SDLC models: o One of the basic notions of the software development process is SDLC models which stand for Software Development Life Cycle models.. The most used, popular and important
Trang 1
Higher Nationals in Computing
Unit 09: SOFTWARE DEVELOPMENT LIFE CYCLE
ASSIGNMENT1
Assessor name: VO NGOC MAI
Learner’s name: VU HOAI THAO MY
Trang 2UNIVERSITY of
GREENWICH
anc wn [g/g soon ‘BTEC
ASSIGNMENT 1 FRONT SHEET
Qualification BTEC Level 5 HND Diploma in Computing
Unit number and
title Unit 9: Software Development Life Cycle
Submission date 30/11/2020 Date Received 1st submission
Re-submission Date Date Received 2nd submission
Student Name Vu Hoai Thao My Student ID GCS190634 Class GCS0805_PPT Assessor name Vo Ngoc Mai
[ Pl | P
Trang 35ÙA UNIVERSITY 1ÿ GREENWICH
sone wn alg soon ‘BTEC
Trang 4
ASSIGNMENT 1 BRIEF
Qualification BTEC Level 5 HND Diploma in Computing
Unit number Unit 9: Software Development Life Cycle
Assignment title Planning a Software Development Lifecycle
Academic Year 2020 — 2021
Unit Tutor Vo Ngoc Mai
Issue date Submission date
IV name and date
Submission Format:
Format: The submission is in the form of 1 document
You must use font Calibri size 12, set number of the pages and use multiple line spacing at 1.3 Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm The reference follows Harvard referencing system
Submission Students are compulsory to submit the assignment in due date and in a way requested by the Tutors The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/
Note: The Assignment must be your own work, and not copied by or from another student or from books etc If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you must reference your sources, using the Harvard style Make sure that you know how to reference properly, and that understand the guidelines on plagiarism /f you do not, you definitely get failed
Unit Learning Outcomes:
LO1 Describe different software development lifecycles
LO2 Explain the importance of a feasibility study
Assignment Brief and Guidance:
Trang 5&as7 GREENWICH ° ‘BT E C
Scenario
Tune Source is a company headquartered in southern California Tune Source is the brainchild of three entrepreneurs with ties to the music industry: John Margolis, Megan Taylor, and Phil Cooper Originally, John and Phil partnered to open a number of brick and mortar stores in southern California specializing
in hard-to-find and classic jazz, rock, country, and folk recordings Megan soon was invited to join the partnership because of her contacts and knowledge of classical music Tune Source quickly became known as the place to go to find rare audio recordings Annual sales last year were $40 million with annual growth at about 3%—5% per year Tune Source currently has a website that enables customers to search for and purchase CDs This site was initially developed by an Internet consulting firm and is hosted
by a prominent local Internet Service Provider (ISP) in Los Angeles The IT department at Tune Source has become experienced with Internet technology as it has worked with the ISP to maintain the site
System Request
Project Sponsor: Carly Edwards, Assistant Vice President, Marketing
Business Need: This project has been initiated to increase sales by creating the capability of selling digital music downloads to customers through kiosks in our stores, and over the Internet using our website Business Requirements: Using the Web or in-store kiosks, customers will be able to search for and purchase digital music downloads The specific functionality that the system should have includes the following:
e Search for music in our digital music archive
e Listen to music samples
e Purchase individual downloads at a fixed fee per download
e Establish a customer subscription account permitting unlimited downloads for a monthly fee
e Purchase music download gift cards
Business Value: We expect that Tune Source will increase sales by enabling existing customers to purchase specific digital music tracks and by reaching new customers who are interested in our unique archive of rare and hard-to-find music We expect to gain a new revenue stream from customer subscriptions to our download services We expect some increase in cross-selling, as customers who have downloaded a track or two of a CD decide to purchase the entire CD ina store or through our website We also expect anew revenue stream from the sale of music download gift cards
Conservative estimates of tangible value to the company include the following:
e $757,500 in sales from individual music downloads
e $950,000 in sales from customer subscriptions
e §205,000 in additional in-store or website CD sales
Trang 6Special Issues or Constraints:
e The marketing department views this as a strategic system The ability to offer digital music downloads is critical in order to remain competitive in our market niche Our music archive of rare and hard-to-find music is an asset that is currently underutilized
se Many of our current loyal customers have been requesting this capability, and we need to provide this service or face the loss of these customers’ business
e Because customers have a number of music download options available to them elsewhere we need to bring this system to the market as soon as possible
You need to discuss the following Tasks:
Task 1
You are a project manager of ABC company Your company now collaborating with Tune Source to complete the project You have to create a report about SDLC models which could be used in Tune Source You report should contain the following content:
Describe 4 SDLC models: Waterfall, V-Model, Spiral, Rapid Development Which method is best for Tune Source and why?
Your report also should list some risks and offer an approach to manage risks
Task 2
Discuss why a team needs to conduct feasibility study and what areas should be conducted in feasibility study?
Trang 7environment
P2 Explain how risk is managed in
the Spiral lifecycle model
LO2 Explain the importance of a feasibility study
P3 Explain the purpose of a M2 Discuss the components of a D2 Assess the impact of different
feasibility report feasibility report feasibility criteria on a software
investigation
P4 Describe how technical
solutions can be compared
Trang 87 GREENWICH “BT EC anne on IIE cán
P1 Describe two iterative and two sequential software lifecycle models 1
1 Arisk management process involves: 10
2 The types of risk your business faces: 11
3 Strategic and compliance risks: 11
4, Financial and operational risks: 12
5 Use preventative measures for business contÏnUÏfV: «<< < <<<<<<<<<« 14
6 How to manage risks: 14
Il Some Risk: 15
1 Inaccurate Estimations: 15 1.1 What are inaccurate estimations? 15 1.2 How do you accurately estimate softWar€? - «cm 6mm me 15
2 Scope Variations: 16
2.1 What are scope variations? 16
Trang 93.3 Some possible mitigation strategies for this risk include: - -
4 Stakeholder Expectations:
4.1 What are Stakeholder Expectations?
4.2 How do you set expectations with stakeholderrs? << << << << << << s2
5 Poor Quality Code:
5.1 What is bad code? 5.2 How do you define technical debt? 5.3 How can you improve code quality? Risks for Tune Source project:
1 Poor Project Leadership:
2 Project Team Problems:
3 Project Team Leader Leaves During Project ExeCUtÍOII: -« eeeeeeeeeeee
4 No Continuity in The Project:
5 Inaccurate Time and Budget Estimates:
6 Lack of Project Resources:
7 Change of Business Strategy:
LO2 Explain the importance of a feasibility study:
P3 Explain the purpose of a feasibility report
| What is feasibility report?
ll Purpose Of A Feasibility Report:
Trang 10
st UNIVERSITY wy GREENWICH ee “3
imac ago a “BT EC lll What Are The Benefits Of A Feasibility Development? 22
IV Elements in a Basic Feasibility Report: 23
1 Financial and Economic feasibility: 23
| Feasibility study: 26
1 What is Feasibility study? 26
2 Advantages of using the feasibility study in Project Managemehnt: 27
1 .NET technology: 30
2 Java technology: 32
3 Open source technology: 35
IV Alternative Matrix: 37 REFERENCES 38
Trang 11
Gd UNIVERSITY pd
@is7 GREENWICH “BT E Cc
ance wn [g/g sen
ASSIGNMENT 1 ANSWERS LO1 Describe different software development lifecycles:
P1 Describe two iterative and two sequential software lifecycle models
l SDLC models:
o One of the basic notions of the software development process is SDLC models which stand for Software Development Life Cycle models SDLC — is a continuous process, which starts from the moment, when it’s made a decision to launch the project, and it ends at the moment of its full remove from the exploitation There is no one single SDLC model They are divided into main groups, each with its features and weaknesses
oEvolving from the first and oldest “waterfall” SDLC model, their variety significantly expanded The SDLC models diversity is predetermined by the wide number of product types — starting with a web application development to complex medical software And if you take one of the SDLC models mentioned below as the basis —in any case, it should be adjusted to the features of the product, project, and company The most used, popular and important SDLC models are given below:
© Waterfall — is a cascade SDLC model, in which development process looks like the flow, moving step
by step through the phases of analysis, projecting, realization, testing, implementation, and support This SDLC model includes gradual execution of every stage completely This process is strictly documented and predefined with features expected to every phase of this software development life cycle model
Page |1
Trang 12Management simplicity thanks to its rigidity:
every phase has a defined result and process High risks and uncertainty
Perfect for the small or mid-sized projects where
- - Inappropriate for the long-term projects requirements are clear and not equivocal
Easy to classify and prioritize tasks
Integration is done at the very end, which does not give the option of identifying the problem in
advance
& Use cases for the Waterfall SDLC model:
¥ The requirements are precisely documented
¥ Product definition is stable
¥ The technologies stack is predefined which makes it not dynamic
¥ No ambiguous requirements
Page |2
Trang 13oThe basic idea behind the working behavior of prototype model is that in this SDLC model instead of freezing of customer requirements before a design or coding phase (likewise waterfall model) can proceed A throwaway or a temporary prototype is built to understand the customer product requirements This prototype model is developed under the current requirements of the product By the use of these prototypes the customer can get “a real behavior” of developed product In this model of SDLC the customer interactions with prototype can enable the customer to better
understand the requirements of the desired system Customer involvement and provide a valuable feedback about the functional behavior of the software product helps to software developer and designers to better understand the problem and overcome the problem with continuously working
So that the exactly as per the user expectation product developed
o Prototyping SDLC modeling approach, also known as evolutionary approach This approach came to picture after the failures of the final version of the software application development approach used
in waterfall model The failure in the waterfall model generally occurs when the changes in the requirement of the proposed system form the customer side or when a gap in between better understanding the customer requirement by the software development team A gap in the first version of the developed application, inevitably leads to the need for redoing the application To overcome these limitations, the concept of prototyping was introduced
“ Advantages and disadvantages of SDLC Prototype model:
o Every software development model has own advantages and disadvantages that decide the working area of the model Here we are listing all the advantage and disadvantages of prototype model:
* = Advantages of prototype model:
oThe advantage to developing software in the prototype model is that this model allows a high user interface of the customer with the developed system The working methodology of prototype model
Page |3
Trang 14* = =Disadvantages of Prototype model:
oTo concern the disadvantage of system development in the prototype model increase the
complexity of the system as the functional scope of the system is extended beyond the pre- scheduled function of the system Incomplete application may cause application not to be used as the full system and the functionality of the product
* Pros and Cons of Prototype model:
The SDLC prototype model is used in typical cases when the big amount of data and high functional system development The decision should be taken very carefully in prototype modeling so that the efforts spent in building the prototype add considerable value to the final software developed The model has its own pros and cons listed in below table
Pros of prototype model Cons of prototype model
High involvement of the customer before actual
implementation of the product
Risk of insufficient requirement analysis owing to too much dependency on prototype
User gets a better understanding with the
developed system when a working model of the
system displayed in build prototype phase
Users may get confused in the prototypes and
actual systems
Reduces time and cost as the defects can be
detected much earlier
Practically, this methodology may increase the complexity of the system as scope of the system may expand beyond original plans
Missing functionality can be identified easily
Confusing or difficult functions can be identified
The effort invested in building prototypes may be too much if not monitored properly
Page |4
Trang 15@ RAN ‘BTEC
& Application of SDLC Prototype Model:
o Software development Prototype model is most very useful approach in the application software development This model has high level of user interactions with almost all phases of the model such
as online systems In prototype model the system development which needs users to fill out forms
or go through various screens before data is processed can use prototyping very effectively to give the imaginary similar to actual working feel and look even before the actual software is developed
o One of the highly required applications of system developed under prototype model is to handle high data processing environment This model involves too much of data processing and most of the functionality is internal with very little user interface that does not usually benefit from prototyping System developed under prototype model could be an extra overhead in such projects and may need lot of extra efforts
oln prototype model development team ensures that the end users constantly work with the system and review the system and provide a feedback which is incorporated in the prototype to result ina usable system They are excellent for designing good human computer interface systems
3 Agile:
oln the agile methodology after every development iteration, the customer is able to see the result and understand if he is satisfied with it or he is not This is one of the advantages of the agile software development life cycle model One of its disadvantages is that with the absence of defined requirements it is difficult to estimate the resources and development cost Extreme programming is one of the practical uses of the agile model The basis of such model consists of short weekly meetings — Sprints which are the part of the Scrum approach
Page |5
Trang 16provide the competitiveness
Difficulties with measuring the final cost because
Fast release of the first product version With all the corrections and changes there is
possibility that the project will exceed expected
time
“ Use cases for the Agile model:
¥ The users’ needs change dynamically
Y Less price for the changes implemented because of the many iterations
¥ Unlike the Waterfall model, it requires only initial planning to start the project
4 Spiral:
o Spiral model —is SDLC model, which combines architecture and prototyping by stages It is a combination of the Iterative and Waterfall SDLC models with the significant accent on the risk analysis The main issue of the spiral model — is defining the right moment to make a step into the
Page |6
Trang 17G&D UNIVERSITY
@qs7 GREENWICH
ance wn [g/g sen ‘BTEC
next stage The preliminary set time frames are recommended as the solution to this issue The shift
to the next stage is done according to the plan, even if the work on the previous stage isn’t done yet The plan is introduced basing on the statistic data, received during the previous projects even from the personal developer’s experience
Requirements plan Concept ot ‘operation Development plan} & Validation Test plan
A = Cumulative Cost Progress
design
tr —x Prototype 2
Concept ot requirements,
Lifecycle is divided into small parts, and if the risk
concentration is higher, the phase can be
finished earlier to address the treats
Can be quite expensive
The development process is precisely
documented yet scalable to the changes
The risk control demands involvement of the highly-skilled professionals
The scalability allows to make changes and add
new functionality even at the relatively late
stages
Can be ineffective for the small projects
The earlier working prototype is done - sooner
users can point out the flaws Big number of the intermediate stages requires
excessive documentation
Use cases for the Spiral model:
Page |7
Trang 18> UNIVERSITY »
GREENWICH °
¥ Customer isn’t sure about the requirements
¥ Major edits are expected during the development cycle
¥ The projects with mid or high-level risk, where it is important to prevent these risks
¥ The new product that should be released in a few stages to have enough of clients feedback
ll Method is best for tune source:
= | choose spiral model for the project because the spiral model has four quadrants
to help meet the requirements and quarantees of the project Let us discuss them
in detail:
Determine Objectives, Evaluate Alternatives,
Alternatives and identify and resolve
Constraints Risks
—
—
/ Develop next-level Plan next Phase Product
Trang 19Gd UNIVERSITY pd
a7 GREENWICH SBT E C
ance wn [g/g sen
= Quadrant 2: Evaluate alternatives, identify and resolve risks
- Study alternatives relative to the objectives and constraints that are determined
- Identify risks such as lack of experience, new technology, tight schedules, etc
- Resolve the identified risks evaluating their impact on the project, identifying the needed mitigation and contingency plans and implementing them Risks always need to be monitored
= Quadrant 3: Develop next-level product
oTypical activities include:
= Quadrant 4: Plan next phase
oTypical activities include:
- Develop project plan
- Develop configuration management plan
- Develop atest plan
— Develop an installation plan
oThe Spiral model can be used when:
- Creation of a prototype is appropriate
- Risk evaluation is important
- Aproject is of medium to high-risk
Page |9
Trang 20@ RAN ‘BTEC
-— Users are unsure of their needs
- Requirements are complex
— Product-line is new
- Significant changes are expected during exploration
— Long-term project commitment unwise because of potential business changes
P2 Explain how risk is managed in the Spiral lifecycle model:
I Management Risk:
1 Arisk management process involves:
o Businesses face many risk, therefore risk management should be a central part of any business’ strategic management Risk management helps you to identify and address the risks facing your business and in doing so increase the likelihood of successfully achieving your businesses objectives oArisk management process involves:
- Methodically identifying the risks surrounding your business activities
- Assessing the likelihood of an event occurring
- Understanding how to respond to these events
- Putting systems in place to deal with the consequences
- Monitoring the effectiveness of your risk management approaches and controls
oAs a result, the process of risk management:
- Improves decision-making, planning and prioritisation
- Helps you allocate capital and resources more efficiently
- Allows you to anticipate what may go wrong, minimising the amount of firefighting you have to
do or, in a worst-case scenario, preventing a disaster or serious financial loss
- Significantly improves the probability that you will deliver your business plan on time and to budget
Page |10
Trang 212 The types of risk your business faces:
oThe main categories of risk to consider are:
- Strategic, for example a competitor coming on to the market
- Compliance, for example the introduction of new health and safety legislation
- Financial, for example non-payment by a customer or increased interest charges on a business loan
- Operational, for example the breakdown or theft of key equipment
o These categories are not rigid and some parts of your business may fall into more than one category The risks attached to data protection, for example, could be considered when reviewing your operations or your business’ compliance
o Other risks include:
- Environmental risks, including natural disasters
- Employee risk management, such as maintaining sufficient staff numbers and cover, employee safety and up-to-date skills
- Political and economic instability in any foreign markets you export goods to
- Health and safety risks
3 Strategic and compliance risks:
o Strategic risks are those risks associated with operating in a particular industry
o They include risks arising from:
- Merger and acquisition activity
Page |11
Trang 22tà UNIVERSITY „
SBT E C
- Changes among customers or in demand
- Industry changes
- Research and development
oFor example you might consider the strategic risks of the possibility of a US company buying one of your Canadian competitors This may give the US company a distribution arm in Canada You may want to consider:
- Whether there are any US companies which have the cash/share price to do this
- Whetherthere are any Canadian competitors who could be a takeover target, perhaps because
of financial difficulties
- Whetherthe US company would lower prices or invest more in research and development
o Where there's a strong possibility of this happening, you should prepare some sort of response
o Compliance risk
oCompliance risks are those associated with the need to comply with laws and regulations They also apply to the need to act in a manner which investors and customers expect, for example, by
ensuring proper corporate governance
o You may need to consider whether employment or health and safety legislation could add to your overheads or force changes in your established ways of working
o You may also want to consider legislative risks to your business You should ask yourself whether the products or services you offer could be made less marketable by legislation or taxation — as has happened with tobacco and asbestos products For example, concerns about the increase in obesity may prompt tougher food labeling regulations, which may push up costs or reduce the appeal of certain types of food
4, Financial and operational risks:
o Financial risks are associated with the financial structure of your business, the transactions your business makes and the financial systems you already have in place
Page |12
Trang 23tà UNIVERSITY „
i7 GREENWICH ° ‘BT E C
oldentifying financial risk involves examining your daily financial operations, especially cash flow If your business is too dependent on a single customer and they are unable to pay you, this could have serious implications for your business’ viability
- The way you extend credit to new customers
- Who owes you money
- The steps you can take to recover it
- Insurance that can cover large or doubtful debts
o Financial risk should take into account external factors such as interest rates and foreign exchange
Page |13
Trang 24tà UNIVERSITY „
i7 GREENWICH SBT E C
olT risk and data protection are increasingly important to business If hackers break into your IT systems, they could steal valuable data and even money from your bank account which at best would be embarrassing and at worst could put you out of business A secure IT system employing encryption will safeguard commercial and customer information
5 Use preventative measures for business continuity:
o Risk management involves putting processes, methods and tools in place to deal with the
consequences of events you have identified as significant threats for your business This could be something as simple as setting aside financial reserves to ease cash flow problems if they arise or ensuring effective computer backup and IT support procedures for dealing with a systems failure
o Programs which deal with threats identified during risk assessment are often referred to as business continuity plans These set out what you should do if a certain event happens, for example, if a fire destroys your office You can't avoid all risk, but business continuity plans can minimize the
disruption to your business
o Risk assessments will change as your business grows or asa result of internal or external changes This means that the processes you have put in place to manage your business risks should be regularly reviewed Such reviews will identify improvements to the processes and equally they can indicate when a process is no longer necessary
6 How to manage risks:
oThere are four ways of dealing with, or managing, each risk that you have identified You can:
Page |14