Mau Asm 1
Mau Asm 1
Mau Asm 1
UNIT 5
Class: GCS0703A
Submission Format:
Task1
Page 1
Now your team had been accepted to create the Software to Tune Source. As a member of a
development team, your task now is to produce the requirements for Tune Source. You also need to
specify the technique(s) or processes you used in order to get these requirements.
Task 2
Based on the requirements which established in Task1 provide the following diagrams: Use Case, ERD,
DFD. which can help to identify more clearly about the system you are going to implement.
Task 3
Based on your understanding about the Tune Source’s requirements in Task1 and Task 2, show how the
requirement can be addressed. Your method could include software behavioural specification methods
and reliability and effectiveness of software.
Task 4
Your client want to improve the software quality. Create a report which shows how software quality
could be improved from tracing requirements and program design.
Page 2
Learning Outcomes and Assessment Criteria
M6 Differentiate between
a finite state machine
(FSM) and an extended-
FSM, providing an
application for both.
Page 3
Contents
TASK 1 ................................................................................................................................................................................ 5
P5 Undertake a software investigation to meet a business need. .................................................................................... 5
Project analysis .............................................................................................................................................................. 5
Methods of collecting information ................................................................................................................................ 5
Observational Method............................................................................................................................................... 5
Interview Method ...................................................................................................................................................... 6
Questionnaires/Surveys............................................................................................................................................. 7
Which method should we use for the current project? ................................................................................................ 9
Step-to-step approach for Questionnaire method.................................................................................................... 9
List of questions: ............................................................................................................................................................ 9
TASK 2 ................................................................................................................................................................................ 9
P6 Use appropriate software analysis tools/techniques to carry out a software investigation and create supporting
documentation .................................................................................................................................................................. 9
Stackholders: ................................................................................................................................................................. 9
Costs: ............................................................................................................................................................................. 9
Security Considering .................................................................................................................................................... 10
Update Software...................................................................................................................................................... 10
SQL Injection ............................................................................................................................................................ 10
Error Messages ........................................................................................................................................................ 10
Validation of Data .................................................................................................................................................... 10
Passwords ................................................................................................................................................................ 10
SSL ............................................................................................................................................................................ 10
Use case diagram ......................................................................................................................................................... 11
Entity relationships diagram ........................................................................................................................................ 13
DFD .............................................................................................................................................................................. 14
TASK 3 .............................................................................................................................................................................. 22
P7 Explain how user and software requirements have been addressed. ....................................................................... 22
Upload function ........................................................................................................................................................... 23
Browse the song function ............................................................................................................................................ 24
Reference ........................................................................................................................................................................ 25
Page 4
TASK 1
This illusion contains the picture description for Observational method (measuring 2019)
Observational Method
[1] [4]
Developers often use observation techniques to leverage and evaluate data through professional
observation and teaching, or working environments. This method is used to determine how requirements,
growth possibilities or a business method can be identified, to establish and evaluate the effectiveness of a
Page 5
proposal, to recommend and to offer the highest quality alternatives for developing a design. Furthermore,
this technique is often used together with other techniques to verify the precision of the information being
collected.
There are two basic approaches to observation techniques: Active and passive
Active Method: The investigator will ask any concerns concerning data about the problems necessary to
create the software project when monitoring the method of operating on an object. Although this
technique creates an unsafe working flow disturbance of the job or observer item, designers can rapidly
comprehend why hidden activities and procedures are involved in a workflow.
Passive Method: The way the participants observe and gather data on the work process of the observant's
item is the technique through which they silently observe and retrieve. The advantage of this method helps
designers to see how actually the piece of nature functions. The best way to gather the information needed
to develop the project is to provide assessments and analysis. In order to best gather data, researchers can
use special technical equipment.
Interview Method
[2]
Method for questioning chosen topics is the information gathering technique. This is the only way to know
the opinions and plans of our customers. But there are also certain disadvantages to the interview method.
It is elevated price, time consuming and sometimes the gathered data is not adequate and needs the
interviewer to have some expertise or operating environment.
This illusion contains the picture description for Observational method (guides 2019)
Today, many techniques of interview are available, for example individual surveys, concentrate community
meetings, telephone and courier surveys. The benefits and disadvantages of each technique will be their
own.
Personal interviews: The method of interviewing and interviewing persons to meet and discuss directly is
personal interview techniques. The interviewer can change questions or explain issues if the respondent
fails to understand the matter. This technique offers a greater flexibility than others.
Direct interviews will probably obtain more data from the client-replying questionnaire, as the interviewer
can see to obtain further information on the interviewer by observation (environmental work, attitude,
behaviour, costumes). The ability to interview and communicate or negotiate will be implemented and the
quality and quantity of information obtained shall be determined.
Page 6
Group Interview: The interviewer will encounter with a team of 5 to 10 individuals in a pleasant
atmosphere in the focus group study method, which helps interviewees and interviewed persons to think
safe. Closer to the ceiling and close. The interviewer will prepare the open questions during the interview
process to encourage the customers to discuss the issues raised freely. In order to gain a better
understanding of the client's position on a problem, the interviewer can make consecutive questions. The
aim of collective interview methods is to provide ideas and ideas to be evaluated and further evaluated by
means of surveys and data obtained. This method is also used to learn more about the behavior of
consumers. Nevertheless, the method of immediate contact has elevated price disadvantages; the
interviewer has a lengthy history in leading and suggesting various questions during the debate.
Mail interview: is the technique by e-mail to the interviewee by issuing a questionnaire. The receiver simply
has to check and send the questions to the interviewer. The benefit is that the designer does not need
communication or negotiation skills because he is not faced with the test, the test findings are not partial.
Costs for interviews are significantly smaller than for other interviews. The disadvantage of this method is
that it is time consuming and not suitable for specialized problems.
Due to their own advantages and disadvantages in each data collection method. Consequently, individuals
often merge various techniques for collecting and assessing the finest in project development.
Questionnaires/Surveys
[3]
You must have excellent information if you want to get a nice research paper. And if you want excellent
data, a nice questionnaire or study must be designed and implemented. Data collection techniques for
generating a useful study paper are quite distinct.
Page 7
This illusion contains the picture description for Questionnaires/Survey method (Shareyouressays 2019)
The most prevalent and simplest study to do, however. This way you can create a survey, then submit it to
many individuals, then use these responses for analyzing and evaluating information.
In other words, you will use questions to rate your consent and usually ask questions like the image above
in the questionnaire article. Moreover, you can also collect information by using YES / NO questions.
Good data collection. You have to make sure that those who reply to your questionnaire have to respond
responsibly, seriously and not randomly. If too many people harass, the data you collect will not be
different from a stack of waste and no good results. Then, how can good data collection be guaranteed?
• In the case of the respondent, it is very difficult for people, especially if people have no benefit, to
ask them to answer their questionnaire fully seriously. So, I want excellent information. Give the
answering individual a tiny donation that will assist them to respond more severely.
• The questionnaire should be translated into a language that is familiar to you. If you write a
questionnaire in competent English it is not permissible for the respondents to fully comprehend or
misinterpret the material that contributes to inaccurate responses. This helps you to achieve better
results.
• Take charge of the questionnaire slightly by slightly, do not be careless about it, look for a
questionnaire issue or time to reply all questions How soon does it take? Please put yourself in the
situation of the respondent to see if your survey is dull or hard to reply. Before you give it to the
user, please check and check many times.
Page 8
Which method should we use for the current project?
If the decision is left to me alone to decide, I would like to take the Questionnaires methods. We will get
valuable information just from UX, and we also collect the necessary information (which may become
crucial) to aid to our decision.
List of questions:
1. How big is the current Tune Source’s system?
2. What is the scope of this Tune Source’s project?
3. How the risk being controlled in the past Tune Source’s system?
4. How big is the budget for this current project?
5. How is this project being paid? (following successive paying method?)
6. Which function will be needed for this project?
7. What data will be handled to us (the IT company) to process?
8. How will this project end?
9. What is our (the IT company) rights?
10. When is the deadline?
TASK 2
P6 Use appropriate software analysis tools/techniques to carry out a software investigation and create
supporting documentation
Stackholders:
- John Margolis, Megan Taylor, Phil Cooper: Co-Founders of Tune Source
- Carly Edwards: Project Sponsor, Assistant Vice President, Marketing
- Nguyen Quang Vinh: Project Manager
Costs:
Web Server Free to Pay-as-use
Domain Name $500
SSL certificate $100
Website development team $8000
Website maintenance $400
Contents manager system $900
E-commerce functionality $2000
Page 9
Security Considering
Over the years, system safety is one of the worst issues. Today's technology is increasing, and the risks to
safety are also more advanced and harmful. We also evaluated and provided some safety alternatives for
the digital music devices in response to safety hazards for TuneSource's internet initiative, and we will
subsequently provide a few alternatives. TuneSource scheme has been used for security.
Update Software
An Up-to-date software will help a lot with security since almost all the visible bugs has been handled by a
third-party company
SQL Injection
By using special character on the input, hacker can simply hack into the database system and cause
damage to the data.
Error Messages
Too specific error message will give out a ton of information to the outsider – which in the beginning, does
not need to know too much about the system
Validation of Data
Should be done from both side, server and client
Passwords
The passwords must be long enough to keep the chance of being hacked low, the recommendation is at
least 8 characters with both number, normal, upper key and special character
SSL
Passing personal information between client and server should be done through SSL protocol
Page 10
Use case diagram
Page 11
Description Buy the song customer want
Actor User
Pre-condition 1. User account have enough currency to purchase the song
2. Song is available to download
Normal Course 1. Search the song using song ID or song Name
2. Purchase the song
Post-condition User successfully purchase the song
Page 12
Use case name User’s information manager ID: UM-1
Description Admin and User can both manage the user information
Actor User, Admin
Pre-condition Admin account is logged in / This user account is logged in
Normal Course 1. User/Admin logged in the account need to edit
2. Find the option to manage this account information
3. Edit the information
4. Save the action
Post-condition Account’s information is edited
Entity Description
Admin The manager of the whole system
Page 13
Customer The user of the system
Song Thing being listen/bought by customer
Purchase The detail of what the customer have bought
CD Information of the song being bought by customer
DFD
DFD of the whole system
Name Flowchart
Page 14
Browse
Page 15
Listen the
Song
Page 16
Purchase
Page 17
Manage
the
informatio
n of user
Page 18
Upload
Song
Page 19
Delete
Song
Page 20
Edit Song
Page 21
State machine
TASK 3
Page 22
Tune Source’s project is a big project that provided high quality music for customer with many other
functions, and those functions will be implemented by many other ways (frontend and backend) to show
the behavior and effectiveness of the software
Upload function
This function can only be used when using admin account. It allows admin to add a new song to the
database. When upload the new music, the admin will also check with the SQL to see if that song is existed
in the same CD category before.
Page 23
Another example of Browse (search) function
Page 24
Reference
Page 25