Unit 2 Flashcards
The process of reaching and documenting an agreed set of requirements is known as ____________ ___________ .
requirements engineering
____________ are individuals and/or organisations affected by the success or failure of a software system
stakeholders
The requirements for a system effectively form a ________ between the client and the developers
contract
________ are specific sequences of actions that illustrate how a task can be performed. They can be used to investigate dependencies between requirements.
scenarios
There are four activities that can be identified as common to many requirements engineering processes. They are:
requirements elicitation
requirements analysis and negotiation
requirements documentation
requirements validation
Requirements ___________ is the activity concerned with identifying the requirements
elicitation
Requirements ________ and ___________ is the activity where requirements are categorised, prioritised and examined for their properties of consistency, completeness and ambiguity
analysis and negotiation
Requirements _____________ is usually done through a template document
documentation
Requirements __________ consists of a careful check of the overall requirements documentation, usually following a checklist of questions
validation
Where and when does the requirements engineering process take place in an iterative and incremental development process?
The main output of a requirements engineering process is the contract, therefore it has to take place early in the development process, however, iterative and incremental processes recognise that requirements may be revisited in parallel with other phases of development
How do requirements and stakeholders related to each other?
Requirements arise from stakeholders’ needs
What are the benefits of documenting requirements within a project?
Requirements record decisions
They are the main reference for what should be built
They are the basis for validation of the built system
What is an agile approach to requirements engineering documentation?
Requirements documentation should serve as a vehicle for common understanding, communication and future traceability.
What is a functional requirements?
A functional requirement describes an action that the product must take if it is to carry out the work it is intended to do
What is a non-functional requirement
A non-functional requirement is a requirement about a quality that the product must have
A _________ ________ requirement is a constraint on the product resulting from the technology of the solution that must be adopted
technical solution
________ __________ requirements are a specification of the work independent of the way that will be carried out
Business functional
____-___-____ requirements: the spirit of the product’s appearance
Look-and-feel
_________ and ________ requirements: The product’s ease of use and any special usability considerations
Usability and humanity
___________ requirements: how fast, safe, accurate, reliable and available the functionality must be
Performance
___________ and _____________ requirements: the environment on which the product will have to work, and what considerations must be made for this environment
Operational and environmental
______________ and _______ requirements: expected changes, and the time allowed to make them
Maintainability and support
________ requirements: special requirements that come about because of the people involved in the product’s development and operation
Cultural
_____ requirements: the laws and standards that apply to the product
Legal
________ requirements: the security and confidentiality of the product`
Security
The five aspects of security are:
- ______ addresses uninterrupted or continual access to data and functionality by authorised users
- _______ addresses the protection of data from unauthorised access and disclosure
- _________ addresses the consistency of data, the ability to prevent unauthorised modification or deletion of data
- _____ addresses both how the correctness of product and data can be verified, and how to help detection of inappropriate access and intrusion
- ________ addresses the protection of a system against threats and attacks
- access
- privacy
- integrity
- audit
- immunity