SlideShare a Scribd company logo
1 of 41
MITS5501
Software Quality, Change Management and
Testing
CASE STUDY
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 2
Software Requirement Specification (SRS)
Investment Management System
1. Introduction
1.1 Purpose
The Investment Management System (IMS) is intended to help
the user keep account of their
money invested in institutions such as Banks and Share Market.
This document is meant to delineate the features of IMS, so as
to serve as a guide to the
developers on one hand and a software validation document for
the prospective client on the
other.
1.2 Scope:
We describe what features are in the scope of the software and
what are not in the scope of
the software to be developed.
In Scope:
a. Managing investment of a single user, which would include
maintaining bookkeeping
information about entities like Portfolio, Security, and
Transaction.
b. Computation of Net-Worth and Rate of Investment (ROI) of
the Investor.
c. Giving alerts to the user, if he requests for one.
d. Downloading the current prices of shares from the web.
e. User authentication.
Out of Scope:
a. Features for actual purchasing and selling of securities. That
is, actually buying and selling
of shares/securities is done outside IMS.
b. Tax computations for gains/losses.
c. Any market related prediction.
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 3
1.3 Definitions, Acronyms, and Abbreviations:
Acronyms and Abbreviations:
a. IMS: Personal Investment Management System.
b. SRS: Software Requirements Specification.
c. WWW: World Wide Web.
d. GUI: Graphical User Interface.
e. ROI: Rate of Investment.
Definitions:
a. Transaction: A real event that involves flow of personal
money. In the context of shares, it
is buying/selling a group of shares of the same company, and in
context of Bank it is
deposit/withdrawal of money to/from one’s account.
b. Security: A set of all transactions pertaining to a company
share or a bank account.
c. Portfolio: A set of Securities.
d. Net-Worth: The sum total of all the money of the investor in
form of shares and bank
balances.
e. ROI: The interest that user gets on a particular investment. In
the context of a bank account
it is the annual interest and in case of a company share it is
defined as given in appendix A:
1.4 References:
Appendix A: Formula for ROI calculation for shares.
Appendix B: Formula for Net-Worth calculation.
Appendix C: User Screens.
1.5 Overview:
The rest of this SRS is organized as follows: Section 2 gives an
overall description of the
software. It gives what level of proficiency is expected of the
user, some general constraints
while making the software and some assumptions and
dependencies that are assumed.
Section 3 gives specific requirements which the software is
expected to deliver. Functional
requirements are given by various use cases. Some performance
requirements and design
constraints are also given. Section 4 gives some possible future
extensions of the system.
Finally, the appendices in Section 5 describe respectively the
formula for ROI calculation for
shares and user screen.
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 4
2. Overall Description:
2.1 Product Perspective:
IMS is aimed toward a person who has considerable number of
investments in
stock market and banks, and so needs software assistance for
book keeping and
computations regarding the investments. IMS should be user-
friendly, ‘quick to learn’ and
reliable software for the above purpose. IMS is intended to be a
stand-alone product and
should not depend on the availability of other software. It
should run on both UNIX and
Windows based platform.
2.2 Product Functions:
IMS should support the following use cases:
Class of Use Case Use Case Use Case Description
Use case related to
Installation
Installation Creates and initializes working files
Uses cases related to system
authorization
Login Login to IMS
Change Password Change IMS password
Use cases related to
portfolios
Create Portfolio Creates a new portfolio
Rename Portfolio Rename an existing portfolio
Delete Portfolio Delete an existing portfolio
Use cases related to
securities
Create security Create a new security in a given portfolio
Rename Security Renames an existing security
Delete Security Deletes an existing security
Use cases related to
transactions
Add Transaction Add a transaction to a security
Edit Transaction Edit an existing transaction
Delete Transaction Delete an existing transaction
Use cases related to
information display
Display Investment Display information of the entire investment
Display Portfolio Display information about a given portfolio
Display Security Display information about a given security
Use cases related to
computation
Compute net-worth Compute net-worth of investment/ portfolio/
security
Compute ROI Compute ROI of a given security
Use cases related to share
prices
Get current share Price Download the current share price from
the
net
Edit Share price Edit the price of a share already present in
the list
Use cases related to alerts Set alerts Set alert giving date and
details
Show alerts Show all the pending alerts
Delete alerts Delete an already set alert
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 5
2.3 User Characteristics:
a. The user should be familiar with the Investment Management
related terminology like
Portfolio/Security/Transaction.
b. The user should know the details of a transaction.
2.4 Principal Actors
The two principal actors in IMS are “user” and “system”.
2.5 General Constraints:
a. For full working IMS requires Internet connection.
b. IMS is single-user software.
2.6 Assumptions and Dependencies:
a. Full working of IMS is dependent on the availability of
Internet connection.
b. The downloading of share prices in IMS is customized to
www.asx.com.au. IMS would not
work for any other website.
c. The company shares registered in the Australian Stock
Exchange (ASX) are only
considered by IMS.
3. Specific Requirements:
3.1 Functional Requirements:
We describe the functional requirements by giving various use
cases.
Use case related to installation:
Use Case 1: Installation
Primary Actor: User
Pre Condition: Internet connection available.
Main Scenario :
1. User initiates IMS installation program.
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 6
2. System asks the user for the home directory in which all the
working files will be
created. User is also asked for the initial login and password.
3. User specifies the home directory and login/password.
4. System creates the working files in the specified home
directory.
Working files contain:
a. Authorization information.
b. List of company names.
c. Current share prices.
d. Investment structure.
5. System downloads the list of companies (registered in ASX,
from
www.asx.com.au) and the current share prices. It initializes the
files containing the
list of companies and the current share prices with the
downloaded data.
Alternate Scenario:
5(a). Network failure.
5(a)1. Installation aborted.
Use cases related to system authorization:
Use Case 2: Login
Primary Actor: User
Pre Condition: Nil
Main Scenario :
1. Start the application. User prompted for login and password.
2. User gives the login and password.
3. System does authentication.
4. Main screen is displayed.
Alternate Scenario :
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 7
4(a). Authorization fails
4(a)1. Prompt the user that he typed the wrong password
4(a)2. Allow him to re-enter the password. Give him 3 chances.
Use Case 3: Change Password
Primary Actor: User
Pre Condition: User logged in
Main Scenario :
1. User initiates the password change command.
2. User is prompted for old password, new password and
confirm new password.
3. User gives the old password, new password and confirm new
password.
4. System does authentication.
5. New password is registered with the system.
Alternate Scenario :
4(a). Authorization fails
4(a)1. Prompt the user that he typed the wrong password
4(a)2. Allow him to re-enter the password. Give him 3 chances.
4(b). New password and confirm new password do not match.
4(b)1. Allow him to re-enter the attributes. Give 3 chances.
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 8
Use cases related to portfolios:
Use Case 4: Create Portfolio
Primary Actor: User
Pre Condition: User logged in.
Main Scenario:
1. User initiates the “create portfolio” functionality.
2. System asks the user for the portfolio name.
3. User enters the portfolio name.
4. An empty portfolio is created.
Alternate Scenario:
4(a). Portfolio with the same name exists.
4(a)1. System asks the user for a different name.
4(a)2. User enters a different name.
4(a)3. Empty portfolio gets created.
Use Case 5: Rename portfolio.
Primary Actor: User
Pre-Condition: User logged in.
Main Scenario :
1. User initiates the “rename portfolio” functionality.
2. System asks for the portfolio to be renamed and the new
name.
3. User enters the new name.
4. Portfolio is renamed.
Alternate Scenario:
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 9
4(a). The portfolio whose name is supposed to change does not
exist.
4(a)1. Renaming fails, the error message is displayed.
4(b). Portfolio with the same new name exists.
4(b)1. Renaming fails, the error message is displayed.
Use Case 6: Delete portfolio.
Primary Actor: User
Pre-Condition: User logged in.
Main Scenario :
1. User initiates the ”delete portfolio” functionality.
2. System asks for the name of the portfolio.
3. The portfolio is deleted.
Alternate Scenario:
3(a). Portfolio does not exist.
3(a)1. Deletion fails, error message is displayed.
Use cases related to securities:
Use Case 7: Create a security.
Primary Actor: User
Pre-Condition: User logged in.
Main Scenario :
1. User selects the portfolio in which the security is to be
created.
2. User initiates the “create security” functionality.
3. System asks the user to enter the attributes of the security.
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 10
4. User specifies the following fields:
a. Name
b. Type: bank or share.
c. Rate of interest: if the type is bank.
d. Company name: if the type is share. Choosing the company
from a list of
companies does this. (Companies registered in the Australian
Stock Exchange,
names downloaded at the installation time. Refer use case 1)
5. An empty security of specified attributes is created.
Alternate Scenario:
5(a) A security with the given name already exists.
5(a)1. Security creation fails, error message is displayed.
Use Case 8: Rename security.
Primary Actor: User
Pre-Condition: User logged in.
Main Scenario :
1. User selects the portfolio.
2. User initiates the “rename security” functionality.
3. System asks the user for the security and the new name.
4. User enters the security name and the new name.
5. Name is changed.
Alternate Scenario:
5(a). The security whose name is supposed to change does not
exist.
5(a)1. Renaming fails, the error message is displayed.
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 11
5(b). Security with the same new name exists.
5(b)1. Renaming fails, the error message is displayed.
Use Case 9: Delete security.
Primary Actor: User
Pre-Condition: User logged in.
Main Scenario :
1. User selects the portfolio.
2. User initiates the “delete security” functionality.
3. System asks for the security name.
4. Security is deleted.
Alternate Scenario
4(a). Security does not exist.
4(a)1. Deletion fails, error message is displayed.
Use cases related to transactions:
Use Case 10: Adding a transaction.
Primary Actor: User.
Pre-Condition: User logged in.
Main Scenario :
1. User selects the portfolio and the security.
2. User initiates the “add transaction” functionality.
3. System prompts the user for following details, depending on
the security type
(i)If the security is of share type:
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 12
a. Number of shares transacted
b. Type of transaction: buy or sell
c. Price of one share
d. Date of transaction
e. Any detail user might want to enter.
(ii)If the security is of bank type:
a. Amount of money transacted
b. Type of transaction: credit or debit.
c. Date of transaction
d. Any detail user might want to enter.
4. New transaction is created.
Alternate Scenario:
4(a). Invalid attribute value is entered. For example field (i)(a)
is not an integer or
(i)(c) is not a float.
4(a)1. User is shown the error displayed and prompted to enter
the
incorrect fields again.
Use Case 11: Editing a transaction.
Primary Actor: User.
Pre-Condition: User logged in.
Main Scenario :
1. User selects the portfolio, security and transaction.
2. User initiates the “edit transaction” functionality.
3. System asks the user to enter new fields for the transaction.
The fields are the
same as given in Use case 1.
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 13
4. The modified transaction is saved.
Alternate Scenario:
4(a). Invalid attribute value entered. For example field (i)(a) is
not an integer or
(i)(c) is not a float.
4(a)1. User is shown the error displayed and prompted to enter
the
incorrect fields again.
Use Case 12: Deleting a transaction.
Primary Actor: User.
Pre-Condition: User logged in.
Main Scenario :
1. User specifies the portfolio, security and transaction.
2. User initiates the “delete transaction” functionality.
3. The transaction is deleted.
Use cases related to information display:
Use Case 13: Display Investment
Primary Actor: User.
Pre-Condition: User logged in.
Main Scenario:
1. User selects the option of viewing the Investment (from the
left pane,
refer user screens in Appendix C).
2. System computes the net worth for each portfolio. Refer use
case 16.
3. System displays the name of all portfolios with their net-
worth. It also shows
the net-worth of entire investment by adding up the net-worth of
each portfolio.
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 14
Use Case 14: Display Portfolio
Primary Actor: User
Pre-Condition: User logged in.
Main Scenario:
1. User selects the option of viewing a particular portfolio
(selects a portfolio
from the left pane, refer user screens in Appendix A).
2. System computes the net-worth and ROI of each security.
Refer use cases 16
and 17.
3. System displays the securities in the portfolio with the net-
worth and ROI
computed. It also displays the net-worth of the portfolio by
summing up the net-
worth of each security.
Use Case 15: Display Security
Primary Actor: User
Pre-Condition: User logged in.
Main Scenario:
1. User selects the option of viewing a particular security
(selects a portfolio
from the left pane, refer user screens in Appendix C).
2. System displays all the transactions.
Use cases related to computations
Use Case 16: Compute Net-Worth.
Primary Actor: System.
Pre-Condition: User logged in & investment/portfolio/security
specified
Main Scenario :
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 15
1. System computes net-worth for investment/portfolio/security
specified
(Appendix B shows the detailed method for computing the net-
worth).
Use Case 17: Compute Rate of Investment.
Primary Actor: System.
Pre-Condition: User logged in & security specified
Main Scenario :
1. System computes ROI for the security specified (Appendix A
shows the
detailed method for computing the ROI).
Use cases related to share prices
Use Case 18: Getting the current prices of shares.
Primary Actor: User.
Pre-Condition: User logged in and internet connection exists.
Main Scenario :
1. User initiates the “download current prices” functionality.
2. The system downloads the current share prices from a
particular website.
Alternate Scenario:
2(a). Not able to download (due to network failure, site down,
…)
1. Display current value saved from before; ask the user to
change it
Use Case 19: Editing the share prices.
Primary Actor: User.
Pre-Condition: User logged in.
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 16
Main Scenario:
1. User initiates the “Edit share prices” functionality.
2. The system shows the list of all the companies and their
current share prices
(as known to the system).
3. User edits the price of the company share he wants to edit.
Alternate Scenario:
3(a). The entered price is invalid.
3(a)(i) User is shown the error displayed.
3(b). The company name does not exist in the list of companies
3(b)1. This is not handled by IMS. IMS is customized for the
only the
companies registered in the ASX.
Use cases related to alerts
Use Case 20: Setting alerts
Primary Actor: User.
Pre-Condition: User logged in.
Main Scenario :
1. User initiates the “set alert” functionality.
2. The system asks the user for the date and details of the alert.
3. The alert is set.
Use Case 21: Show the pending alerts.
Primary Actor: User.
Pre-Condition: User logged in.
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 17
Main Scenario :
1. User initiates the “show pending alerts” functionality.
2. System shows the pending alerts.
Use Case 22: Delete alerts.
Primary Actor: User.
Pre-Condition: User logged in.
Main Scenario :
1. User initiates the “delete alerts” functionality.
2. User is asked for the alert to be deleted.
3. The alert is deleted.
3.2 Performance Requirements:
(a) Should run on 500 MHz, 64 MB machine.
(b) 90% of the responses should be within 2 sec, except for
downloading current prices for
which more time is acceptable.
3.3 Design Constraints:
1. Security: The files in which the information regarding
securities and portfolios should be
secured against malicious deformations.
2. Fault Tolerance: Data should not become corrupted in case of
system crash or power
failure.
3.4 External Interface Requirements:
The user screen is split vertically into two panes. The left pane
contains the Investment tree,
which expands and contracts as per user action. The right part
displays the information
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 18
related to investment/portfolio/security that is specified on the
left pane. Appendix B
shows the intended user screen.
4. Future Extensions:
a. IIMS is intended to be a single user software. A possible
future extension would be to
make it multi user.
5. Appendix
5.1 Appendix A:
The formula for calculation of ROI for shares:
Suppose that, for the share of a particular company, following
were the attributes of ith
transaction.
Amount of money transacted = mi
Time between date of transaction and day when ROI is being
calculated = ni
Type of transaction = buy or sell
Let sgn(i) = +1 if the transaction was a buy, and -1 if it was a
sell.
Then, the rate of investment, r, is got by solving the equation
Σ sgn(i) mi (1+r) ni = M
where M is the total amount in that share, and summation is
over all the transactions.
The formula for calculation of ROI for banks:
For a bank the ROI is constant, namely the interest rate of that
bank.
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 19
5.2 Appendix B:
The formula for calculating net-worth of a security:
If the security is of type “share”:
Net-worth = C*N where C is the current value of the share of
the security and N is the
number of shares of that security which the user has.
If the security is of type “bank”, the net-worth is simply the
total balance of money in that
bank.
The formula for calculating net-worth of a portfolio:
Net worth of a security = Σ Net-worth of ith security.
( where the summation ranges over all the securities.)
The formula for calculating net-worth of entire investment:
Net worth of entire investment = Σ Net-worth of ith portfolio.
( where the summation ranges over all the portfolios.)
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 20
5.3 Appendix C: The User Screens:
The diagram below shows the outline of the main user screens.
Investment Screen (displaying the portfolios and net-worth
MITS5501 Case Study
Copyright © 2015-2018 VIT, All Rights Reserved. 21
Portfolio Screen (displaying the securities)
Security screen (displaying all the transactions)
Purpose
The purpose of this assignment is to reflect on achievements in
this course based on three criterion: Program Outcome, MSN
Essential, NONPF Core Competency.
Activity Learning Outcomes
Through this assignment, the student will demonstrate the
ability to:
1. Reflect on personal and professional growth toward achieving
competence as a family nurse practitioner (CO3).
Requirements:
1. Choose one (1) MSN Program Outcome, one (1) MSN
Essential, and one (1) NONPF Core Competency from the list
below:
·
· MSN Program Outcome
1. Provide high quality, safe, patient-centered care grounded in
holistic health principles.
2. Advocates for positive health outcomes through
compassionate, evidence-based, collaborative advanced nursing
practice.
·
·
· MSN Essential
I. Background for Practice from Science and Humanities
VIII. Clinical Prevention and Population Health for Improving
Health
IX. Master’s Level Nursing Practice
·
·
NONPF Core Competencies
Scientific Foundation Competencies
These competencies ensure that nurse practitioners graduate
with a comprehensive background in medical sciences. All
nurse practitioner students are required to take foundational
pathophysiology and pharmacology, but depending on their
specialty, they may take additional courses. Psychiatric nurse
practitioners often take courses in neuroscience whereas
neonatal nurse practitioners take courses in neonatology.
Scientific core competencies also include knowledge and
understanding of clinical practice guidelines, evidence-based
practice, translational research, and treatment of vulnerable and
diverse patient populations.
The scientific foundation core competencies defined by the
NONPF include the following:
1. Thinks critically about data and applies this evidence to
improving practice.
2. Allows knowledge from the humanities and other disciplines
to inform one’s work in nursing.
3. Incorporates research findings to enhance practice methods
and patient outcomes.
4. Creates fresh evidence-based approaches and techniques,
paying thought to research findings, core theory, and experience
from practice.
Quality Competencies
Quality care, as defined by the NONPF, refers to the degree to
which health services increase the desired health outcomes
consistent with professional knowledge and standards. Quality
competencies focus on understanding how to access and use
information databases and how to critically evaluate research
findings.
The quality core competencies include the following:
5. Applies the best and most contemporary research findings to
clinical practice.
6. Considers the complex relationships between cost, safety,
access, and quality in healthcare delivery.
7. Assesses the effects of organizational structures, financial
management, policy, and other factors on healthcare.
8. Offers feedback in peer reviews to “promote a culture of
excellence.”
9. Tailors care to each practice situation and uses interventions
as necessary.
Practice Inquiry Competencies
Practice inquiry competencies focus on translational research,
i.e., taking academic research and applying it to the clinical
setting. These competencies ensure that nurse practitioner
students understand how to apply research to improve their
patients’ health outcomes.
The practice inquiry core competencies include the following:
10. Translates new knowledge into practice through leadership.
11. Uses clinical experiences to inform practice and improve
patient outcomes.
12. Applies investigative abilities in a clinical setting to
improve healthcare.
13. Facilitates practice inquiry, both individually and in
partnerships.
14. Transmits knowledge from inquiry to others.
15. Thinks critically about the individual applications of
clinical guidelines.
2. Reflect over the past eight weeks and describe how achieving
the course outcomes have prepared you to meet 1 program
outcome, 1 MSN essential and 1 NONPF competency.
3. Provide a specific example for each category.
Preparing the paper
· The written portion of this assignment is to be completed in a
WORD document (.doc) and submitted to the course.
· Grammar, punctuation, spelling should be observed. In-text
citations and reference page should follow APA format.
ASSIGNMENT CONTENT
Category
Points
%
Description
Outcome Achievement
40
80%
The student identifies at least one of the listed program
outcomes;
AND
Provides at least one specific example of how the program
outcome was met;
AND
The student identifies at least one of the listed MSN essentials;
AND
Provides at least one specific example of how the MSN essential
was met;
AND
The student identifies at least one of the listed NONPF
competencies;
AND
Provides at least one specific example of how the NONPF
competency was met.
(6 required elements)
40
80%
Total CONTENT Points= 40 pts
ASSIGNMENT FORMAT
Category
Points
%
Description
Organization, spelling, grammar and APA format
10
20%
Narrative summary is provided with consideration to
organization, spelling, grammar and APA format.
10
20%
Total FORMAT Points= 10
ASSIGNMENT TOTAL= 50 points
Rubric
Criteria
Ratings
Pts
This criterion is linked to a Learning OutcomeOutcome
Achievement
The student identifies at least one of the listed program
outcomes;
AND
Provides at least one specific example of how the program
outcome was met;
AND
The student identifies at least one of the listed MSN essentials;
AND
Provides at least one specific example of how the MSN essential
was met;
AND
The student identifies at least one of the listed NONPF
competencies;
AND
Provides at least one specific example of how the NONPF
competency was met;
(6 required elements)
40.0 pts
Excellent
All 6 required elements are present.
36.0 pts
V. Good
5 critical elements are present.
33.0 pts
Satisfactory
4 critical elements are present.
20.0 pts
Needs Improvement
1-3 critical elements are present.
0.0 pts
Unsatisfactory
0 critical elements are present.
40.0 pts
This criterion is linked to a Learning OutcomeAssignment
Format
Narrative summary is provided with consideration to
organization, spelling, grammar and APA format. (2 critical
elements required)
10.0 pts
Excellent
Summary is clear & easy to follow. AND There are two or less
errors in spelling, grammar or in-text/reference APA format.
9.0 pts
V. Good
Summary is clear to follow AND There are three to four errors
in spelling, grammar or in-text/reference APA format.
8.0 pts
Satisfactory
Summary is clear to follow AND There are five to six errors in
spelling, grammar or in-text/reference APA format.
5.0 pts
Needs Improvement
Summary is clear to follow AND There are seven to nine errors
in spelling, grammar or in-text reference APA format.
0.0 pts
Unsatisfactory
Summary is difficult to follow/understand OR There are >10
errors in spelling, grammar or in-text reference APA format.
10.0 pts
Total Points: 50.0

More Related Content

Similar to MITS5501 Software Quality, Change Manageme.docx

Protectourwater.ie SRS
Protectourwater.ie SRSProtectourwater.ie SRS
Protectourwater.ie SRS
Killian Vigna
 
Chapter 8Understanding User Requirements1© Karl E
Chapter 8Understanding User Requirements1© Karl EChapter 8Understanding User Requirements1© Karl E
Chapter 8Understanding User Requirements1© Karl E
JinElias52
 
A Project to Automate Inventory Management in a Fast Food, Cas.docx
A Project to Automate Inventory Management in a Fast Food, Cas.docxA Project to Automate Inventory Management in a Fast Food, Cas.docx
A Project to Automate Inventory Management in a Fast Food, Cas.docx
ransayo
 
FINAL PROJECT REPORT1
FINAL PROJECT REPORT1FINAL PROJECT REPORT1
FINAL PROJECT REPORT1
waqar younas
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
christiandean12115
 
Financial Analysis of Berlin Brandenburg AirportTotal of 3000 wo
Financial Analysis of Berlin Brandenburg AirportTotal of 3000 woFinancial Analysis of Berlin Brandenburg AirportTotal of 3000 wo
Financial Analysis of Berlin Brandenburg AirportTotal of 3000 wo
ChereCheek752
 
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docx
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docxRISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docx
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docx
joellemurphey
 
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docxCyber Security wk 8 paperAssignment 2 Implementing Network a.docx
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
theodorelove43763
 

Similar to MITS5501 Software Quality, Change Manageme.docx (20)

SRS Document for Digital Time Stamping
SRS Document for Digital Time StampingSRS Document for Digital Time Stamping
SRS Document for Digital Time Stamping
 
Protectourwater.ie SRS
Protectourwater.ie SRSProtectourwater.ie SRS
Protectourwater.ie SRS
 
Lec-9.ppt
Lec-9.pptLec-9.ppt
Lec-9.ppt
 
Chapter 8Understanding User Requirements1© Karl E
Chapter 8Understanding User Requirements1© Karl EChapter 8Understanding User Requirements1© Karl E
Chapter 8Understanding User Requirements1© Karl E
 
A Project to Automate Inventory Management in a Fast Food, Cas.docx
A Project to Automate Inventory Management in a Fast Food, Cas.docxA Project to Automate Inventory Management in a Fast Food, Cas.docx
A Project to Automate Inventory Management in a Fast Food, Cas.docx
 
Online computer shop 111 35-181
Online computer shop 111 35-181Online computer shop 111 35-181
Online computer shop 111 35-181
 
Web Based Investment Management System
Web Based Investment Management SystemWeb Based Investment Management System
Web Based Investment Management System
 
Decentralized exchange-Banco: presented by Pentagon
Decentralized exchange-Banco: presented by PentagonDecentralized exchange-Banco: presented by Pentagon
Decentralized exchange-Banco: presented by Pentagon
 
FINAL PROJECT REPORT1
FINAL PROJECT REPORT1FINAL PROJECT REPORT1
FINAL PROJECT REPORT1
 
IRJET- Customized CRM Mobile Application for Retail Industry
IRJET-  	  Customized CRM Mobile Application for Retail IndustryIRJET-  	  Customized CRM Mobile Application for Retail Industry
IRJET- Customized CRM Mobile Application for Retail Industry
 
SRS CPP LAB.docx
SRS CPP LAB.docxSRS CPP LAB.docx
SRS CPP LAB.docx
 
Wear fit
Wear fitWear fit
Wear fit
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
 
Financial Analysis of Berlin Brandenburg AirportTotal of 3000 wo
Financial Analysis of Berlin Brandenburg AirportTotal of 3000 woFinancial Analysis of Berlin Brandenburg AirportTotal of 3000 wo
Financial Analysis of Berlin Brandenburg AirportTotal of 3000 wo
 
Recording Transaction
Recording TransactionRecording Transaction
Recording Transaction
 
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docx
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docxRISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docx
RISK REPORTING SYSTEM IN IT ORGANIZATIONSCPT PAPERName Vi.docx
 
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docxCyber Security wk 8 paperAssignment 2 Implementing Network a.docx
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
 
major project report Property Management
 major project report Property Management major project report Property Management
major project report Property Management
 
IRJET- Agriculture Business to Business Website
IRJET- Agriculture Business to Business WebsiteIRJET- Agriculture Business to Business Website
IRJET- Agriculture Business to Business Website
 

More from audeleypearl

Mother of the Year In recognition of superlative paren.docx
Mother of the Year         In recognition of superlative paren.docxMother of the Year         In recognition of superlative paren.docx
Mother of the Year In recognition of superlative paren.docx
audeleypearl
 
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docx
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docxMrs. G, a 55 year old Hispanic female, presents to the office for he.docx
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docx
audeleypearl
 
Mr. B, a 40-year-old avid long-distance runner previously in goo.docx
Mr. B, a 40-year-old avid long-distance runner previously in goo.docxMr. B, a 40-year-old avid long-distance runner previously in goo.docx
Mr. B, a 40-year-old avid long-distance runner previously in goo.docx
audeleypearl
 
Moving members of the organization through the change process ca.docx
Moving members of the organization through the change process ca.docxMoving members of the organization through the change process ca.docx
Moving members of the organization through the change process ca.docx
audeleypearl
 
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxMr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
audeleypearl
 
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docxMr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
audeleypearl
 
Most patients with mental health disorders are not aggressive. Howev.docx
Most patients with mental health disorders are not aggressive. Howev.docxMost patients with mental health disorders are not aggressive. Howev.docx
Most patients with mental health disorders are not aggressive. Howev.docx
audeleypearl
 
Most of our class readings and discussions to date have dealt wi.docx
Most of our class readings and discussions to date have dealt wi.docxMost of our class readings and discussions to date have dealt wi.docx
Most of our class readings and discussions to date have dealt wi.docx
audeleypearl
 
Most healthcare organizations in the country are implementing qualit.docx
Most healthcare organizations in the country are implementing qualit.docxMost healthcare organizations in the country are implementing qualit.docx
Most healthcare organizations in the country are implementing qualit.docx
audeleypearl
 
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docx
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docxMortgage-Backed Securities and the Financial CrisisKelly Finn.docx
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docx
audeleypearl
 

More from audeleypearl (20)

Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docxMr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
 
Movie Project Presentation Movie TroyInclude Architecture i.docx
Movie Project Presentation Movie TroyInclude Architecture i.docxMovie Project Presentation Movie TroyInclude Architecture i.docx
Movie Project Presentation Movie TroyInclude Architecture i.docx
 
Motivation and Retention Discuss the specific strategies you pl.docx
Motivation and Retention Discuss the specific strategies you pl.docxMotivation and Retention Discuss the specific strategies you pl.docx
Motivation and Retention Discuss the specific strategies you pl.docx
 
Mother of the Year In recognition of superlative paren.docx
Mother of the Year         In recognition of superlative paren.docxMother of the Year         In recognition of superlative paren.docx
Mother of the Year In recognition of superlative paren.docx
 
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docx
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docxMrs. G, a 55 year old Hispanic female, presents to the office for he.docx
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docx
 
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docxMr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
 
Mr. B, a 40-year-old avid long-distance runner previously in goo.docx
Mr. B, a 40-year-old avid long-distance runner previously in goo.docxMr. B, a 40-year-old avid long-distance runner previously in goo.docx
Mr. B, a 40-year-old avid long-distance runner previously in goo.docx
 
Moving members of the organization through the change process ca.docx
Moving members of the organization through the change process ca.docxMoving members of the organization through the change process ca.docx
Moving members of the organization through the change process ca.docx
 
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxMr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
 
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docxMr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
 
Motor Milestones occur in a predictable developmental progression in.docx
Motor Milestones occur in a predictable developmental progression in.docxMotor Milestones occur in a predictable developmental progression in.docx
Motor Milestones occur in a predictable developmental progression in.docx
 
Most women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxMost women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docx
 
Most patients with mental health disorders are not aggressive. Howev.docx
Most patients with mental health disorders are not aggressive. Howev.docxMost patients with mental health disorders are not aggressive. Howev.docx
Most patients with mental health disorders are not aggressive. Howev.docx
 
Most of our class readings and discussions to date have dealt wi.docx
Most of our class readings and discussions to date have dealt wi.docxMost of our class readings and discussions to date have dealt wi.docx
Most of our class readings and discussions to date have dealt wi.docx
 
Most people agree we live in stressful times. Does stress and re.docx
Most people agree we live in stressful times. Does stress and re.docxMost people agree we live in stressful times. Does stress and re.docx
Most people agree we live in stressful times. Does stress and re.docx
 
Most of the ethical prescriptions of normative moral philosophy .docx
Most of the ethical prescriptions of normative moral philosophy .docxMost of the ethical prescriptions of normative moral philosophy .docx
Most of the ethical prescriptions of normative moral philosophy .docx
 
Most healthcare organizations in the country are implementing qualit.docx
Most healthcare organizations in the country are implementing qualit.docxMost healthcare organizations in the country are implementing qualit.docx
Most healthcare organizations in the country are implementing qualit.docx
 
More work is necessary on how to efficiently model uncertainty in ML.docx
More work is necessary on how to efficiently model uncertainty in ML.docxMore work is necessary on how to efficiently model uncertainty in ML.docx
More work is necessary on how to efficiently model uncertainty in ML.docx
 
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docx
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docxMortgage-Backed Securities and the Financial CrisisKelly Finn.docx
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docx
 
Moral Development  Lawrence Kohlberg developed six stages to mora.docx
Moral Development  Lawrence Kohlberg developed six stages to mora.docxMoral Development  Lawrence Kohlberg developed six stages to mora.docx
Moral Development  Lawrence Kohlberg developed six stages to mora.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 

MITS5501 Software Quality, Change Manageme.docx

  • 1. MITS5501 Software Quality, Change Management and Testing CASE STUDY MITS5501 Case Study
  • 2. Copyright © 2015-2018 VIT, All Rights Reserved. 2 Software Requirement Specification (SRS) Investment Management System 1. Introduction 1.1 Purpose The Investment Management System (IMS) is intended to help the user keep account of their money invested in institutions such as Banks and Share Market. This document is meant to delineate the features of IMS, so as to serve as a guide to the developers on one hand and a software validation document for the prospective client on the other. 1.2 Scope: We describe what features are in the scope of the software and what are not in the scope of the software to be developed.
  • 3. In Scope: a. Managing investment of a single user, which would include maintaining bookkeeping information about entities like Portfolio, Security, and Transaction. b. Computation of Net-Worth and Rate of Investment (ROI) of the Investor. c. Giving alerts to the user, if he requests for one. d. Downloading the current prices of shares from the web. e. User authentication. Out of Scope: a. Features for actual purchasing and selling of securities. That is, actually buying and selling of shares/securities is done outside IMS. b. Tax computations for gains/losses. c. Any market related prediction.
  • 4. MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 3 1.3 Definitions, Acronyms, and Abbreviations: Acronyms and Abbreviations: a. IMS: Personal Investment Management System. b. SRS: Software Requirements Specification. c. WWW: World Wide Web. d. GUI: Graphical User Interface. e. ROI: Rate of Investment. Definitions: a. Transaction: A real event that involves flow of personal money. In the context of shares, it is buying/selling a group of shares of the same company, and in context of Bank it is deposit/withdrawal of money to/from one’s account. b. Security: A set of all transactions pertaining to a company share or a bank account. c. Portfolio: A set of Securities.
  • 5. d. Net-Worth: The sum total of all the money of the investor in form of shares and bank balances. e. ROI: The interest that user gets on a particular investment. In the context of a bank account it is the annual interest and in case of a company share it is defined as given in appendix A: 1.4 References: Appendix A: Formula for ROI calculation for shares. Appendix B: Formula for Net-Worth calculation. Appendix C: User Screens. 1.5 Overview: The rest of this SRS is organized as follows: Section 2 gives an overall description of the software. It gives what level of proficiency is expected of the user, some general constraints while making the software and some assumptions and dependencies that are assumed. Section 3 gives specific requirements which the software is
  • 6. expected to deliver. Functional requirements are given by various use cases. Some performance requirements and design constraints are also given. Section 4 gives some possible future extensions of the system. Finally, the appendices in Section 5 describe respectively the formula for ROI calculation for shares and user screen. MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 4 2. Overall Description: 2.1 Product Perspective: IMS is aimed toward a person who has considerable number of investments in stock market and banks, and so needs software assistance for book keeping and
  • 7. computations regarding the investments. IMS should be user- friendly, ‘quick to learn’ and reliable software for the above purpose. IMS is intended to be a stand-alone product and should not depend on the availability of other software. It should run on both UNIX and Windows based platform. 2.2 Product Functions: IMS should support the following use cases: Class of Use Case Use Case Use Case Description Use case related to Installation Installation Creates and initializes working files Uses cases related to system authorization Login Login to IMS Change Password Change IMS password Use cases related to
  • 8. portfolios Create Portfolio Creates a new portfolio Rename Portfolio Rename an existing portfolio Delete Portfolio Delete an existing portfolio Use cases related to securities Create security Create a new security in a given portfolio Rename Security Renames an existing security Delete Security Deletes an existing security Use cases related to transactions Add Transaction Add a transaction to a security Edit Transaction Edit an existing transaction Delete Transaction Delete an existing transaction Use cases related to information display Display Investment Display information of the entire investment Display Portfolio Display information about a given portfolio
  • 9. Display Security Display information about a given security Use cases related to computation Compute net-worth Compute net-worth of investment/ portfolio/ security Compute ROI Compute ROI of a given security Use cases related to share prices Get current share Price Download the current share price from the net Edit Share price Edit the price of a share already present in the list Use cases related to alerts Set alerts Set alert giving date and details Show alerts Show all the pending alerts Delete alerts Delete an already set alert
  • 10. MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 5 2.3 User Characteristics: a. The user should be familiar with the Investment Management related terminology like Portfolio/Security/Transaction. b. The user should know the details of a transaction. 2.4 Principal Actors The two principal actors in IMS are “user” and “system”. 2.5 General Constraints: a. For full working IMS requires Internet connection. b. IMS is single-user software. 2.6 Assumptions and Dependencies: a. Full working of IMS is dependent on the availability of Internet connection. b. The downloading of share prices in IMS is customized to www.asx.com.au. IMS would not work for any other website.
  • 11. c. The company shares registered in the Australian Stock Exchange (ASX) are only considered by IMS. 3. Specific Requirements: 3.1 Functional Requirements: We describe the functional requirements by giving various use cases. Use case related to installation: Use Case 1: Installation Primary Actor: User Pre Condition: Internet connection available. Main Scenario : 1. User initiates IMS installation program. MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 6 2. System asks the user for the home directory in which all the
  • 12. working files will be created. User is also asked for the initial login and password. 3. User specifies the home directory and login/password. 4. System creates the working files in the specified home directory. Working files contain: a. Authorization information. b. List of company names. c. Current share prices. d. Investment structure. 5. System downloads the list of companies (registered in ASX, from www.asx.com.au) and the current share prices. It initializes the files containing the list of companies and the current share prices with the downloaded data. Alternate Scenario: 5(a). Network failure. 5(a)1. Installation aborted. Use cases related to system authorization: Use Case 2: Login
  • 13. Primary Actor: User Pre Condition: Nil Main Scenario : 1. Start the application. User prompted for login and password. 2. User gives the login and password. 3. System does authentication. 4. Main screen is displayed. Alternate Scenario : MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 7 4(a). Authorization fails 4(a)1. Prompt the user that he typed the wrong password 4(a)2. Allow him to re-enter the password. Give him 3 chances. Use Case 3: Change Password Primary Actor: User
  • 14. Pre Condition: User logged in Main Scenario : 1. User initiates the password change command. 2. User is prompted for old password, new password and confirm new password. 3. User gives the old password, new password and confirm new password. 4. System does authentication. 5. New password is registered with the system. Alternate Scenario : 4(a). Authorization fails 4(a)1. Prompt the user that he typed the wrong password 4(a)2. Allow him to re-enter the password. Give him 3 chances. 4(b). New password and confirm new password do not match. 4(b)1. Allow him to re-enter the attributes. Give 3 chances. MITS5501 Case Study
  • 15. Copyright © 2015-2018 VIT, All Rights Reserved. 8 Use cases related to portfolios: Use Case 4: Create Portfolio Primary Actor: User Pre Condition: User logged in. Main Scenario: 1. User initiates the “create portfolio” functionality. 2. System asks the user for the portfolio name. 3. User enters the portfolio name. 4. An empty portfolio is created. Alternate Scenario: 4(a). Portfolio with the same name exists. 4(a)1. System asks the user for a different name. 4(a)2. User enters a different name. 4(a)3. Empty portfolio gets created. Use Case 5: Rename portfolio. Primary Actor: User
  • 16. Pre-Condition: User logged in. Main Scenario : 1. User initiates the “rename portfolio” functionality. 2. System asks for the portfolio to be renamed and the new name. 3. User enters the new name. 4. Portfolio is renamed. Alternate Scenario: MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 9 4(a). The portfolio whose name is supposed to change does not exist. 4(a)1. Renaming fails, the error message is displayed. 4(b). Portfolio with the same new name exists. 4(b)1. Renaming fails, the error message is displayed. Use Case 6: Delete portfolio.
  • 17. Primary Actor: User Pre-Condition: User logged in. Main Scenario : 1. User initiates the ”delete portfolio” functionality. 2. System asks for the name of the portfolio. 3. The portfolio is deleted. Alternate Scenario: 3(a). Portfolio does not exist. 3(a)1. Deletion fails, error message is displayed. Use cases related to securities: Use Case 7: Create a security. Primary Actor: User Pre-Condition: User logged in. Main Scenario : 1. User selects the portfolio in which the security is to be created. 2. User initiates the “create security” functionality. 3. System asks the user to enter the attributes of the security.
  • 18. MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 10 4. User specifies the following fields: a. Name b. Type: bank or share. c. Rate of interest: if the type is bank. d. Company name: if the type is share. Choosing the company from a list of companies does this. (Companies registered in the Australian Stock Exchange, names downloaded at the installation time. Refer use case 1) 5. An empty security of specified attributes is created. Alternate Scenario: 5(a) A security with the given name already exists. 5(a)1. Security creation fails, error message is displayed. Use Case 8: Rename security.
  • 19. Primary Actor: User Pre-Condition: User logged in. Main Scenario : 1. User selects the portfolio. 2. User initiates the “rename security” functionality. 3. System asks the user for the security and the new name. 4. User enters the security name and the new name. 5. Name is changed. Alternate Scenario: 5(a). The security whose name is supposed to change does not exist. 5(a)1. Renaming fails, the error message is displayed. MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 11 5(b). Security with the same new name exists. 5(b)1. Renaming fails, the error message is displayed.
  • 20. Use Case 9: Delete security. Primary Actor: User Pre-Condition: User logged in. Main Scenario : 1. User selects the portfolio. 2. User initiates the “delete security” functionality. 3. System asks for the security name. 4. Security is deleted. Alternate Scenario 4(a). Security does not exist. 4(a)1. Deletion fails, error message is displayed. Use cases related to transactions: Use Case 10: Adding a transaction. Primary Actor: User. Pre-Condition: User logged in. Main Scenario : 1. User selects the portfolio and the security.
  • 21. 2. User initiates the “add transaction” functionality. 3. System prompts the user for following details, depending on the security type (i)If the security is of share type: MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 12 a. Number of shares transacted b. Type of transaction: buy or sell c. Price of one share d. Date of transaction e. Any detail user might want to enter. (ii)If the security is of bank type: a. Amount of money transacted b. Type of transaction: credit or debit. c. Date of transaction d. Any detail user might want to enter.
  • 22. 4. New transaction is created. Alternate Scenario: 4(a). Invalid attribute value is entered. For example field (i)(a) is not an integer or (i)(c) is not a float. 4(a)1. User is shown the error displayed and prompted to enter the incorrect fields again. Use Case 11: Editing a transaction. Primary Actor: User. Pre-Condition: User logged in. Main Scenario : 1. User selects the portfolio, security and transaction. 2. User initiates the “edit transaction” functionality. 3. System asks the user to enter new fields for the transaction. The fields are the same as given in Use case 1.
  • 23. MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 13 4. The modified transaction is saved. Alternate Scenario: 4(a). Invalid attribute value entered. For example field (i)(a) is not an integer or (i)(c) is not a float. 4(a)1. User is shown the error displayed and prompted to enter the incorrect fields again. Use Case 12: Deleting a transaction. Primary Actor: User. Pre-Condition: User logged in. Main Scenario : 1. User specifies the portfolio, security and transaction. 2. User initiates the “delete transaction” functionality. 3. The transaction is deleted. Use cases related to information display:
  • 24. Use Case 13: Display Investment Primary Actor: User. Pre-Condition: User logged in. Main Scenario: 1. User selects the option of viewing the Investment (from the left pane, refer user screens in Appendix C). 2. System computes the net worth for each portfolio. Refer use case 16. 3. System displays the name of all portfolios with their net- worth. It also shows the net-worth of entire investment by adding up the net-worth of each portfolio. MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 14 Use Case 14: Display Portfolio Primary Actor: User
  • 25. Pre-Condition: User logged in. Main Scenario: 1. User selects the option of viewing a particular portfolio (selects a portfolio from the left pane, refer user screens in Appendix A). 2. System computes the net-worth and ROI of each security. Refer use cases 16 and 17. 3. System displays the securities in the portfolio with the net- worth and ROI computed. It also displays the net-worth of the portfolio by summing up the net- worth of each security. Use Case 15: Display Security Primary Actor: User Pre-Condition: User logged in. Main Scenario: 1. User selects the option of viewing a particular security (selects a portfolio from the left pane, refer user screens in Appendix C).
  • 26. 2. System displays all the transactions. Use cases related to computations Use Case 16: Compute Net-Worth. Primary Actor: System. Pre-Condition: User logged in & investment/portfolio/security specified Main Scenario : MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 15 1. System computes net-worth for investment/portfolio/security specified (Appendix B shows the detailed method for computing the net- worth). Use Case 17: Compute Rate of Investment. Primary Actor: System. Pre-Condition: User logged in & security specified
  • 27. Main Scenario : 1. System computes ROI for the security specified (Appendix A shows the detailed method for computing the ROI). Use cases related to share prices Use Case 18: Getting the current prices of shares. Primary Actor: User. Pre-Condition: User logged in and internet connection exists. Main Scenario : 1. User initiates the “download current prices” functionality. 2. The system downloads the current share prices from a particular website. Alternate Scenario: 2(a). Not able to download (due to network failure, site down, …) 1. Display current value saved from before; ask the user to change it Use Case 19: Editing the share prices. Primary Actor: User.
  • 28. Pre-Condition: User logged in. MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 16 Main Scenario: 1. User initiates the “Edit share prices” functionality. 2. The system shows the list of all the companies and their current share prices (as known to the system). 3. User edits the price of the company share he wants to edit. Alternate Scenario: 3(a). The entered price is invalid. 3(a)(i) User is shown the error displayed. 3(b). The company name does not exist in the list of companies 3(b)1. This is not handled by IMS. IMS is customized for the only the companies registered in the ASX.
  • 29. Use cases related to alerts Use Case 20: Setting alerts Primary Actor: User. Pre-Condition: User logged in. Main Scenario : 1. User initiates the “set alert” functionality. 2. The system asks the user for the date and details of the alert. 3. The alert is set. Use Case 21: Show the pending alerts. Primary Actor: User. Pre-Condition: User logged in. MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 17 Main Scenario : 1. User initiates the “show pending alerts” functionality.
  • 30. 2. System shows the pending alerts. Use Case 22: Delete alerts. Primary Actor: User. Pre-Condition: User logged in. Main Scenario : 1. User initiates the “delete alerts” functionality. 2. User is asked for the alert to be deleted. 3. The alert is deleted. 3.2 Performance Requirements: (a) Should run on 500 MHz, 64 MB machine. (b) 90% of the responses should be within 2 sec, except for downloading current prices for which more time is acceptable. 3.3 Design Constraints: 1. Security: The files in which the information regarding securities and portfolios should be secured against malicious deformations.
  • 31. 2. Fault Tolerance: Data should not become corrupted in case of system crash or power failure. 3.4 External Interface Requirements: The user screen is split vertically into two panes. The left pane contains the Investment tree, which expands and contracts as per user action. The right part displays the information MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 18 related to investment/portfolio/security that is specified on the left pane. Appendix B shows the intended user screen. 4. Future Extensions: a. IIMS is intended to be a single user software. A possible future extension would be to make it multi user.
  • 32. 5. Appendix 5.1 Appendix A: The formula for calculation of ROI for shares: Suppose that, for the share of a particular company, following were the attributes of ith transaction. Amount of money transacted = mi Time between date of transaction and day when ROI is being calculated = ni Type of transaction = buy or sell Let sgn(i) = +1 if the transaction was a buy, and -1 if it was a sell. Then, the rate of investment, r, is got by solving the equation Σ sgn(i) mi (1+r) ni = M where M is the total amount in that share, and summation is over all the transactions. The formula for calculation of ROI for banks: For a bank the ROI is constant, namely the interest rate of that bank.
  • 33. MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 19 5.2 Appendix B: The formula for calculating net-worth of a security: If the security is of type “share”: Net-worth = C*N where C is the current value of the share of the security and N is the number of shares of that security which the user has. If the security is of type “bank”, the net-worth is simply the total balance of money in that bank. The formula for calculating net-worth of a portfolio: Net worth of a security = Σ Net-worth of ith security. ( where the summation ranges over all the securities.) The formula for calculating net-worth of entire investment:
  • 34. Net worth of entire investment = Σ Net-worth of ith portfolio. ( where the summation ranges over all the portfolios.) MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 20 5.3 Appendix C: The User Screens: The diagram below shows the outline of the main user screens. Investment Screen (displaying the portfolios and net-worth MITS5501 Case Study Copyright © 2015-2018 VIT, All Rights Reserved. 21
  • 35. Portfolio Screen (displaying the securities) Security screen (displaying all the transactions) Purpose The purpose of this assignment is to reflect on achievements in this course based on three criterion: Program Outcome, MSN Essential, NONPF Core Competency. Activity Learning Outcomes Through this assignment, the student will demonstrate the ability to: 1. Reflect on personal and professional growth toward achieving competence as a family nurse practitioner (CO3). Requirements: 1. Choose one (1) MSN Program Outcome, one (1) MSN Essential, and one (1) NONPF Core Competency from the list below: · · MSN Program Outcome 1. Provide high quality, safe, patient-centered care grounded in holistic health principles. 2. Advocates for positive health outcomes through compassionate, evidence-based, collaborative advanced nursing practice. · · · MSN Essential I. Background for Practice from Science and Humanities VIII. Clinical Prevention and Population Health for Improving
  • 36. Health IX. Master’s Level Nursing Practice · · NONPF Core Competencies Scientific Foundation Competencies These competencies ensure that nurse practitioners graduate with a comprehensive background in medical sciences. All nurse practitioner students are required to take foundational pathophysiology and pharmacology, but depending on their specialty, they may take additional courses. Psychiatric nurse practitioners often take courses in neuroscience whereas neonatal nurse practitioners take courses in neonatology. Scientific core competencies also include knowledge and understanding of clinical practice guidelines, evidence-based practice, translational research, and treatment of vulnerable and diverse patient populations. The scientific foundation core competencies defined by the NONPF include the following: 1. Thinks critically about data and applies this evidence to improving practice. 2. Allows knowledge from the humanities and other disciplines to inform one’s work in nursing. 3. Incorporates research findings to enhance practice methods and patient outcomes. 4. Creates fresh evidence-based approaches and techniques, paying thought to research findings, core theory, and experience from practice. Quality Competencies Quality care, as defined by the NONPF, refers to the degree to which health services increase the desired health outcomes consistent with professional knowledge and standards. Quality competencies focus on understanding how to access and use information databases and how to critically evaluate research findings. The quality core competencies include the following:
  • 37. 5. Applies the best and most contemporary research findings to clinical practice. 6. Considers the complex relationships between cost, safety, access, and quality in healthcare delivery. 7. Assesses the effects of organizational structures, financial management, policy, and other factors on healthcare. 8. Offers feedback in peer reviews to “promote a culture of excellence.” 9. Tailors care to each practice situation and uses interventions as necessary. Practice Inquiry Competencies Practice inquiry competencies focus on translational research, i.e., taking academic research and applying it to the clinical setting. These competencies ensure that nurse practitioner students understand how to apply research to improve their patients’ health outcomes. The practice inquiry core competencies include the following: 10. Translates new knowledge into practice through leadership. 11. Uses clinical experiences to inform practice and improve patient outcomes. 12. Applies investigative abilities in a clinical setting to improve healthcare. 13. Facilitates practice inquiry, both individually and in partnerships. 14. Transmits knowledge from inquiry to others. 15. Thinks critically about the individual applications of clinical guidelines. 2. Reflect over the past eight weeks and describe how achieving the course outcomes have prepared you to meet 1 program outcome, 1 MSN essential and 1 NONPF competency. 3. Provide a specific example for each category. Preparing the paper · The written portion of this assignment is to be completed in a WORD document (.doc) and submitted to the course. · Grammar, punctuation, spelling should be observed. In-text citations and reference page should follow APA format.
  • 38. ASSIGNMENT CONTENT Category Points % Description Outcome Achievement 40 80% The student identifies at least one of the listed program outcomes; AND Provides at least one specific example of how the program outcome was met; AND The student identifies at least one of the listed MSN essentials; AND Provides at least one specific example of how the MSN essential was met; AND The student identifies at least one of the listed NONPF competencies; AND Provides at least one specific example of how the NONPF competency was met. (6 required elements) 40 80% Total CONTENT Points= 40 pts ASSIGNMENT FORMAT Category Points % Description Organization, spelling, grammar and APA format 10
  • 39. 20% Narrative summary is provided with consideration to organization, spelling, grammar and APA format. 10 20% Total FORMAT Points= 10 ASSIGNMENT TOTAL= 50 points Rubric Criteria Ratings Pts This criterion is linked to a Learning OutcomeOutcome Achievement The student identifies at least one of the listed program outcomes; AND Provides at least one specific example of how the program outcome was met; AND The student identifies at least one of the listed MSN essentials; AND Provides at least one specific example of how the MSN essential was met; AND The student identifies at least one of the listed NONPF competencies; AND Provides at least one specific example of how the NONPF competency was met; (6 required elements) 40.0 pts Excellent
  • 40. All 6 required elements are present. 36.0 pts V. Good 5 critical elements are present. 33.0 pts Satisfactory 4 critical elements are present. 20.0 pts Needs Improvement 1-3 critical elements are present. 0.0 pts Unsatisfactory 0 critical elements are present. 40.0 pts This criterion is linked to a Learning OutcomeAssignment Format Narrative summary is provided with consideration to organization, spelling, grammar and APA format. (2 critical elements required) 10.0 pts Excellent Summary is clear & easy to follow. AND There are two or less errors in spelling, grammar or in-text/reference APA format. 9.0 pts V. Good Summary is clear to follow AND There are three to four errors in spelling, grammar or in-text/reference APA format. 8.0 pts Satisfactory Summary is clear to follow AND There are five to six errors in spelling, grammar or in-text/reference APA format. 5.0 pts Needs Improvement Summary is clear to follow AND There are seven to nine errors in spelling, grammar or in-text reference APA format.
  • 41. 0.0 pts Unsatisfactory Summary is difficult to follow/understand OR There are >10 errors in spelling, grammar or in-text reference APA format. 10.0 pts Total Points: 50.0