Software Engineering. Lecture 10
|
|
- Gillian Dorsey
- 5 years ago
- Views:
Transcription
1 Software Engineering Lecture 10
2 1. What is software? Computer programs and associated documentation. Software products may be: -Generic - developed to be sold to a range of different customers - Bespoke (custom) - developed for a single customer according to their specification
3 What is software engineering? Software engineering is an engineering discipline (regulation), which is concerned with all aspects of software production. Software engineering is concerned with theories, methods and tools for professional software development
4 2. Software Requirements In this section we want to: To introduce the concepts of user and system requirements To describe functional and non-functional requirements To explain two techniques for describing system requirements To explain how software requirements may be organized in a requirements document
5 2.1 Requirements engineering Requirement Engineering: The process of establishing the services that the customer requires from a system and the constraints under which it operates and is developed Requirements: are the descriptions of the system services and constraints that are generated during the requirements engineering process
6 2.2 What is a requirement? It may range from a high-level abstract statement of a service or of a system constraint to a detailed mathematical functional specification
7 Requirements Levels of description: - requirements definition: high-level abstract description of requirements - requirements specification: detailed description of what the system should do - Software specification: More detailed description
8 Requirement Abstraction (Davis) Requirements may serve a dual function May be the basis for a bid for a contract - therefore must be open to interpretation May be the basis for the contract itself - therefore must be defined in detail Both these statements may be called requirements
9 2.3 Types of requirement User requirements (requirements definition): Statements in natural language plus diagrams of the services the system provides and its operational constraints. Written for customers System requirements (requirements specification): A structured document setting out detailed descriptions of the system services. Written as a contract between client and contractor Software specification: A detailed software description, which can serve as a basis for a design or implementation. Written for developers
10 Example: User requirement: 1. The software must provide means of representing and accessing external files created by other tools. System requirements 1.1 the user should be provided with facilities to define the type of external files. 1.2 each external file type may have an associated tool which may be applied to the file 1.3 each external file type may be represented as a specific icon on the users display
11 2.4 Functional and non-functional requirements Functional requirements: Statements of services the system should provide, how the system should react to particular inputs and how the system should behave in particular situations.
12 Functional requirements What inputs system should accept? What outputs system should produce? What data the system should store? What computations system should perform?
13 Non-functional requirements Non-functional requirements: constraints on the services or functions offered by the system such as timing constraints, constraints on the development process, standards, etc.
14 Example User requirement Functional requirement: A need for an authorization facilities in the system Non Functional requirement: security
15 2.4.1 Functional requirements Describe functionality or system services Depend on: 1. the type of software 2.expected users 3.type of system where the software is used
16 Functional user requirements may be highlevel statements of what the system should do Functional system requirements should describe the system services in detail (inputs, outputs)
17 Examples of functional requirements for a university Library system The user shall be able to search either all of the initial set of databases or select a subset from it. The system shall provide appropriate viewers for the user to read documents in the document store. Every order shall be allocated a unique identifier (ORDER_ID)
18 Requirements imprecision Problems arise when requirements are not precisely stated Ambiguous requirements may be interpreted in different ways by developers and users results in: delays system delivery, increase cost Consider the term appropriate viewers User intention - special purpose viewer for each different document type Developer interpretation - Provide a text viewer that shows the contents of the document.
19 Requirements completeness and consistency In principle requirements should be both complete and consistent Complete: They should include descriptions of all facilities required Consistent: There should be no conflicts or contradictions in the descriptions of the system facilities In practice, it is impossible to produce a complete and consistent requirements document
20 Functional Requirements Examples
21 Example 1: Withdrawing money from ATM The system shall provide an option to withdraw money. The system shall query the user for the amount of money. The system shall query the user for the account type. The system shall validate the amount is available in the user s account before releasing funds to the user.
22 Example 1: Withdrawing money from ATM The system shall validate the amount is a multiple of $20. The system shall debit the user s account upon withdrawal of funds. The system shall be able to issue a specific amount of money to the user.
23 Examples of BAD Functional Requirements The system shall validate and accept credit cards and cashier s checks. What is the Problem in this requirement? Problem :two requirements instead of one. Suppose this Scenario: If the credit card processing works, but the cashier s check validation does not is this requirement pass or fail? Has to be fail, but that is misleading.
24 Examples of BAD Functional Requirements The system shall process all mouse clicks very fast to ensure user s do not have to wait. What is the Problem in this requirement? Problem: This is not testable. Quantify how fast is acceptable?
25 Examples of BAD Functional Requirements The user must have Adobe Acrobat installed. What is the Problem in this requirement? Problem: This is not something our system must do. It could be in the constraints/assumption but is not a functional requirement.
26 Non-Functional Requirements Examples
27 Example 1: Withdrawing money from ATM The system must handle 1,000 transactions per second (time/space bounds). user-friendliness. Interfaces with other systems (Interface requirements). system must have less than 1hr downtime per three months(reliability). permissible information flows, or who can do what (security)
28 Example 1: Withdrawing money from ATM system will need to survive fire.(safety) development time limitations, resource availability, limits on development. (Delivery) The customer must be able to access their account 24 hours a day, seven days a week. (reliability)
29 2.4.2 Non-functional requirements Define system properties and constraints Properties: reliability, response time and storage requirements. Constraints are I/O device capability, system representations, etc. Some non functional requirement may constrain the PROCESS used to develop the system.
30 Process requirements : specification that the design must be produced by a particular CASE system( Computer Aided Software Engineering), programming language or development method. Requirement?? Non-functional requirements may be more critical than functional requirements. If these are not met, the system is useless (implementation)
31 Examples of process requirements The development process to be used must be explicitly defined and must be conformant with ISO 9000 standards. What type of requirement? (Standard) The system must be developed using the XYZ suite of CASE tools. What type of requirement? (implementation) A disaster recovery plan for the system development must be specified What type of requirement? (safety)
32 Non-functional classifications Product requirements: Requirements, which specify that the delivered product must behave in a particular way e.g. execution speed, reliability, etc. Organisational requirements: Requirements, which are a consequence of organisational policies and procedures, e.g. process standards used, implementation requirements, etc. External requirements: Requirements, which arise from factors, which are external to the system and its development, process e.g. interoperability requirements, legislative requirements, etc.
33 Non-functional requirements examples Product requirement 4.C.8 It shall be possible for all necessary communication between the system and the user to be expressed in a user friendly interface Requirement is: Organisational requirement The system development process and deliverable documents shall conform to the process and deliverables defined in XYZCo-SP-STAN-95.Requirement is: External requirement The system shall not disclose any personal information about customers apart from their name and reference number to the operators of the system (privacy) Requirement is: (Privacy) (usability) (standards)
34 Some Types of non-functional requirements with examples
35 Examples of Product requirements The System service X shall have an availability of 99%. Reliability Product Non functional System Y shall process a minimum of 8 transactions per second. Performance Efficiency Product Non Functional The executable code of System Z shall be limited to 512Kbytes. Space Efficiency Product Non Functional it specifies the maximum memory size of the system
36 Examples of Product requirements The system shall be developed for PC and Macintosh platforms. Portability Product Non Functional
37 Example of External requirement The system must encrypt all external communications using the RSA algorithm. Privacy legislative External Non Functional
38 Examples of external requirements In Medical data system : all data is maintained according to data protection legislation before the system is put into operation. Privacy legislative External Non Functional
39 Examples of External requirements The system shall not allow that the dose delivered to the patient to be greater than the maximum value which is determined by the patient s physician. Safety legislative External Non Functional The system shall not operate if the external temperature is below 4 degrees Celsius Safety legislative External Non Functional
40 Consistency between Functional and Nonfunctional Requirements. Example 1: To address security concerns one might have several choices, among them, setting a two level password or to use biometrics. Using a two level password would conflict with usability concerns while the use of biometric devices might conflict with cost concerns
41 Consistency between Functional and Nonfunctional Requirements. Example 2: We could have the following functional requirement: The system must have a file containing all the clients to be used by the Marketing Division. Together with this functional requirement we have the following NFR: This file must be complete enough to allow the Marketing Division to analyze prospective new clients. But an NFR associated with client s attendance states: Patient s admission must take less than 4 minutes. In this case, having a comprehensive file with all the information needed by the marketing division would possibly be conflicting with the goal of admitting a patient in less than 4 minutes.
42 Goals and requirements Non-functional requirements may be very difficult to state precisely and imprecise requirements may be difficult to verify. Goal: A general intention of the user such as ease of use. Verifiable non-functional requirement: A statement using some measure that can be objectively tested. Goals are helpful to developers as they convey the intentions of the system users.
43 Examples A system goal The system should be easy to use by experienced controllers and should be organised in such a way that user errors are minimised. A verifiable non-functional requirement Experienced controllers shall be able to use all the system functions after a total of two hours training. After this training, the average number of errors made by experienced users shall not exceed two per day.
44 Metrics for specifying non-functional requirements Performance Speed - Number of processed transactions per second - User/event response time - Screen refresh time Size - Kilobytes - Number of RAM chips
45 Robustness - Time to re-start after system failure -Percentage of events causing failure -Probability of data corruption on failure Integrity - Maximum permitted data loss after system failure
46 Some Objective Metrics for Nonfunctional Requirements Reliability - Mean time to failure - Probability of unavailability - Rate of failure occurrence - Availability
47 Ease of Use - Training time taken to learn 75% of user facilities - Average number of errors made by users in a given time period - Number of help frames Portability - Percentage of target-dependent statements - Number of target systems
48 Example: A verifiable non-functional requirement Experienced controllers shall be able to use all the system functions after a total of two hours training. After this training, the average number of errors made by experienced users shall not exceed two per day.
49 Requirements Evolution and Management Reasons for requirements change: 1- User gains better understanding of the requirements from the requirements elicitation, analysis and validation process. 2- New ways of working result from the introduction of the SW system itself. 3- Changes to the environment of the organization. 4- Changes to systems or processes within an organization.
50 Consequences of requirements change: Depends when in the life cycle the requirements change Best case review requirements specification Worst case changes to requirements, design, implementation, tests and documentation Modular design can minimize changes
51 Two Classes of Requirements Enduring Requirements Volatile Requirements
52 Enduring Requirements: Derived from an organization s core activity Relate directly to the problem domain Relatively stable
53 Volatile Requirements Derived from the environment of the system Likely to change during development or afterwards
54 Classes of Volatile Requirement Emergent from improved understanding of the problem. Consequential as a result of using the delivered system. Mutable from changes to the environment of the organization. Compatibility from changes to processes within the organization
55 Requirement documents and guidelines: Guidelines for writing requirements Invent a standard format and use it for all requirements. Use language in a consistent way. Use shall for mandatory requirements, should for desirable requirements. Use text highlighting to identify key parts of the requirement. Avoid the use of computer jargon.
56 The software requirements document: The requirements document : is the official statement of what is required of the system developers. Sometimes called the software requirement specification (SRS).
57 The software requirements document: Should include both a definition of user requirements and a specification of the system requirements. There are three cases: User and system requirements may be integrated into a single description User requirements are defined in an introduction to the system requirements specification If there are large number of requirements, the detailed system requirements may be presented as a separate document
58 The software requirements document: It is NOT a design document. As far as possible, it should set of WHAT the system should do rather than HOW it should do it
59 IEEE requirements standard Defines a generic structure for a requirements document that must be instantiated for each specific system. Introduction. General description. Specific requirements. Appendices. Index.
60 Requirements document structure based on IEEE standard Preface Introduction Glossary User requirements definition System architecture System requirements specification System models System evolution Appendices Index
Requirements Engineering. Establishing what the customer requires from a software system. Requirements Engineering. What is a Requirement?
Engineering Establishing what the customer requires from a software system Ian Sommerville 1995/2000 (Modified by Spiros Mancoridis 1999) Software Engineering, 6th edition. Chapters 5 and 6 Slide 1 Engineering
More informationIan Sommerville 2006 Software Engineering, 8th edition. Chapter 6 Slide 1
Software Requirements Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 6 Slide 1 Objectives To introduce the concepts of user and system requirements To describe functional and non-functional
More informationSE351a: Software Project & Process Management. 11 Oct., 2005 SE351a, ECE UWO, (c) Hamada Ghenniwa
SE351a: Software Project & Process Management W4.1: Requirements Engineering 11 Oct., 2005 SE351a, ECE UWO, (c) Hamada Ghenniwa SE351 Roadmap Introduction to Software Project Management Project Management
More informationRequirements Engineering. Version October 2016
Requirements Engineering Version 1.11 26 October 2016 Maurizio Morisio, Marco Torchiano, 2016 Software development Customer Needs Acceptance testing Requirements Analysis System testing System Design Integration
More informationRequirements. Requirements. Types of Requirement. What Is a Requirement?
Beatrice Åkerblom beatrice@dsv.su.se Everything else in software development depends on the requirements. If you cannot get stable requirements you cannot get a predictable plan... What Is a Requirement?!
More informationLecture 6: Requirements Engineering
Lecture 6: Requirements Engineering Software System Design and Implementation ITCS/ITIS 6112/8112 001 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte
More informationSoftware specification and modelling. Requirements engineering
Software specification and modelling Requirements engineering Requirements engineering (RE) Requirements engineering is the process of establishing the services that a customer requires from a system and
More informationRequirements Engineering: Specification & Validation. Software Requirements and Design CITS 4401 Lecture 18
Requirements Engineering: Specification & Validation Software Requirements and Design CITS 4401 Lecture 18 The Problems of Requirements What goal(s) are we trying to satisfy? How do we identify the scope
More informationSEG3201 Basics of the Requirements Process
SEG3201 Basics of the Requirements Process Based on material from: I Bray: An introduction to Requirements Engineering Gerald Kotonya and Ian Sommerville: Requirements Engineering Processes and Techniques,
More informationSoftware Requirements and the Requirements Engineering Process. Chapters 5 and 6
Software Requirements and the Requirements Engineering Process Chapters 5 and 6 References Software Engineering. Ian Sommerville. 6th edition. Pearson. Code Complete. Steve McConnell. (CC) The art of triage.
More informationCh 4: Requirements Engineering. What are requirements?
Ch 4: Engineering What are? Functional and non-functional The software document specification engineering processes elicitation and analysis validation management The descriptions of what the system should
More informationFundamentals: Software Engineering. Objectives. Last lectures. Unit 2: Light Introduction to Requirements Engineering
Fundamentals: Software Engineering Dr. Rami Bahsoon School of Computer Science University of Birmingham r.bahsoon@cs.bham.ac.uk Unit 2: Light Introduction to Requirements Engineering Dr R Bahsoon 1 Objectives
More informationVO Software Engineering
Administrative Issues Univ.Prof. Dr. Peter Auer Chair for Information Technology Email: auer@unileoben.ac.at Lecture Thursday 10:15 11:45 Project Lab Montag 16:00 19:00 Literature Helmut Balzert, Lehrbuch
More informationRequirements Engineering. Version November 2012
Requirements Engineering Version 1.8 11 November 2012 Maurizio Morisio, Marco Torchiano, 2012 Attribution-NonCommercial-NoDerivs 2.5 You are free: to copy, distribute, display, and perform the work Under
More informationChapter 4 Requirements Engineering
Chapter 4 Requirements Engineering Chapter 4 Requirements Engineering Slide 1 Topics covered Why RE is hard... Functional and non-functional requirements Product vs. organizational vs. external requirements
More informationUNIT-II REQUIREMENTS ANALYSIS AND SPECIFICATION
UNIT-II REQUIREMENTS ANALYSIS AND SPECIFICATION The for a system are the descriptions of what the system should do the services that it provides and the constraints on its operation. User are statements,
More informationRequirements engineering
engineering Chapter 4 1 Engineering in the textbook 4.1 Functional and non-functional 4.2 The software document 4.4 engineering processes 4.5 elicitation and analysis 4.3 specification 4.6 validation 4.7
More informationRequirement Analysis
Requirement Analysis Requirements Analysis & Specification Objective: determine what the system must do to solve the problem (without describing how) Done by Analyst (also called Requirements Analyst)
More informationLecture 8 Requirements Engineering
Lecture 8 Requirements Engineering Software Engineering ITCS 3155 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte September 18, 2008 Lecture Overview
More informationLecture 9 Requirements Engineering II
Lecture 9 Requirements Engineering II Software Engineering ITCS 3155 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte September 23, 2008 Announcements
More informationTopic: Software Verification, Validation and Testing Software Engineering. Faculty of Computing Universiti Teknologi Malaysia
Topic: Software Verification, Validation and Testing Software Engineering Faculty of Computing Universiti Teknologi Malaysia 2016 Software Engineering 2 Recap on SDLC Phases & Artefacts Domain Analysis
More informationSoftware Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author> <organization> <date created>
Software Requirements Specification for Version 1.0 approved Prepared by Copyright 2002 by Karl E. Wiegers. Permission is granted to use, modify, and distribute
More informationBy accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other
CONGRESSIONAL FEDERAL CREDIT UNION ELECTRONIC CORRESPONDENCE DISCLOSURE & AGREEMENT Please read this information carefully and print a copy and/or retain this information electronically for your records.
More informationUNIT II SOFTWARE REQUIREMENTS 9
UNIT II SOFTWARE REQUIREMENTS 9 Functional and non-functional - user system requirement engineering process feasibility studies requirements elicitation validation and management software prototyping prototyping
More informationRequirements Engineering
Requirements Engineering An introduction to requirements engineering Gerald Kotonya and Ian Sommerville G. Kotonya and I. Sommerville 1998 Slide 1 Objectives To introduce the notion of system requirements
More informationSoftware Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author(s)> <Organization> <Date created>
Software Requirements Specification for Version 1.0 approved Prepared by Software Requirements Specification for Page 2 Table of Contents Revision
More informationSoftware Requirements Specification (SRS) Software Requirements Specification for <Name of Project>
Software Requirements Specification (SRS) Software Requirements Specification for Version Release Responsible Party Major Changes Date 0.1 Initial Document Release for
More informationRequirements Engineering
Dr. Michael Eichberg Software Engineering Department of Computer Science Technische Universität Darmstadt Software Engineering Engineering The following slides are primarily based on the contents of the
More informationWe may change the privacy notice from time to time by amending this page. What type of information will we collect from you?
This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand why data is being collected and
More informationWe may change the privacy notice from time to time by amending this page.
This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand why data is being collected and
More informationOperating system. Hardware
Chapter 1.2 System Software 1.2.(a) Operating Systems An operating system is a set of programs designed to run in the background on a computer system, giving an environment in which application software
More informationSoftware Engineering Unit 4- Requirement Analysis and Specification
Software Engineering Unit 4- Requirement Analysis and Specification Requirement Engineering The process to gather the software requirements from client, analyze and document them is known as requirement
More informationCH 13 APPLICATION ANALYSIS
CH 13 APPLICATION ANALYSIS APPLICATION INTERACTION MODEL Steps: Determine system boundary Find actors Find use case Find initial & final events Prepare a normal scenario Add exception scenario Prepare
More informationOrder of Malta Volunteers Privacy Statement
Order of Malta Volunteers Privacy Statement The Order of Malta Volunteers ( the OMV, We, Us ), is a charity registered in England and Wales with charity number 1164242. Its registered address is 13 Deodar
More informationIntroduction to Software Engineering
Introduction to Software Engineering Gérald Monard Ecole GDR CORREL - April 16, 2013 www.monard.info Bibliography Software Engineering, 9th ed. (I. Sommerville, 2010, Pearson) Conduite de projets informatiques,
More informationIntroduction to Business continuity Planning
Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources
More informationWe may change the privacy notice from time to time by amending this page.
Holland & Odam Updated 4 th May 2018 This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand
More informationSoftware Engineering
Software Engineering JUNBEOM YOO Dependable Software Laboratory KONKUK University http://dslab.konkuk.ac.kr Ver. 2.0 (2010.06) This lecture note is based on materials from Ian Sommerville 2006. Anyone
More informationDepartment of Public Health O F S A N F R A N C I S C O
PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationRequest for Quotation (RfQ)
Request for Quotation (RfQ) For ONVIF Technical Services Committee Device Test Tool Evolution WG Project Ash Circulation: 2017-June-02 Quotation Due: 2017-June-19 Copyright ONVIF 2017. All rights reserved.
More informationMeritain Connect User Manual. for Employees. 1 Meritain Connect User Guide for Employees
Meritain Connect User Manual for Employees 1 Meritain Connect User Guide for Employees Contents Introduction... 4 Accessing Meritain Connect... 5 Logging In... 5 Forgot Password... 6 Registration Process...
More informationenter into application on 25 May 2018
General Data Protection Regulation What is GDPR? Is GDPR applicable for you? Which actions are required from you (and us)? Which rights do your clients have and which services can KBC Securities s provide
More informationLecture 5: Requirements Specifications
Lecture 5: Requirements Specifications Why we need to write specifications Purpose and audience Choosing an appropriate size and formality Desiderata for Specifications Properties of good specifications
More informationThe Clinical Data Repository Provides CPR's Foundation
Tutorials, T.Handler,M.D.,W.Rishel Research Note 6 November 2003 The Clinical Data Repository Provides CPR's Foundation The core of any computer-based patient record system is a permanent data store. The
More informationCorso di Progettazione di Applicazioni Web e Mobile
Corso di Progettazione di Applicazioni Web e Mobile Mirko Calvaresi Università di Camerino - Mirko Calvaresi - Progettazione Applicazioni Web e Mobile What this is about? How a web appliaction works? let
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationISO Lead Implementation
FINAL CERTIFICATION AWARDED BY IMRTC - USA ISO 22000 Lead Implementation Training Program ISO 22000 FOOD SAFETY MANAGEMENT SYSTEM (FSMS) Course Introduction Food safety management systems (FSMS) are intended
More informationLehigh County, PA Frequently Asked Questions
Lehigh County, PA Frequently Asked Questions General How do I access the Odyssey File & Serve system? To access the Odyssey File & Serve website, go to the Lehigh website. How do I contact the Lehigh County
More informationPrivacy Policy (with effect from 25 th May 2018)
Privacy Policy (with effect from 25 th May 2018) Ron Sammons Ltd t/a TECO Building Products, (company number 01398336), having a registered office at The Gables, Codmore Hill, Pulborough, West Sussex RH20
More informationAn Introduction to VRS (Visitor Registration System)
An Introduction to VRS (Visitor Registration System) Edition 1 March 2016 Document Reference: 3851_v2-2018 An Introduction to VRS (Visitor Registration System) Contents 1. Introduction Who is a visitor
More informationQuality in Use: Achieving Stakeholder Needs for Quality
1 Quality in Use: Achieving Stakeholder Needs for Quality Nigel Bevan www.nigelbevan.com nigel@nigelbevan.com Professional Usability Services Nigel Bevan. Reproduction permitted provided the source is
More information1. Definitions and Interpretation In this Policy, the following terms shall have the following meanings:
Capital Karts Privacy Policy Introduction Capital Karts understands that your privacy is important to you and that you care about how your personal data is used and shared online. We respect and value
More informationQNB Bank-ONLINE AGREEMENT
This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions
More informationVendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo
Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of
More informationArgyll Self Catering Privacy Statement 2018
Argyll Self Catering Privacy Statement 2018 Dated: May 2018 Who is responsible for managing my information? and all websites and brochures operated by United Kingdom This is our Privacy Notice and it explains
More informationOhio Supercomputer Center
Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
More informationChapter Two: Conformance Clause
HL7 EHR TC Electronic Health Record - System Functional Model, Release 1 February 2007 Chapter Two: Conformance Clause EHR Technical Committee Co-chairs: Linda Fischetti, RN, MS Veterans Health Administration
More informationData Protection Policy
Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...
More informationCIS 890: Safety Critical Systems
CIS 890: Safety Critical Systems Lecture: Requirements Introduction Copyright 2011, John Hatcliff. The syllabus and all lectures for this course are copyrighted materials and may not be used in other course
More informationWHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY
WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React
More informationTable of Contents Storage Location of Document... 5 Document Details... 5 Approvals... 5
Table of Contents Storage Location of Document... 5 Document Details... 5 Approvals... 5 Regions... 7 Regions Icons... 7 Regions Screen... 7 Regions Steps... 8 Units... 9 Units Icons... 9 Units Screen...
More informationNOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section.
TITLE MOBILE WIRELESS DEVICES AND SERVICES SCOPE Provincial APPROVAL AUTHORITY Alberta Health Services Executive SPONSOR Information Technology PARENT DOCUMENT TITLE, TYPE AND NUMBER Not applicable DOCUMENT
More informationUpdated December 12, Chapter 10 Service Description IBM Cloud for Government
Updated December 12, 2018 Chapter 10 Service Description IBM Cloud for Government IBM Cloud for Government This Service Description describes IBM s Cloud for Government available to Clients under the Federal
More informationProduct Quality Engineering. RIT Software Engineering
Product Quality Engineering Q vs q Quality includes many more attributes than just absence of defects Features Performance Availability Safety Security Reusability Extensibility Modifiability Portability
More informationAC63/AT63/AC114/AT114 SOFTWARE ENGINEERING DEC 2015
Q.2 a. What is System Engineering? Explain in detail. (12) Systems engineering is the activity of specifying, designing, implementing, validating, deploying and maintaining socio technical systems. Concerned
More informationTherapy Provider Portal. User Guide
Therapy Provider Portal User Guide Page 2 of 16 UCare User Guide V1.7 Table of Contents I. Introduction...3 About HSM Therapy Management... 4 Terms of Use... 4 Contact Information... 6 II. Using the Therapy
More informationADMIN 3.4. V e r s i o n 4. Paul Daly CEO RISSB
ADMIN 3.4 V e r s i o n 4 Paul Daly CEO RISSB 01 November 2017 DOCUMENT CONTROL Identification Document Title Number Version Date Document ADMIN 3.4 1 23/11/2007 Document ADMIN 3.4 2 04/02/2010 Document
More informationIBM Software Group. Mastering Requirements Management with Use Cases Module 8: Refine the System Definition
IBM Software Group Mastering Requirements Management with Use Cases Module 8: Refine the System Definition 1 Objectives Describe design constraints. Identify methods of specifying functional requirements.
More informationFirst National Bank and Trust P. O. Box 100 London, KY Attention: Statements
is pleased to offer Email Statements. These statements are an electronic version of the paper statements that are delivered to customers, and will include check images. Since email statements do not rely
More informationChecklist: Credit Union Information Security and Privacy Policies
Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC
More informationIn this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number
ASHBY CONCERT BAND PRIVACY POLICY The privacy and security of your personal information is extremely important to us. This privacy policy explains how and why we use your personal data. We will keep this
More informationNHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy
NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification
More informationSoftware testing. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 23 Slide 1
Software testing Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 23 Slide 1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles
More informationSECTION SPECIAL SYSTEMS. Website and Construction Cameras
PART 1 GENERAL SECTION 01121 SPECIAL SYSTEMS 1.01 WORK INCLUDED A. Project Construction Site Cameras and Video Streaming Servers B. Project Web site C. Network & Infrastructure D. Internet Connectivity
More informationUnit 1 Introduction to Software Engineering
Unit 1 Introduction to Software Engineering João M. Fernandes Universidade do Minho Portugal Contents 1. Software Engineering 2. Software Requirements 3. Software Design 2/50 Software Engineering Engineering
More informationModeling Issues Modeling Enterprises. Modeling
Modeling Issues Modeling Enterprises SE502: Software Requirements Engineering Modeling Modeling can guide elicitation: It can help you figure out what questions to ask It can help to surface hidden requirements
More informationN.B This process description is to be read in conjunction with the associated MPF ALID Help Line - Terms of Access specified in the next slide.
MPF Access Line Identifier Help Line Tactical Process MPF line identification at multiple MPF sites Consumer scenarios:- - Migrations & - WLTO Homemoves N.B This process description is to be read in conjunction
More informationPrivacy Policy. Full name and contact details (including your contact number, and postal address).
01326 270212 sales@htiddy.co.uk www.htiddy.co.uk Privacy Policy This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this
More informationMathematics and Computing: Level 2 M253 Team working in distributed environments
Mathematics and Computing: Level 2 M253 Team working in distributed environments SR M253 Resource Sheet Specifying requirements 1 Overview Having spent some time identifying the context and scope of our
More informationDigital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview
Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview Published by National Electrical Manufacturers Association 1300 N. 17th Street Rosslyn, Virginia 22209 USA Copyright
More informationIntroduction to Architecture. Introduction to Architecture 1
Introduction to Architecture Introduction to Architecture 1 Content What is architecture? Motivation for architecture Non-functional requirements Introduction to Architecture 2 What is architecture? The
More informationDepartment of Public Health O F S A N F R A N C I S C O
PAGE 1 of 9 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:
More informationEU Data Protection Agreement
EU Data Protection Agreement This Data Protection Agreement ("Agreement") is entered into by and between TechTarget, Inc., a Delaware corporation with a principle place of business at 275 Grove Street,
More informationContents CHAPTER 1 CHAPTER 2. Recommended Reading. Chapter-heads. Electronic Funds Transfer) Contents PAGE
Contents Foreword Recommended Reading Syllabus Chapter-heads iii v vii ix MODULE I : Technology in bank CHAPTER 1 Banking Environment and Technology u Introduction 3 u Evolution of Banking Technology over
More informationRecommended Practice for Software Requirements Specifications (IEEE)
Recommended Practice for Software Requirements Specifications (IEEE) Author: John Doe Revision: 29/Dec/11 Abstract: The content and qualities of a good software requirements specification (SRS) are described
More informationOG0-091 Q&As TOGAF 9 Part 1
CertBus.com OG0-091 Q&As TOGAF 9 Part 1 Pass The Open Group OG0-091 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance
More informationPageScope Box Operator Ver. 3.2 User s Guide
PageScope Box Operator Ver. 3.2 User s Guide Box Operator Contents 1 Introduction 1.1 System requirements...1-1 1.2 Restrictions...1-1 2 Installing Box Operator 2.1 Installation procedure...2-1 To install
More informationCreative Funding Solutions Limited Data Protection Policy
Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments
More informationISO INTERNATIONAL STANDARD. Ergonomics of human-system interaction Part 110: Dialogue principles
INTERNATIONAL STANDARD ISO 9241-110 First edition 2006-04-01 Ergonomics of human-system interaction Part 110: Dialogue principles Ergonomie de l'interaction homme-système Partie 110: Principes de dialogue
More informationICT User Access Security Standard Operating Procedure
ICT User Access Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised
More informationLecture 7 (3-April-2013)
SOFTWARE QUALITY ASSURANCE Lecture 7 (3-April-2013) Instructor: Mr. Natash Ali Mian Department of CS and IT Department of CS and IT The University of Lahore ` Switch off mobile phones during lectures,
More informationHIPAA COMPLIANCE AND DATA PROTECTION Page 1
HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud
More informationAccessing COMPASS from Your Home or Office
Accessing COMPASS from Your Home or Office IMPORTANT: Please Read! 1. We encourage you to have your office manager or IT professional establish access for you using these instructions. 2. You can establish
More informationMicrosoft Deploying, Configuring, and Administering Microsoft Lync Server 2010
1800 ULEARN (853 276) www.ddls.com.au Microsoft 10533 - Deploying, Configuring, and Administering Microsoft Lync Server 2010 Length 5 days Price $4290.00 (inc GST) Overview This five-day instructor-led
More informationPATIENT ACCESS REQUEST FOR MEDICAL RECORDS
PATIENT ACCESS REQUEST FOR MEDICAL RECORDS Patient s Legal Name: Telephone: ( ) Address: Date of Birth: As provided by the Health Insurance Portability and Accountability Act ( HIPAA ), I am requesting
More informationOnline Statements Disclosure
Online Statements Disclosure Rev. 04/30/13 DEFINITIONS "We", "Our", "Us" or "The Bank" mean Central Pacific Bank. "You" and "your" mean the account owner(s) authorized by the Bank to receive account statements
More informationInformation Security Policy
April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING
More informationCalling Line Identification (CLI) Code of Practice
Calling Line Identification (CLI) Code of Practice Information Notice 05/02 Gibraltar Regulatory Authority Suite 603, Europort, Gibraltar Telephone: +350 20074636 Fax: +350 20072166 Website: www.gra.gi
More informationRequirements Elicitation
Requirements Elicitation Introduction into Software Engineering Lecture 4 25. April 2007 Bernd Bruegge Applied Software Engineering Technische Universitaet Muenchen 1 Outline Motivation: Software Lifecycle
More information