to address them.
4.3. IS Security
4.3.1. Copyright protection
Copyright certificate and the author’s contact
information form.
4.3.2. Protection of information
4.3.2.1. Methods of protection
4.3.2.2. Protection algorithm
The specific algorithm of information security and
encryption methods.
4.3.2.3. Anti-virus Protection
4.3.2.4. Protection against attacks
4.3.2.5. Protection against hacking
Case 1
Draw a flowchart algorithm for the program
to calculate the total value of the customer
invoice which includes five product items P1,
P2, P3, P4, P5. If the total value of the
product items greater than 10000 L.E, the
customer will be granted 5% discount from
the total value. Your answer should include
identifying input, process and output in table
format.
Thank you for your
attention!

Das könnte Ihnen auch gefallen