BA Prject 1 Ans - Namita
BA Prject 1 Ans - Namita
BA Prject 1 Ans - Namita
INPUT Manufacturing companies ((Fertilizers, seeds and pesticides), Farmers, Warehouse, Logistics
OUTPUT To facilitate farmers to buy seeds, pesticides, and fertilizers from anywhere through ONLINE.
ACTIVITIES Internet connectivity, Mobile number, User Id, Farmer unique number, User friendly, Easy payment.
Strength
Weakness
Farmers need to be alert for online presence and need to learn about the
technologies.
Not much marketing promotions or awareness program.
Lack of Confirmed Market Positioning.
Farmers already have strong attachment to existing local marketers / vendors.
Opportunities
Threats
1. Feasibility Study
The software technologies and tools that are associated with the OAPS are
E-commerce platform.
Version Control System (VCS): May consider using a VCS such as Git or SVN to
manage the source code and collaborate with other developers.
Testing Tools: Consider using testing tools such as JUnit or TestNG for unit testing,
Selenium for automated testing, and LoadRunner for load testing.
Web Server: A web server is required for hosting the online agriculture product
store. Apache Tomcat is a popular web server that is often used for hosting Java-
based web applications.
Payment gateway integration such as PayPal, Stripe, or Authorize.Net.
Content management system such as WordPress or Drupal.
Development tools such as Eclipse or NetBeans. These IDEs come with a range of
features such as code completion, debugging, and syntax highlighting, making it
easier for developers to write, test and debug their code.
Database management system such as MySQL or Oracle.
From these it’s clear that the project OAPS is technically feasible.
Time Feasibility
The length of time required to complete the online agriculture product shop project will vary
depending on a number of variables, including its scale, the resources available, and any
potential obstacles that might appear while it is being developed.
Yet, a general timeline for the project could be between 6 to 8 months. This comprises the
time spent
Generalized time frame for a medium-sized project:
There are a variety of internal and external risks in software development. Here are some different
risk factors that may be involved in business analysis (BA) risks and process/project risks:
BA Risks:
1. Incomplete or inaccurate requirements gathering
2. Misunderstanding of stakeholder needs
3. Ambiguous or changing project objectives
4. Lack of stakeholder support or buy-in
5. Insufficient resources or funding
6. Limited access to data or information
7. Inadequate communication among team members
8. Unforeseen external factors such as legal or regulatory changes
9. Unclear or poorly defined project scope
10. Misalignment between business and IT strategies
Process/Project Risks:
1. Unrealistic project timelines or milestones
2. Insufficient project resources or funding
3. Inadequate project planning or management
4. Poor project team communication or collaboration
5. Technical difficulties or system failures
6. Insufficient quality control or testing
7. Scope creep or uncontrolled project changes
8. Vendor or supplier issues
9. Budget overruns or financial issues
10. Unforeseen external factors such as natural disasters or geopolitical events.
Question 6 – Stakeholder Analysis (RACI Matrix)
* Authorize Has ultimate signing authority for any changes to the document.
R Responsible Responsible for creating this document.
A Accountable Accountable for accuracy of this document (for example, the
project manager)
Project Scope:
It includes the development and launch of our online agriculture product store. This will include the
design and development of user-friendly online platform, the procurement and stocking of our
inventory, the establishment of relationships with suppliers and manufacturers, the development
and implementation of our marketing and sales strategies, and the hiring and training of our
Technical and management team and staffs.
Analysis:
In the agricultural sector vas areas have been affected with the inventory problem and delivery of
necessary product whenever needed. About majority of the sector have indulged in the farming and
poor farming is the consequence of this.
Mr Karthik is the Delivery Head in APT IT SOLUTIONS company and he reached out to Mr Henry.
Mr Vandanam is project Manager, Ms. Juhi is Senior Java Developer, Mr Teyson, Ms Lucie, Mr
Tucker, Mr Bravo are Java Developers. Network Admin is Mr Mike and DB Admin is John. Mr Jason
and Ms Alekya are the Tester. As BA Mr Shivam joined this team.
Time:
Generalized time frame for a medium-sized project:
Requirements gathering: 2-4 weeks
Requirement analysis: 2-4 weeks
Design: 3-6 weeks
Database design: 2-3 weeks
Front-end and back-end development: 8-10 weeks
Quality assurance and testing: 2-4 weeks
Deployment and launch: 1-2 weeks
Budget:
The system will follow the freeware software standards.
Hardware costs: Hardware costs: $5,000 - $12,000 (approx.)
This includes the cost of purchasing or renting server hardware, networking
equipment, backup and disaster recovery hardware.
Software costs: Software costs: $5,000 - $15,000 (approx.)
This includes the cost of purchasing or licensing software tools such as an IDE, web
server, DBMS, e-commerce platform, payment gateway integration, content
management system, and testing tools.
Resource costs: Resource costs: $50,000 - $100,000 (assuming a team of 7-12
resources) (approx.)
This includes the cost of salaries and benefits for the trained resources required for
the project, including Java developers, web designers, database administrators,
quality assurance/testers, and project manager.
Development and design costs: Dev and design costs: $50,000 - $100,000 (approx.)
This includes the cost of designing and developing the website and e-commerce
platform, including coding, testing, and deployment.
Ongoing costs: Ongoing costs: $10,000 - $20,000 per year.This includes the cost of
hosting the website, maintenance and support, ongoing development, and updates
to the website and e-commerce platform
Risks:
There are several key risks associated with the development and launch of OAPS. These include:
Market competition: The agriculture product market is highly competitive, with many
established players and a high degree of price sensitivity among customers. We will need to
differentiate ourselves through our quality, affordability, and convenience, and continually
adapt our strategies based on market feedback.
Supply chain disruptions: Our ability to source and stock inventory could be impacted by
disruptions in the supply chain, such as natural disasters, trade disputes, or pandemics. We
will need to maintain relationships with multiple suppliers and manufacturers to minimize
the impact of any disruptions.
Technology failures: Our online platform will be critical to our success, and any technical
failures or security breaches could severely impact our business. We will need to invest in
robust technology and security measures to minimize this risk.
Regulatory compliance: The agriculture product market is subject to a wide range of
regulations and compliance requirements, and failure to comply could result in fines or legal
action. We will need to ensure that we are fully compliant with all relevant regulations and
maintain a strong understanding of any changes or updates.
Question 8 – Four SDLC Methodologies
Mr Karthik explained to Mr. Henry about SDLC.
Iterative Methodology
Advantage (Pros):
Sequential Methodology
The popular SDLC models that follow sequential processes are waterfall model, V model. Waterfall
model is also known as the traditional model, classic model, predictive model. It follows the top-
down approach to develop the software, hence the name waterfall model.
Another popular sequential approach to develop the software is V model. V-Model also referred to
as the Verification and Validation Model. In this, each phase of SDLC must complete before the next
phase starts. It follows a sequential design process same as the waterfall model. Testing of the
device is planned in parallel with a corresponding stage of development.
Evolutionary Methodology
Objective setting:
Each cycle in the spiral starts with the identification of purpose for that cycle, the various
alternatives that are possible for achieving the targets, and the constraints that exists.
Play Video
The development phase depends on the remaining risks. For example, if performance or user-
interface risks are treated more essential than the program development risks, the next phase may
be an evolutionary development that includes developing a more detailed prototype for solving the
risks.
When to use?
1. When deliverance is required to be frequent.
2. When the project is large
3. When requirements are unclear and complex
4. When changes may require at any time
5. Large and high budget projects
Advantages
1. High amount of risk analysis
2. Useful for large and mission-critical projects.
Disadvantages
1. Can be a costly model to use.
2. Risk analysis needed highly particular expertise
3. Doesn't work well for smaller projects.
Agile Methodology
The meaning of Agile is swift or versatile. "Agile process Methodology " refers to a software
development approach based on iterative development. Agile methods break tasks into smaller
iterations, or parts do not directly involve long term planning. The project scope and requirements
are laid down at the beginning of the development process. Plans regarding the number of
iterations, the duration and the scope of each iteration are clearly defined in advance.
When to use?
1. When frequent changes are required.
2. When a highly qualified and experienced team is available.
3. When a customer is ready to have a meeting with a software team all the time.
4. When project size is small.
Advantage (Pros) of Agile Method:
1. Frequent Delivery
2. Face-to-Face Communication with clients.
3. Efficient design and fulfils the business requirement.
4. Anytime changes are acceptable.
5. It reduces total development time.
Disadvantages (Cons) of Agile Method:
1. Due to the shortage of formal documents, it creates confusion and crucial decisions taken
throughout various phases can be misinterpreted at any time by different team members.
2. Due to the lack of proper documentation, once the project completes and the developers
allotted to another project, maintenance of the finished project can become a difficulty.
Waterfall model
Winston Royce introduced the Waterfall Model in 1970.This model has five phases: Requirements
analysis and specification, design, implementation, and unit testing, integration and system testing,
and operation and maintenance. The steps always follow in this order and do not overlap. The
developer must complete every phase before the next phase begins. This model is named "Waterfall
Model", because its diagrammatic representation resembles a cascade of waterfalls.
Rational Unified Process (RUP) is a software development process for object-oriented models. It is
also known as the Unified Process Model. It is created by Rational corporation and is designed and
documented using UML (Unified Modelling Language). This process is included in IBM Rational
Method Composer (RMC) product. IBM (International Business Machine Corporation) allows us to
customize, design, and personalize the unified process. Some characteristics of RUP include use-case
driven, Iterative (repetition of the process), and Incremental (increase in value) by nature.
1. Inception –
Communication and planning are the main ones.
Identifies the scope of the project using a use-case model allowing managers to estimate
costs and time required.
Customers’ requirements are identified and then it becomes easy to make a plan for the
project.
The project plan, Project goal, risks, use-case model, and Project description, are made.
The project is checked against the milestone criteria and if it couldn’t pass these criteria
then the project can be either cancelled or redesigned.
2. Elaboration –
Planning and modelling are the main ones.
A detailed evaluation and development plan is carried out and diminishes the risks.
Revise or redefine the use-case model (approx. 80%), business case, and risks.
Again, checked against milestone criteria and if it couldn’t pass these criteria then again
project can be cancelled or redesigned.
Executable architecture baseline.
3. Construction –
The project is developed and completed.
System or source code is created and then testing is done.
Coding takes place.
4. Transition –
The final project is released to the public.
Transit the project from development into production.
Update project documentation.
Beta testing is conducted.
Defects are removed from the project based on feedback from the public.
5. Production –
The final phase of the model.
The project is maintained and updated accordingly.
Advantages:
1. It provides good documentation; it completes the process in itself.
2. It provides risk-management support.
3. It reuses the components, and hence total time duration is less.
4. Good online support is available in the form of tutorials and training.
Disadvantages:
1. Team of expert professional is required, as the process is complex.
2. Complex and not properly organized process.
3. More dependency on risk management.
4. Hard to integrate again and again.
Spiral Model
The spiral model, initially proposed by Boehm, is an evolutionary software process model that
couples the iterative feature of prototyping with the controlled and systematic aspects of the linear
sequential model. It implements the potential for rapid development of new versions of the
software. Using the spiral model, the software is developed in a series of incremental releases.
During the early iterations, the additional release may be a paper model or prototype. During later
iterations, more and more complete versions of the engineered system are produced.
Planning:
Finally, the next step is planned. The project is reviewed, and a choice made whether to continue
with a further period of the spiral. If it is determined to keep, plans are drawn up for the next step of
the project.
The development phase depends on the remaining risks. For example, if performance or user-
interface risks are treated more essential than the program development risks, the next phase may
be an evolutionary development that includes developing a more detailed prototype for solving the
risks.
The meaning of Agile is swift or versatile. "Agile process model" refers to a software development
approach based on iterative development. Agile methods break tasks into smaller iterations, or parts
do not directly involve long term planning. The project scope and requirements are laid down at the
beginning of the development process. Plans regarding the number of iterations, the duration and
the scope of each iteration are clearly defined in advance.
Phases of Agile Model:
Following are the phases in the Agile model are as follows:
1. Requirements gathering
2. Design the requirements
3. Construction/ iteration
4. Testing/ Quality assurance
5. Deployment
6. Feedback
Waterfall model
Winston Royce introduced the Waterfall Model in 1970.This model has five phases: Requirements
analysis and specification, design, implementation, and unit testing, integration and system testing,
and operation and maintenance. The steps always follow in this order and do not overlap. The
developer must complete every phase before the next phase begins. This model is named "Waterfall
Model", because its diagrammatic representation resembles a cascade of waterfalls.
V-Model
V-Model also referred to as the Verification and Validation Model. In this, each phase of SDLC must
complete before the next phase starts. It follows a sequential design process same as the waterfall
model. Testing of the device is planned in parallel with a corresponding stage of development.
Verification:
It involves a static analysis method (review) done without executing code. It is the process of
evaluation of the product development process to find whether specified requirements meet.
Validation:
It involves dynamic analysis method (functional, non-functional), testing is done by executing code.
Validation is the process to classify the software after the completion of the development process to
determine whether the software meets the customer expectations and requirements.
1. Business requirement analysis: This is the first step where product requirements understood
from the customer's side. This phase contains detailed communication to understand
customer's expectations and exact requirements.
2. System Design: In this stage system engineers analyse and interpret the business of the
proposed system by studying the user requirements document.
3. Architecture Design: The baseline in selecting the architecture is that it should understand
all which typically consists of the list of modules, brief functionality of each module, their
interface relationships, dependencies, database tables, architecture diagrams, technology
detail, etc. The integration testing model is carried out in a particular phase.
4. Module Design: In the module design phase, the system breaks down into small modules.
The detailed design of the modules is specified, which is known as Low-Level Design
5. Coding Phase: After designing, the coding phase is started. Based on the requirements, a
suitable programming language is decided. There are some guidelines and standards for
coding. Before checking in the repository, the final build is optimized for better performance,
and the code goes through many code reviews to check the performance.
1. Unit Testing: In the V-Model, Unit Test Plans (UTPs) are developed during the module design
phase. These UTPs are executed to eliminate errors at code level or unit level. A unit is the
smallest entity which can independently exist, e.g., a program module. Unit testing verifies
that the smallest entity can function correctly when isolated from the rest of the codes/
units.
2. Integration Testing: Integration Test Plans are developed during the Architectural Design
Phase. These tests verify that groups created and tested independently can coexist and
communicate among themselves.
3. System Testing: System Tests Plans are developed during System Design Phase. Unlike Unit
and Integration Test Plans, System Tests Plans are composed by the client?s business team.
System Test ensures that expectations from an application developer are met.
4. Acceptance Testing: Acceptance testing is related to the business requirement analysis part.
It includes testing the software product in user atmosphere. Acceptance tests reveal the
compatibility problems with the different systems, which is available within the user
atmosphere. It conjointly discovers the non-functional problems like load and performance
defects within the real user atmosphere.
When to use V-Model?
1. When the requirement is well defined and not ambiguous.
2. The V-shaped model should be used for small to medium-sized projects where requirements
are clearly defined and fixed.
3. The V-shaped model should be chosen when sample technical resources are available with
essential technical expertise.
Advantage (Pros) of V-Model:
1. Easy to Understand.
2. Testing Methods like planning, test designing happens well before coding.
3. This saves a lot of time. Hence a higher chance of success over the waterfall model.
4. Avoids the downward flow of the defects.
5. Works well for small plans where requirements are easily understood.
Disadvantage (Cons) of V-Model:
1. Very rigid and least flexible.
2. Not a good for a complex project.
3. Software is developed during the implementation stage, so no early prototypes of the
software are produced.
4. If any changes happen in the midway, then the test documents along with the required
documents, has to be updated.
V-model
The V-model is a type of SDLC model where process executes in a sequential manner in V-shape. It is
also known as Verification and Validation model. It is based on the association of a testing phase for
each corresponding development stage. Development of each step directly associated with the
testing phase. The next phase starts only after completion of the previous phase i.e., for each
development activity, there is a testing activity corresponding to it.
Verification:
It involves static analysis technique (review) done without executing code. It is the process of
evaluation of the product development phase to find whether specified requirements meet.
Validation:
It involves dynamic analysis technique (functional, non-functional), testing done by executing code.
Validation is the process to evaluate the software after the completion of the development phase to
determine whether software meets the customer expectations and requirements.
Principles of V-Model:
When to use?
1. Where requirements are clearly defined and fixed.
2. The V-Model is used when ample technical resources are available with technical expertise.
Advantages:
1. This is a highly disciplined model and Phases are completed one at a time.
2. V-Model is used for small projects where project requirements are clear.
3. Simple and easy to understand and use.
4. This model focuses on verification and validation activities early in the life cycle thereby
enhancing the probability of building an error-free and good quality product.
5. It enables project management to track progress accurately.
It is based on an estimate of the amount of work that needs to be done. Project requirements need
to be written to define this scope of work. Prototype or Wireframes also need to be created to help
the development team figure out the hours necessary to implement all features. With a fixed-price
project, the service provider and the customer both carry some scope-related risk. Any extra work
(when clients want to add a totally new feature that was not specified in the documentation) usually
goes under an additional agreement. In this case, the client must pay extra.
In this model, it’s important to discuss everything before the actual development in order to
estimate the cost of the software product. The fixed-price model ensures that a project is done and
delivered within a specific timeframe and budget.
Billing Model
It involves regularly paying for work completed. With this model, the customer plays a greater role in
the development of the software solution and carries all risks related to the scope of work. The level
of responsibility that the client carries for the whole development process with time & materials is
much higher than with fixed-price or milestone projects. The customer gets set up with a team and is
billed for the actual time spent on development.
RG Timesheet of a BA
RA Timesheet of a BA
Design Timesheet of a BA
Development Timesheet of a BA
Testing Timesheet of a BA
UAT Timesheet of a BA
The following would probably be covered by the five quarterly audits that are scheduled for the
project:
3. Q3 Audit – Implementation
In this audit, the BA would review the system's code to ensure that it is being implemented
according to the design specifications, coding standards, and best practices. During the
Implementation phase in Q3 audit, several documents should be presented to the auditor.
These documents include: Source code: Unit test cases: Integration test cases: Test results:
Code review report: Deployment plan.
4. Q4 Audit – Testing
This audit would involve reviewing the test cases and test results to ensure that the system
is being tested thoroughly and that all defects are being identified and addressed. The
Testing phase in Q4 audit, several documents should be presented to the auditor. These
documents include: Test plan: Test cases: Test results: Traceability matrix: Defect report:
User acceptance test plan and results.
5. Q5 Audit – Deployment
During this audit, the BA would review the deployment plan to ensure that the system is
being deployed properly and that any potential issues are being mitigated. Deployment
phase in Q5 audit, several documents should be presented to the auditor. These documents
include: Deployment plan: User manual: System documentation: System security plan:
System backup and recovery plan: Change Request plan.
Problem faced by so many farmers. So, is has been decided to make an online
agriculture product store to facilitate remote area farmers to buy agriculture products. Through
this Online Web / mobile Application, Farmers and Companies (Fertilizers, seeds and pesticides
manufacturing Companies) can communicate directly with each other.
The project is under agriculture domain into IT field. There are enough information
corresponding to the domain.
To elicit requirements for the entire project will require a lot of time. That’s a very time-efficient
exercise.
In that case, we created a small team by choosing members from the departments itself (who
were IT enabled and understood processes). Each team was led by a leader or process
champion. Each department team was made responsible for interacting with other members of
the team to gather requirements and document it. Of course, we conducted a small session to
help them understand the formal documentation.
Once the leader or process champions, completed their work, our team of business analysts will
sit with the leaders or process champions and their respective teams for knowledge transfer and
review.
This technique helped us save a lot of time. The critical success factor for this approach is
Brainstorming:
Make sure that Leader or process champions understand software development process
and the business processes.
Make sure that formal documentation format is finalised well in advance and
communicated with all the teams.
The knowledge transfer and review meetings conducted at regular intervals to ensure
better efficiency.
• The interests of all stakeholders who may affect or be affected by the programme/project;
• Potential conflicts or risks that could jeopardise the initiative;
• Opportunities and relationships that can be built on during implementation;
• Groups that should be encouraged to participate in different stages of the project;
• Appropriate strategies and approaches for stakeholder engagement; and
• Ways to reduce negative impacts on vulnerable and disadvantaged groups.
We can use a stakeholder wheel technique, which contains each stakeholder that impacts the
project, such as:
Owners: Mr. Henry, Mr. Pandu, Mr. Dooku
Managers: senior or middle managers responsible for communication and monitoring the
progress
Employees: developers, analysts, or testers responsible for delivering the project
Regulators: any regulators involved that monitor adherence to rules — e.g. a regulator that
monitors HIPAA compliance
Suppliers: any API provider or other supplier service needed that the project might need
Partners: individuals responsible for working alongside the project that provides
complementary or supplementary products or services
Customers: the end-users of the product
Competitors: a potential section of users of competitive products or inputs from the
competitors themselves
Written Communication
Memos
Contracts
Reports
Manuals
Guides
Publications and brochures
Letters
Faxes
Digital Communication
Email
Messaging apps
Project management apps
Video conferencing software
Intranet
Blogs
Social media
Live chat
Chatbots
Press releases
Display advertising
Mobile Communication
Mobile phone calls
SMS text messaging
Messaging apps
Video calls on mobile apps
This form can be used to record the client's sign-off and officially bring the project to a close. Use
this form when the project outcome has been measured against its acceptance criteria and has
been formally accepted on behalf of the client.
Using this form will officially bring your project to a close and give you an opportunity to discuss
key aspects of the project with your sponsor. In the end it will give you a mutually agreed upon
outcome.
A three-tier architecture is a client-server architecture in which the functional process logic, data
access, computer data storage and user interface are developed and maintained as independent
modules on separate platforms.
Three-tier architecture is a software design pattern and a well-established software architecture.
Three-tier architecture allows any one of the three tiers to be upgraded or replaced independently.
The user interface is implemented on any platform such as a desktop PC, smartphone or tablet as a
native application, web app, mobile app, voice interface, etc. It uses a standard graphical user
interface with different modules running on the application server.
The relational database management system on the database server contains the computer data
storage logic.
The middle tiers are usually multitiered. Since the three are not physical but logical in nature, they
may run in different servers both in on-premises based solutions, as well as in software-as-a-service
(SaaS).
It provides great freedom to development teams who can independently update or replace
only specific parts of the application without affecting the product as a whole.
The application can be scaled up and out rather easily by detaching the front-end application
from the databases that are selected according to the individual needs of the customer.
New hardware, such as new servers, can also be added at a later time to deal with massive
amounts of data or particularly demanding services.
A three-tier-architecture also provides a higher degree of flexibility to enterprises who may
want to adopt a new technology as soon as it becomes available.
Critical components of the application can be encapsulated and retained while the whole
system keeps evolving organically.
Development cycle or upgrade times are significantly improved ensuring minimal disruption
in customer’s experience.
Different teams can work on different sections of the application rather than on the full
stack according to their areas of expertise, improving their efficiency and speed.
Presentation/Application Tier
Occupies the top level and displays information related to services commonly available on a web
browser or web-based application in the form of a graphical user interface (GUI). It constitutes the
front-end layer of the application and the interface with which end-users will interact directly. This
tier is usually built on web development frameworks, such as CSS or JavaScript, and communicates
with other tiers by sending results to the browser and other tiers in the network through API calls.
All reusable components (logic pertaining to industry), Frequently changing Components, Governing
Body rules and regulations, Compliances should go to middle layer Ex: Printer, Payment Gateways,
mail Servers, RBI rules for banks, IRDA rules for Insurance, etc.
This tier — also called the middle tier, logic tier, business logic or logic tier — is pulled from the
presentation tier. It controls the application’s core functionality by performing detailed processing
and is usually coded in programming languages, such as Python, Java, C++, .NET, etc.
Data Tier
Houses database servers where information is stored and retrieved. Data in this tier is kept
independent of application servers or business logic, and is managed and accessed with programs,
such as MongoDB, Oracle, MySQL, and Microsoft SQL Server.
2. To solve a problem
The 5W1H method is a tool because this allows you to understand a potentially problematic
situation by asking the right questions.
What: What is your problem? What are the products and services you will use to communicate?
Who: Who are your targets? To whom will you communicate? Which members of your team will
oversee various jobs?
Where: Where will you obtain the information, you need? Where are the places you would like to
communicate?
When: How often would you communicate? What is your schedule?
Why: What are the benefits of the products/services on which you are communicating? What is the
objective of this communication strategy?
How: What are the means of communication that you are going to put in place (web site, social
media, events, brochures, etc)?
SMART analysis
SMART analysis is a business analysis technique which helps a business analyst describe the user’s
expectations of a business solution. SMART analysis is a process that involves analysing, planning,
documenting, elaborating, validating and managing business system requirements.
When analysing the requirements, a business analyst checks that all the requirements are SMART:
Specific;
Measurable;
Achievable;
Relevant;
Time-framed.
Specific
The requirement is clear and unambiguous. Explains to the project team exactly what’s expected.
Measurable
The requirement can be measured to determine whether it’s been met.
Achievable
The requirement is attainable otherwise we are sitting ourself up to fail.
Relevant
The requirement must be relevant to the business needs of the organisation and be realistic as well.
Time-framed
The requirement has a clearly defined time frame for when it will be achieved.
RACI
Responsible
Completes task or objective, or makes decision.
Leads due diligence process, including gathering necessary input and information.
Responsible for the performance of the task.
Authorize
Key decision maker(s) for the deliverable (note: Typically, a PM, business user and possible a
vendor counterpart).
Holds final decision authority for the content of a specific project deliverable.
Granting of approval indicates the individual has evaluated the idea/project and approves it
in its proposed form.
Consult
Individual possessing perspective or information valuable to a deliverable.
Perspective taken into account/used at the discretion of the Responsible. The approver does
not need to agree with decision.
Inform
Individual who needs to know results of decision to effectively carry out existing role.
Notified after decision is made.
3 Tier Architecture
Use cases
A use-case describes a sequence of actions, performed by a system that provides value to an actor.
The use-case describes the system’s behaviour under various conditions as it responds to a request
from one of the stakeholders, called the primary actor.
The actor is the Who of the system, in other words he the end user.
In software and systems engineering, a use-case is a list of steps, typically defining interactions
between a role (known in UML as an "actor") and a system, to achieve a goal. The actor can be a
human or an external system.
Activity Diagram
Activity diagrams can be used to describe the business and operational step-by-step workflows of
components in a system. An activity diagram shows the overall flow of control. Another site puts it
even more simply: Activity diagrams are used to illustrate activities. To that end, activity diagrams
may be used to describe an entire system, a use case, or an activity within the use case.
The questions are in accordance with the flow of work and its components.
Page Design
Brainstorming
This technique is used to generate new ideas and find a solution for a specific issue. The members
included for brainstorming can be domain experts, subject matter experts. Multiple ideas and
information give you a repository of knowledge and you can choose from different ideas.
This session is generally conducted around the table discussion. All participants should be given an
equal amount of time to express their ideas.
Document Analysis
Reverse engineering
This elicitation technique is generally used in migration projects. If an existing system has outdated
documentation, it can be reverse engineered to understand what the system does. This is an
elicitation technique that can extract implemented requirements from the system.
There are two types of reverse engineering techniques.
Black box reverse engineering: The system is studied without examining its internal structure
(function and composition of software).
White box reverse engineering: The inner workings of the system are studied (analysing and
understanding of software code).
Focus Group
By using a focus group, you can get information about a product, service from a group. The Focus
group includes subject matter experts. The objective of this group is to discuss the topic and provide
information. A moderator manages this session.
The moderator should work with business analysts to analyse the results and provide findings to the
stakeholders.
Observation
The main objective of the observation session is to understand the activity, task, tools used, and
events performed by others. The plan for observation ensures that all stakeholders are aware of the
purpose of the observation session, they agree on the expected outcomes, and that the session
meets their expectations. You need to inform the participants that their performance is not judged.
During the session, the observer should record all the activities and the time taken to perform the
work by others so that he/she can simulate the same. After the session, the BA will review the
results and will follow up with the participants. Observation can be either active or passive.
Workshop
Joint Application Development (JAD) technique is an extended session to the workshop. In the JAD
session stakeholders and project team works together to identify the requirements. These sessions
allow the business team to gather and consolidate large amounts of information. Identification of
stakeholders is the critical to the overall success of the JAD session. The JAD team includes business
process owners, client representatives or stakeholders, business analysts, project managers, IT
experts (developers, quality assurance, designers, and security).
Interview
This is the most common technique used for requirement elicitation. Interview techniques should be
used for building strong relationships between business analysts and stakeholders. In this technique,
the interviewer directs the question to stakeholders to obtain information. One to one interview is
the most commonly used technique.
If the interviewer has a predefined set of questions, then it’s called a structured interview.
If the interviewer is not having any particular format or any specific questions then it’s called an
unstructured interview.
For an effective interview, you can consider the 5W1H technique. When you get an answer to all
your Whys then you are done with your interview process. Open-ended questions are used to
provide detailed information. In this interviewee cannot say Yes or No only.
Prototyping
Screen mock-ups can support the requirement gathering process, when introduced at the correct
time. Mock-ups help stakeholders visualize the functionality of a system. This can be an advantage to
business analysts and stakeholders since this allows them to identify gaps/problems early on.
Questionnaire
Prototyping
Use case specifications can be used as an elicitation technique in requirements gathering to help
stakeholders and designers better understand and communicate the intended usage of the product
or system. A use case is a description of a specific interaction between a user and the product or
system that achieves a specific goal or objective.
By defining use cases, designers can better understand the different ways in which users will interact
with the product or system and identify the specific requirements needed to support those
interactions. Use cases can also help to identify potential edge cases or scenarios that may not be
immediately obvious.
Use case specifications typically include a narrative description of the interaction, as well as a set of
steps or actions that the user will take to achieve the desired outcome. They may also include
information about the different roles or actors involved in the interaction, as well as any external
systems or processes that may be required.
One of the main benefits of using use case specifications as an elicitation technique is that they
provide a structured way to capture and organize requirements in a way that is easy to understand
and communicate to stakeholders. Use cases can also help to ensure that all stakeholders are on the
same page and working towards a shared vision.
Document Analysis
Brainstorming
Quantity over quality. The idea is that quantity will eventually breed quality as ideas are
refined, merged, and developed further.
Withhold criticism. Team members should be free to introduce any and all ideas that come
into their heads. Save feedback until after the idea collection phase so that “blocking” does
not occur.
Welcome the crazy ideas. Encouraging your team members to think outside of the box, and
introduce pie in the sky ideas opens the door to new and innovative techniques that may be
your ticket for success.
Combine, refine, and improve ideas. Build on ideas, and draw connections between
different suggestions to further the problem-solving process.
BR001 – Farmers should be able to search for available products in fertilizers, seeds, pesticides.
BR002 – Manufacturers should be able to upload and display their products in the application.
BR003 – Expecting to have a login for all its users (fertilizers, seeds, pesticides manufacturers and
Farmers).
BR004 – If a farmer wants to buy any product or add them to buy-later list.
BR005 – If it is a new user, then they can create a new account by submitting their email ID and
creating a secure password.
BR006 – A Farmer should be able to browse through the products catalogue once they visit the
website.
BR007 – An easy-to-use payment gateway which should include cash-on-delivery (COD).
BR008 – An easy-to-use payment gateway which should include Credit/Debit card.
BR009 – An easy-to-use payment gateway which should include UPI options.
BR010 – A user gets an email confirmation regarding their order status.
BR011 – A delivery tracker to track the whereabouts of their order.
Question 28 –Assumptions
User-friendly interface
Mobile-friendly adaptation
Website search and filtering functionality
Registration and related issues
Payment options
Shipping rates
content management
Mobile functionality
Proper product showcase and descriptions
Customer support
Payment options
Registration
Actor User
The use case begins when the actor indicates the intent to register to the
Description
system. It ends when the actor is a register or cancels registration.
Administration/User Login
Actor Administrator/User
The use case begins when the actor indicates the intent to login to the system.
Description
It ends when the actor is log in or cancels login.
Manage cart
Actor User
The use case begins when the actor indicates the intent to add items into
Description
the cart. It ends when the actor enters the next
View Products
Use Case View Products
Actor User
The use case begins when the actor indicates to view the products. It
Description
ends when the actor is close to the application
Actor User
The use case begins when the actor indicates the intent to confirm the
Description
purchase of his selected items
Place Order
Actor Admin/User
The use case begins when the actor indicates the intent to view
Description orders detail of customers and the use case begins when the actor
indicates the intent to view orders detail of itself.
Non-Functional Requirements
Microsoft Visio
Microsoft Visio can be used to create simple or complicated diagrams. It offers a wide variety of
built-in shapes, objects, and stencils to work with. You can also make your own shapes and import
them if you’re willing to do all that extra work. The driving idea behind Visio is to make diagramming
as easy as possible for the user. I think Visio is on the right track for that.
Another thing Visio can do is pull in live information from an external source, such as an Excel sheet
or Access database. This makes diagrams functional and current. The most recent example I’ve seen
involved using Visio to monitor network status across a localized broadband system.
Balsamiq
Question 36 – RTM
Registration be able to
register with the
application
FR0002 Farmer Farmers should NA NA NA NA NA NA
information information of
of the the products,
products item no, size,
categories
FR0004 The Vendor or seller NA NA NA NA NA NA
er vendor manufacturers
Registration should be able to
register with the
application
FR0006 Logins to Logins to the NA NA NA NA NA NA NA
Cash payment by
Cash.
FR0008 Payment by The mode of NA NA NA NA NA NA NA
Credit or payment by
debit card credit or debit
cards.
FR0009 Payment by The mode of NA NA NA NA NA NA NA
of involved in the
transaction online
transaction are
Registration,
Placing an order,
and, Payment.
FR0013 Maintains The system that NA NA NA NA NA NA NA
meet Web
Content
Accessibility
Guidelines
WCAG 2.1.
NFR0103 System The system NA NA NA NA NA NA
availability should be
dependable and
available to
clients on a
constant basis.
NFR0106 System The system NA NA NA NA NA NA
Test Case ID OAPS001 Test Case Name Farmer Search for Products
Project ID OAPS Project Name Online Agriculture product Store
PM ID ### PM Name
Test Strategy ID OAPSTS001 Tester ID
Test Plan ID OAPSTP001 Tester Name
Test Schedule ID OAPSTS001 Date of Test
Scenario: Online Agriculture Product Store: Farmers to purchase farming products online and Manufacturer
supplier can sell through this application and products can delivered to the farmers door step.
Farmers should be able to search for available products in fertilizers, seeds, pesticides
Result
Pass
Pass/Fail
Test Case ID OAPS002 Test Case Name Manufacturers upload their
Products
Project ID OAPS Project Name Online Agriculture product Store
PM ID ### PM Name
Test Strategy ID OAPSTS002 Tester ID
Test Plan ID OAPSTP002 Tester Name
Test Schedule ID OAPSTS002 Date of Test
Scenario: Online Agriculture Product Store: Farmers to purchase farming products online and Manufacturer
supplier can sell through this application and products can delivered to the farmers door step.
Expecting to have a login for all its users (fertilizers, seeds, pesticides manufacturers and Farmers)
Result
Pass
Pass/Fail
Scenario: Online Agriculture Product Store: Farmers to purchase farming products online and Manufacturer
supplier can sell through this application and products can delivered to the farmers door step.
Manufacturers should be able to upload and display their products in the application.
Result
Pass
Pass/Fail
Test Case ID OAPS004 Test Case Name Add product to buy later list
Project ID OAPS Project Name Online Agriculture product Store
PM ID ### PM Name
Test Strategy ID OAPSTS004 Tester ID
Test Plan ID OAPSTP004 Tester Name
Test Schedule ID OAPSTS004 Date of Test
Scenario: Online Agriculture Product Store: Farmers to purchase farming products online and Manufacturer
supplier can sell through this application and products can delivered to the farmers door step.
If a farmer wants to buy any product or add them to buy-later list.
Result
Pass
Pass/Fail
Test Case ID OAPS005 Test Case Name Create new account and a secure
password
Project ID OAPS Project Name Online Agriculture product Store
PM ID ### PM Name
Test Strategy ID OAPSTS005 Tester ID
Test Plan ID OAPSTP005 Tester Name
Test Schedule ID OAPSTS005 Date of Test
Scenario: Online Agriculture Product Store: Farmers to purchase farming products online and Manufacturer
supplier can sell through this application and products can delivered to the farmers door step.
If it is a new user, then they can create a new account by submitting their email ID and creating a secure
password
Set1 Set 2 Set3 Set 4 Set 5
1.A new user visits the application for the first time.
2.The new user clicks on the "Sign Up" button.
Input Data
3.The new user provides their email ID and creates a
secure password.
1.The system should allow the new user to enter their
email ID and create a secure password.
2.The system should validate the email ID and
password to ensure they meet the required format and
security standards.
Expected 3.If the email ID and password meet the required
Behaviour standards, the system should create a new account for
the user and redirect them to the application
dashboard.
4.If the email ID and password do not meet the
required standards, the system should display an error
message indicating what requirements were not met.
1.If the system functions as expected, it should allow
the new user to create a new account and redirect
them to the application dashboard.
Actual
2.If the system does not allow the new user to create a
Behaviour
new account or if it does not validate the email ID and
password correctly, then it is not meeting the expected
behaviour.
Comments
Result
Pass
Pass/Fail
Test Case ID OAPS006 Test Case Name Browse through products
Project ID OAPS Project Name Online Agriculture product Store
PM ID ### PM Name
Test Strategy ID OAPSTS006 Tester ID
Test Plan ID OAPSTP006 Tester Name
Test Schedule ID OAPSTS006 Date of Test
Scenario: Online Agriculture Product Store: Farmers to purchase farming products online and Manufacturer
supplier can sell through this application and products can delivered to the farmers door step.
A Farmer should be able to browse through the products catalogue once they visit the Application.
Result
Pass
Pass/Fail
Test Case ID OAPS007 Test Case Name Payment through COD
Project ID OAPS Project Name Online Agriculture product Store
PM ID ### PM Name
Test Strategy ID OAPSTS007 Tester ID
Test Plan ID OAPSTP007 Tester Name
Test Schedule ID OAPSTS007 Date of Test
Set1 Set 2 Set3 Set 4 Set 5
1.A customer has added items to their cart and
wishes to complete their purchase.
Input Data
2.The customer clicks on the "Proceed to Checkout"
button.
1.The system should display a list of payment options
to the customer.
2.The payment options should include cash-on-
delivery (COD) as one of the options.
3.The payment gateway should be easy-to-use and
user-friendly.
Expected
4.If the customer chooses COD as the payment
Behaviour
option, the system should display a confirmation
message and allow the customer to confirm their
purchase.
5.If the customer chooses any other payment option,
the system should redirect them to the payment
gateway for that option.
1.If the system functions as expected, it should
display a list of payment options to the customer and
Actual allow them to choose COD if they prefer.
Behaviour 2.If the system does not include COD as a payment
option or if the payment gateway is difficult to use,
then it is not meeting the expected behaviour.
Comments
Result
Pass
Pass/Fail
Scenario: Online Agriculture Product Store: Farmers to purchase farming products online and Manufacturer
supplier can sell through this application and products can delivered to the farmers door step.
An easy-to-use payment gateway which should include cash-on-delivery (COD)
Test Case ID OAPS008 Test Case Name Payment through credit/debit
card
Project ID OAPS Project Name Online Agriculture product Store
PM ID ### PM Name
Test Strategy ID OAPSTS008 Tester ID
Test Plan ID OAPSTP008 Tester Name
Test Schedule ID OAPSTS008 Date of Test
Scenario: Online Agriculture Product Store: Farmers to purchase farming products online and Manufacturer
supplier can sell through this application and products can delivered to the farmers door step.
An easy-to-use payment gateway which should include Credit/Debit card
Result
Pass
Pass/Fail
Test Case ID OAPS009 Test Case Name Payment through UPI
Project ID OAPS Project Name Online Agriculture product Store
PM ID ### PM Name
Test Strategy ID OAPSTS009 Tester ID
Test Plan ID OAPSTP009 Tester Name
Test Schedule ID OAPSTS009 Date of Test
Scenario: Online Agriculture Product Store: Farmers to purchase farming products online and Manufacturer
supplier can sell through this application and products can delivered to the farmers door step.
An easy-to-use payment gateway which should include UPI options.
Result
Pass
Pass/Fail
Result
Pass
Pass/Fail
Result
Pass
Pass/Fail
Question 38 – DB Design
Don’t start building a database without input from the project sponsor and other stakeholders. Get
consensus on precise expectations, and consider how hard it will be to train users on the search
functions.
This is usually as easy as deciding between SQL and NoSQL (though there are more specific types
that may be appropriate for some projects).SQL databases are the standard for structured data,
when data integrity is absolutely important. Emerging technology like machine learning or the
Internet of Things (IoT) find the speed, scalability, and fluid requirements of NoSQL databases a
better fit. Web analytics, social networks and some other types of databases also work much better
within the NoSQL framework.
In reality, most companies today function in a hybrid world of SQL and NoSQL databases that work
together in complex arrangements. With such a complicated structure, it’s critical to normalize data
to achieve minimum redundancy.
Eliminate multi-valued attributes and repeated attributes, then start in on the subkeys.
The database belongs to its future users, not its creator, so design with them in mind. Stay away
from shortcuts, abbreviations, or plurals. Use consistent naming conventions. Don’t reinvent the
wheel or make things difficult for those who may need to modify the database at some point, which
will certainly happen.
Look into the full range of options to enforce business rules, such as foreign key, check, not null, and
the like. The application will prevent some bad data from getting in, but not all of it.
6. Document Everything
No matter how annoying it may seem, documentation is as essential as primary keys. Take care to
document the design, entity-relationship schemas, and triggers for future users.
7. Plan for Increasing Backup Time in the Build
Before delving too deeply into design, think about what happens during a natural or man-made
disaster. Plan for failover clustering, auto backups, replication and any other procedures necessary
to ensure that the database structure remains intact.
As the saying goes, “Prepare and prevent, don’t repair and repent.”
The GDPR signals an era of increasing privacy concerns. Encrypt passwords, and don’t assign an
administrator without privacy training and well-documented qualifications. This can be a tricky rule
to follow due to office politics, but as a good security practice the database should be as closed as
possible.
Create indexes for queries that will be used regularly. Use a database analyser to determine if an
index or a clustered index is necessary. Consider incorporating tools like Elasticsearch to speed up
searches.
Put the database on a different server than the web to lower CPU usage. In addition to freeing up
compute resources, it also helps to keep the database out of the reach of unauthorized users.
Database schema
ER Diagram
Question 39 – Data Flow Diagram
A data flow diagram (DFD) maps out the flow of information for any process or system. It uses
defined symbols like rectangles, circles and arrows, plus short text labels, to show data inputs,
outputs, storage points and the routes between each destination. Data flowcharts can range from
simple, even hand-drawn process overviews, to in-depth, multi-level DFDs that dig progressively
deeper into how the data is handled. They can be used to analyse an existing system or model a new
one. Like all the best diagrams and charts, a DFD can often visually “say” things that would be hard
to explain in words, and they work for both technical and nontechnical audiences, from developer to
CEO. That’s why DFDs remain so popular after all these years. While they work well for data flow
software and systems, they are less applicable nowadays to visualizing interactive, real-time or
database-oriented software or systems.
Question 40 – Change Request
A change request is a proposal to alter a product or system, often brought up by the client or
another team member. During a project, this can happen when a client wants to change or alter the
agreed upon deliverables.
There are a lot of obstacles to overcome when trying to deliver on a project. A change request will
often come up throughout the course of most projects so it is a good idea to have a plan for how to
handle them ahead of time.
Often, change requests are necessary and can offer many benefits. Managing this process in an
effective way can allow for greater internal communication, efficiency, and alignment with overall
business goals. Here are five tips on effectively managing change requests:
You want the person who is making the change to be as specific as possible. Ask that person to put
their request in writing and provide any supporting materials that might be helpful.
Have that person articulate why they are requesting this change and what the anticipated benefit of
their change request is. This will help your team determine whether or not the change request is
worth the effort.
It is a good idea to consider what the scope of the change request is. If your team chooses to
implement this change, what new requirements will this put on the project? You will want to
consider all aspects of the project that will be impacted by implementing this change request.
If the request is outside of the scope, a lot of problems might end up popping up – going over-
budget, for example. Or having to waste too much time on a project you’d never even agreed on.
Before your team implements any changes to the project you should consider any possible risks.
What is the expected benefit of the change being proposed? Is this change request the result of an
actual need to respond to a change in the marketplace or would it simply be nice to have?
You can consider the opinion of the person who proposed the change request, but at the same time,
use common sense. The client might not know what’s in their own best interests.
Have clearly defined guidelines for evaluating the urgency as there may be varying opinions amongst
team members.
Approve or reject the change request
Now that you know how important (or unimportant) the change request is and understand the
impact it will have on the project, the team can either approve or reject the request.
Different organizations will have different ways of going about the approval process. Generally, a
change request that will require minimal additional work can be approved within the team. Whereas
a change request that would require a month’s worth of additional work may require executive
approval.
If the change request is approved then the project deliverables will need to be updated. This can
include plans and schedules, business process documents, and the requirements documents.
Once these updates have been made, the project manager can communicate the new course of
action to everyone who will be impacted. Now you can delegate the necessary tasks to the people in
charge of implementing these new changes.
It is a Change request. So As a BA I will try to explain the difference and the process of it
To me,
Change Request (CR) – A formally submitted artifact that is used to track all stakeholder requests
(including new features, enhancement requests, defects, changed requirements, etc.) along with
related status information throughout the project lifecycle. All change history will be maintained
with the Change Request, including all state changes along with dates and reasons for the change.
This information will be available for any repeat reviews and for final closing.
Activity Description Responsibility
Assign & Once a Change Request is Opened, the Project Manager Project Manager
Schedule will then assign the work to the appropriate team
Work member – depending on the type of request (e.g.,
enhancement request, defect, documentation change,
test defect, etc.) – and make any needed updates to the
project schedule.
Make The assigned team member performs the set of activities Assigned Team
Changes defined within the appropriate section of the process Member
(e.g., requirements, analysis & design, implementation,
produce user-support materials, design test, etc.) to make
the changes requested. These activities will include all
normal review and unit test activities as described within
the normal development process. The Change Request
will then be marked as Resolved.
Verify After the changes are Resolved by the assigned team Tester
Changes in member (analyst, developer, tester, tech writer, etc.), the
Test Build changes are placed into a test queue to be assigned to a
tester and Verified in a test build of the product.
Verify Once the resolved changes have been Verified in a test CCB Delegate (System
Changes in build of the product, the Change Request is placed into a Integrator)
Release Build release queue to be verified against a release build of the
product, produce release notes, etc. and Close the Change
Request.
Question 42 – Estimations
OAPS Project Estimation
Project
Project Name OAPS ID
Project
Project Manager Sponsor
End
Start Date Date
Manhour
Resources Resource Estimated Cost Other Estimated
Project Deliverables Remarks
req. Name Hours (Per Cost Cost
Hour)
Initation / Planning
Task 1
Mr
TasK 2
2 Vandanam 24hrs
Task 3
Mr.Shivam
…......
Requirement Analysis
Task 1
TasK 2 Mr.
1 56hrs
Task 3 Shivam
…......
Design
Task 1 Mr
TasK 2 Vandanam
3 168hrs
Task 3 Ms. Juhi
…...... Mr Shivam
Development
Task 1 Ms. Juhi
TasK 2 Mr Teyson
5 Ms Lucie 1080hrs
Task 3 Mr Tucker
…...... Mr Bravo
Testing / QA
Task 1
Mr Jason
TasK 2
3 Ms Alekya 1440hrs
Task 3
Mr Shivam
…......
Implementation
Task 1
Mr Mike
TasK 2
3 Mr John 720hrs
Task 3
Mr Shivam
…......
Operation & Maintenance
Operation Activities
Maintenance
Activities
Estimated Total Cost
Question 43 – UAT
UAT (User Acceptance Testing) is the process of evaluating a system or its component(s) with the
intention of accepting it. The acceptance process involves the following steps:
1. Plan: Define the scope, objectives, and the approach for UAT.
3. Test preparation: Create test cases based on the requirements and allocate them to the
testers.
4. Test execution: Conduct UAT by executing the test cases and verifying that the system meets
the requirements.
5. Defect management: Document and track any defects found during UAT and ensure they are
fixed.
6. Report generation: Prepare a UAT report summarizing the testing results and make
recommendations for acceptance or rejection.
7. Approval: Obtain approval from stakeholders such as the business sponsor, project manager,
and the client.
9. Approval: Once all defects have been resolved and the solution meets the required
standards, the solution is approved for release.
11. Post-Deployment Review: Conduct a review of the solution after deployment to ensure that
it is functioning as intended and to identify any areas for improvement.
The UAT process is crucial for ensuring that the system meets the expectations of the end-users and
meets the business requirements before it is deployed to the production environment.
2. Provide the client with a clear explanation of the UAT process, including the objectives,
scope, and expected outcome.
3. Prepare the UAT environment, which should be as close as possible to the production
environment, and ensure that all necessary resources are available.
4. Provide the client with detailed instructions on how to perform the tests, and ensure that
the client has access to all relevant documentation and test cases.
5. Monitor the UAT process, and provide support to the client as needed.
6. Document any issues or defects identified during UAT, and work with the development team
to resolve them as quickly as possible.
7. Once the UAT process is successfully completed, and all issues and defects have been
resolved, request the client's approval to proceed with deployment to the production
environment.
1. Confirm that all project deliverables have been completed and accepted by the client.
2. Document the final results of the project, including any lessons learned, and use this
information to improve future projects.
3. Obtain formal acceptance from the client and stakeholders, indicating that the project has
been completed successfully.
4. Release any resources that have been allocated to the project, such as team members,
equipment, or software licenses.
5. Archive project documentation and other relevant materials in a secure location for future
reference.
6. Deliver final documentation: Deliver the final project documentation to the client, including
the UAT test cases, test results, and any other relevant documents.
7. Celebrate the successful completion of the project and recognize the contributions of all
team members.
Question 44 – Project Closure Document
A project closure document is a formal document that outlines the completion of a project. It
summarizes the key results and achievements of the project, provides a final assessment of the
project's performance, and outlines any lessons learned for future reference. The purpose of the
project closure document is to formally close the project, transfer ownership of the deliverables to
the client, and ensure that all stakeholders are aware of the project's status.
The following is a general outline of the content that can be included in a project closure document:
1. Executive summary: A brief overview of the project, including the project's objectives, scope,
and key results.
2. Project performance: An assessment of the project's performance against its objectives and
KPIs (Key Performance Indicators).
3. Deliverables: A list of all the deliverables produced during the project, along with a
description of their quality and functionality.
4. Acceptance: Confirmation of acceptance by the client of the deliverables and the project as a
whole.
5. Closeout: Details of how the project was closed, including any remaining actions required to
complete the project.
6. Lessons learned: A summary of lessons learned during the project, including both successes
and failures, and recommendations for future projects.
7. Final reports: Any final reports produced during the project, such as a project plan, risk
assessment, and status reports.
8. Next steps: Recommendations for future actions, including any follow-up projects or further
improvements.
The project closure document serves as a record of the project's completion and provides valuable
information for future reference and continuous improvement.