Non Functional Requirements Flashcards

1
Q

Statements of services the system should provide, how the system react to particular inputs, and how the system should behave in particular situations

A

Functional Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CONSTRAINTS on the services / functions offered by the system often AS A WHOLE

A

Non-functional requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are usually included in the nonfunctional requirements

A

Time
Development process
Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Classification of NFR

A
NFR
>PRODUCT
>>USABILITY
>>SECURITY
>>EFFICIENCY
    >>>SPACE
    >>>PERFORMANCE
>>DEPENDABILITY

> ORGANIZATIONAL
>DEVELOPMENTAL
>OPERATIONAL
>ENVIRONMENTAL

>EXTERNAL
>>REGULATORY
>>ETHICAL
>>LEGISLATIVE
    >>>ACCOUNTING
    >>>SAFERY/SECURITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Requirements that specify / constraints the behavior of the software

A

Product requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

System requirements derived from POLICIES AND PROCEDURES in the customer / developer’s organization

A

Organizational requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Requirements derived from FACTORS EXTRERNAL TO THE SYSTEM AND ITS DEVELOPMENT PROCESS

A

External requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Requirement which imposes constraints on the TYPE of systems to interface and communicate with

Requirement which imposes some dependability on the proper SPECIFICATIONS and implementation

EG: Must be able to interface with all printers manufactured by company X

A

Interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Requirement which imposes constraints related to the ease with which the software can be fixed, adapted to new environments and technologies, or expanded

Eg: can be easily fixed, updated by an IT personnel with minimal networking and unix prog bg

A

Maintainability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Requirement which imposes constraints on the physical and logical ENVIRONMENT in which the software OPERATES

Can include what environment the servers are located, min speed of network connections & OS

EG: The system will be run in any linux distro with internet bandwidth connection of 100Mbps in dry office room

A

Operability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Requirement which imposes constraints on RESPONSE TIME DELAYS, THROUGHPUT, AND MEMORY REQUIREMENTS

Eg: the finalized schedule use case should be able to process at least 500 concurrent users within a span of 5 secs

A

Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Response time delays can be either __ or ___

A

System wide ; use case specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Puts lower bounds on the acceptable rate of completed transactions

A

Throughput requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Requirement which imposes conditions related to future deployment and evolution of the software

Ease with which a software can be made to run on different platforms/ software environments

Eg: system should be able to work in windows / linux env

A

Portability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Requirement which imposes values related to reliability of software under development which inclue MEAN TIME BETWEEN FAILURES or MAX TIME ALLOWED FOR FAILURES over a period of time

Cna be used to impose upper limit of down time of software

Eg: system must be available 99% of the time

A

Reliability and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Requirement which imposes constraints on the development of system related to the degree of REUSE

EG: System components should be designed and implemented in a way that they can be reused by other modules

A

Reusability

17
Q

What are the two types of reuse?

A

> produce softwareFASTER by REUSING EXISTING COMPONENTS

> produce HIGHLY MAINTAINABLE software so it can be reused

18
Q

Requirement which imposes constraints related to the way the software handles abnormal / erroneous inputs and operational conditions

Address software behaviour with respect to ERROR RECOVERY AND FAULT TOLERANCE

EG: system should be able to handle abnormal conditions and unexpected user inputs coming from the user and must recover from power failures and continue operating without any side effect on currently executing transactions

A

Robust

19
Q

Needed when software deals with safety CRITICAL ISSUES such as aviation, power and chemical plant controls

Addresses enforcement of SAFETY STANDARDS

EG: in the case of software failure, a software procedure must be activated immediately

A

Safety

20
Q

Imposes constrains on how the software system should scale up to a high input load at all interface

Ideally QUANITIFIABLE and are normally VERIFIED during LOAD TESTING

Eg: system must be able to accomodate max of 100 users logged on and performing all types of transactions

A

Scalabiltiy

21
Q

A requirement that is very critical and must be identified earlier in the software development process

A

Security

22
Q

4 main types of security concerns addressed by the security requirement

A
Confidentiality
Integrity
Availability
Accountability
(CIAA)
23
Q

What are imposed to deal with security requirement?

A
(IAA) identification, authentication, authorization
Integrity
Immunity
Privacy
Non repudiation
Survivability
Physical protection
Security standards conformity
24
Q

IAA requirements are used to address __

Physical protection requirement addresses this in a physical level

A

Confidentiality concerns

25
Q

Requirement wherein the software shall allow a registered user to have control over its own private info

A

Privacy requirements

26
Q

Requirement wherein no files can be attached to a user profile without being disinfected by the software

A

Immunity requirement

27
Q

Immunity and privacy requirements are used to address what type of concerns?

A

Integrity concerns

28
Q

Access control related requirements

A

CONCERN - REQ
Integrity - privacy & immunity
Availability - survivability & physical protection
Accountability - non-repudiation and standards conformity

29
Q

Requirement wherein system preserves tamper proof records

A

Non repudiation

30
Q

IAA req is considered by introducinga logon use case called __-

A

Security use case

31
Q

Abnormal behavior of an attacker

A

Misuse case

32
Q

Elicited by firts knowing INTENDED USERS AND BACKGROUND

Eg: software must be easy tonuse by 7-9 old children

A

Usability

33
Q

Constraints in user experience when interacting with the software

A

User friendliness