Professional Documents
Culture Documents
FACULTY OF ENGINEERING
(CSE 6101)
Though the system will mainly be oriented towards pedagogical ends, other
key objectives include :
?? Lock control based on user identity to only allow authorised users into
buildings and labs.
Page 1 of 9
/Continued
UMIS will be primarily an end-user system. Users will use the system within
the constraints of the permissions assigned by the administrator to identify,
locate, and receive documents. UMIS output to the user will be via the html
interface, email and print. The print output will mainly be documents
supplied which, because of copyright restrictions, must be printed and
deleted immediately upon receipt. The email output will be documents,
messages from the system and other output.
Since access to the network and internet access will be provided through
wireless networks, security features must be built into the system for user
authentication and to prevent parking-lot attacks. All information in UMIS
must also be encrypted using a 128-bit key prior to transmission.
Page 2 of 9
UMIS Requirements Specification
Identifier Requirement
1. System Administration
SAD01 UMIS will provide a range of services available only to the system
administrator. These are primarily:
(i) Management of access permissions for users to services of UMIS
(ii) Remote administration of security features built-into the system
2. User Interface
UI01 The user interface shall be in HTML. Users will access UMIS via
standard web browsers such as Netscape and Internet Explorer.
When the user logs in, he will be presented with a personalised
interface with only the services accessible to him displayed.
3. User Accounts
… … [requirements not included]
… …
4. Lock Control
… … [requirements not included]
… …
5. User Services
… … [requirements not included]
… …
6. Communication
C01 Users shall communicate with UMIS via the HTML interface over an
Ethernet or WiFi network connection
C02 Users input to UMIS will be via the HTML interface
For the lock control system, the user input shall be a fin gerprint image
from a scanning device
C03 UMIS output to the user will be via the HTML interface, email and
print. The print output will be mainly documents which because of
copyright restrictions must be printed and deleted immediately upon
receipt. Email output shall be messages from the system with the
possibility of attached documents. The system shall maintain the
confidentiality of messages.
7. Security
S01 UMIS shall provide for user authentication to prevent unauthorised
access
S02 Since UMIS will also be accessible over wireless networks, the system
shall encrypt all data before transmission to prevent parking-lot
attacks.
Page 3 of 9
Question 1
(b) (i) Write down the requirements for the User Accounts, Lock Control, User
Services dimensions. Please use an appropriate numbering scheme.
[8 marks]
(iii)Which other dimension could be used for classifying the same set of
requirements?
[2 marks]
Page 4 of 9
Question 2
(a) (i) Using a pseudo-code approach, write TWO plausible scenarios for
some of the activities in UMIS.
[3 + 3 marks]
(ii) Discuss the merits of using the technique in part (i) for eliciting
requirements.
[3 marks]
(c) Consider the following requirements taken from the UMIS requirements
specification :
C01: Users shall communicate with UMIS via the HTML interface
over an Ethernet or WiFi network connection
UI01: The user interface shall be in HTML. Users will access UMIS via
standard web browsers such as Netscape and Internet Explorer.
When the user log in, he will be presented with a personalised interface
with only the services accessible to him displayed.
What problems (if any) might analysis checks on requirements C01 and
UI01 reveal? Rewrite the requirements to correct these problems.
[4 marks]
(d) Using your rewritten (and renumbered) requirements from part (c) and
the ones given in the UMIS Requirements Specification on page 3, build an
interaction matrix to show how these requirements interact with each
other. Do not include your requirements for the User Accounts, Lock
Control and User Services dimensions.
[4 marks]
(e) (i) Which problems with the elicited requirements can be uncovered by an
interaction matrix?
[2 marks]
(ii) What should then be done with the problematic requirements you
found (if any) using your interaction matrix in (d)?
[2 marks]
Page 5 of 9
Question 3
(c) Using the checklist suggested below, review the requirements grouped
under the ‘Lock Control’ dimension and discover possible problems with
them.
Check Description
1. Understandability Can readers of the document understand what the requirements
mean?
2. Redundancy Is information unnecessarily repeated in the requirements
document?
3. Completeness Does the checker know of any missing requirements or is there
any information missing from individual requirement
descriptions?
4. Ambiguity Are the requirements expressed using terms which are clearly
defined? Could readers from different backgrounds make
different interpretations of the requirements?
5. Consistency Do the descriptions of different requirements include
contradictions? Are there contradictions between individual
requirements and overall system requirements?
6. Organisation Is the document structured in a sensible way? Are the
descriptions of requirements organised so that related
requirements are grouped?
7. Conformance to Does the requirements document and individual requirements
standards conform to defined standards? Are departures from the
standards, justified?
8. Traceability Are requirements unambiguously identified, include links to
related requirements and to the reasons why these
requirements have been included?
[4 marks]
(d) Explain the notion of viewpoints used in the VORD method. Why are
indirect viewpoints very important? Illustrate your answer with an
example.
[3 + 2 + 2 marks]
(f) For each of the viewpoints identified, determine which services must be
provided by UMIS.
Page 6 of 9
[4 marks]
Question 4
(b) Explain why both coarse-grain and fine-grain activity models of a process
should be produced in an organisation.
[4 marks]
(e) Some people are against including a system architecture diagram because
they argue that the system architecture is a design model and no design
information should be in the Requirements Specification document. What
reasons would you forward to counter their argument?
[3 marks]
Page 7 of 9
Question 5
(a) Using examples to support your answer, explain why domain knowledge
is important in the requirements elicitation process.
[3 marks]
(b)
Borrow
? Library
book?. Book
reader?. Borrower
book? ? stock
book? ? dom onLoan
onLoan’ = onLoan ? {(book?, reader?)}
stock’ = stock
Figure 1
(ii) What are the advantages of formal methods over informal methods
for describing requirements?
[3 marks]
(iii) Explain why formal methods are not widely used in industrial
software development.
[3 marks]
(c) Suggest THREE reasons why the requirements for the UMIS system might
change.
[3 marks]
Page 8 of 9
Question 5 (continued)
UI01 The user interface shall be in HTML. Users will access UMIS via
standard web browsers such as Netscape and Internet Explorer.
When the user log in, he will be presented with a personalised interface with
only the services accessible to him displayed.
C01 Users shall communicate with UMIS via the HTML interface over an
Ethernet or WiFi network connection
C03 UMIS output to the user will be via the HTML interface, email and
print. The print output will be mainly documents which because of copyright
restrictions must be printed and deleted immediately upon receipt. Email
output shall be messages from the system with the possibility of attached
documents. The system shall maintain the confidentiality of messages.
[10 marks]
/sf
Page 9 of 9
Page 10 of 9