Software Development Planspecifications: Semester March - July 2019
Software Development Planspecifications: Semester March - July 2019
Software Development Planspecifications: Semester March - July 2019
Version 2.0
GROUP: A4CS1104A/B/C/D
Revision History
Date Version Description Author
05/12/18 <1.0> <System Development Planning> <Mohd Hafizan>
28/12/18 <2.0> <System Requirements Specification> <Mohd Hafizan>
Table of Contents
1. Fact Findings Techniques 4
1.1 Questionaire/ Interview/Sampling/Documents review
1.2 Business rules/case/models
1.3 Summary of findings 4
1.4 SWOT Analysis/ Intangible and Tangible benefits 4
2. Storyboard 5
2.1 Storyboard Diagram + Narrative 5
2.2 Storyboard Sketches + Narrative
3. Data Modeling 6
3.1 Normalization ( 1st - 3rd Normal Form) + narrative 6
3.2 Entity Relationship Diagram + Narrative 6
3.3 Data Dictionary 6
4. System Specification 7
4.1 Module/function name 7
4.2 Purpose of module/function 7
4.2.1 List of input data 7
4.2.2 What process involve 7
4.2.3 List of output data 7
4.3 User characteristics 7
2. Storyboard
Storyboard Diagram + Narrative
[A brief description of the system in diagram form and explanation for each of the functional terms]
Example:
3. Data Modeling
Normalization of ERD + Narrative
[Describe the details of normalization process from 1stNF to 3rdNFand also details explanation of each.]
Entity Relationship Diagram + Business Rules + Narrative
[A diagram that describe the data modeling in relationship including cardinality, relationships, keys,]
Data Dictionary
[Details of relationship between entities.]
4. System Specification
Module/Function + narrative
[Brief explanation on the module or function used in the design process.]
Processes involved
[Details of what the system can do, register module, add module, delete module, verify module. Tally with
4.1]
<Example:
The server on which the Online Journal resides will have its own security to prevent
unauthorized write/delete access. There is no restriction on read access. The use of email by an
Author or Reviewer is on the client systems and thus is external to the system.
The PC on which the Article Manager resides will have its own security. Only the Editor
will have physical access to the machine and the program on it. There is no special protection
built into this system other than to provide the editor with write access to the Online Journal to
publish an article.>