You are on page 1of 14

Software Development Life Cycle

Assignment 2

1
Table of Contents
TABLE OF FIGURES .......................................................................................................................... 3
LIST OF TABLES .................................................................................................................................. 3

P5 Undertake a software investigation to meet a business need. ........................................................... 4


1.Questionnaire technique : ............................................................................................................................. 4
2.The reasons for using questionnaire technique : .......................................................................................... 4
3. Steps to approach data finding with questionnaire. ............................................................................ 5
4.List of questions : ........................................................................................................................................... 5

P6 Use appropriate software analysis tools/techniques to carry out a software investigation and create
supporting documentation. ..................................................................................................................... 6
1.Stackholders : .......................................................................................................................................... 6
2.Costs :............................................................................................................................................................. 6
3. Security considerations ................................................................................................................................. 7
4. Use case diagram .......................................................................................................................................... 8
5. DFD diagrams : .............................................................................................................................................. 9
5.1.Login function level 0 : ............................................................................................................................ 9
5.2.Login function level 1 : ............................................................................................................................ 9
6. Legacy system : ........................................................................................................................................... 10

P7 Explain how user and software requirements have been addressed. ............................................. 11
* LOG IN FORM INTERFACE :........................................................................................................................... 11
*Log in function implemented in C# : ............................................................................................................. 12
*Verify login function implemented in C# : .................................................................................................... 13

REFERENCES ......................................................................................................................... 14

2
TABLE OF FIGURES

Figure 1 : Use case diagram ...................................................................................................................... 8


Figure 2 : Login function level 0................................................................................................................. 9
Figure 3 : Login function level 1................................................................................................................. 9
Figure 4 : LOG IN FORM .......................................................................................................................... 11

LIST OF TABLES

Table 1 : Costs .......................................................................................................................................... 6


Table 2 : Legacy system .......................................................................................................................... 10

3
P5
P5 Undertake a software investigation to meet a business need.

1.Questionnaire technique :

A questionnaire is a research technique consisting of a series of questions for the purpose of


gathering information from respondents. Questionnaires can be thought of as a kind of written
interview. They can be carried out face to face, by telephone, computer or post.

2.The reasons for using questionnaire technique :

 The responses are gathered in a standardised way.

 Information can be collected in short period of time from a large number of people, often
geographically dispersed.

 Inexpensive way to reach a large number of people.

 Standard questionnaire providers quantifiable answers to a research.

 Questionnaires allow respondents to take time to consider their responses carefully without
interferences from others or interviewer.

4
3. Steps to approach data finding with questionnaire .

-Step 1: Determine what information we would like to obtain.


-Step 2: Decide what is the audience for your questionnaire
-Step 3: Decide on data collection method (electronic, phone, postal)
-Step 4: Decide on types of questions
-Step 5: Pilot the questionnaire on a sample of potential respondents and revise questions if
necessary
-Step 6: Distribute the questionnaire
-Step 7: Chase non-respondents
-Step 8: Analyse the responses
-Step 9: Present and use the findings

4.List of questions :

1.How many times do the visitors can free listen to the music sample ?

2.Which payments can be used for purchase individual downloads at a fixed fee per download.

3.What is the suitable cost for customers whom subscribe monthly account for unlimited download .

4.How to distribute music download gift cards to the customers ?

5.Which keywords were prioritized in search system ? (artirst, album, singer, playlist, single, video )

6.How many songs can be download at the same moment ?

7.How many monthly account that 1 customer can purchase ?

5
P6
Use appropriate software analysis tools/techniques to carry out
a software investigation and create supporting documentation.

1.Stackholders :

-John Margolis , Phil Cooper : Tune Source ‘s CEO.

-Megan Taylor : Tune Source ‘s Share holder

-Le Vo Thang : Project manager

2.Costs :

Web server 10000 $

Domain name 500 $

SSL certificate 200 $

Website development team 5000 $

Website maintenance 300 $

Content manage system 1000 $

E-commerce functionality 1000 $

TABLE 1 : COSTS

6
3. Security considerations

Websites are always be threaten of security risks. Cyber crime impacts our business by hacking website
and install malicious software or malware on visitor’s computer.

Hackers may steal important data from users such as credit card information, destroy business and puplic
sensitive information on the internet.

Updated Software

It is very importance to keep the software updated because it plays vital role in keeping website secure.

SQL Injection

It is an attempt by the hackers to manipulate your database by insert easily rogue code into query that can
be used to change tables, get information or delete data.

Cross Site Scripting (XSS)

It allows the attackers to inject client side script into web pages. Therefore, It is good to endure that we
check the data being submitted and encode or strip out any HTML.

Error Messages

If the user fails to log in the error message should not let the user know which field is incorrect: username
or password.

Validation of Data

The validation should be performed on both server side and client side.

Passwords

It is good to enforce password requirements such as of minimum of eight characters, including upper
case, lower case and special character. It will help to protect user’s information in long run.

SSL

It is good practice to use SSL protocol while passing personal information between website and web
server or database.

7
4. Use case diagram :

FIGURE 1 : USE CASE DIAGRAM

8
5. DFD diagrams :

5.1.Login function level 0 :

User name 0 Check

USER Password USER DATABASE


LOGIN D1

Verify

Account

FIGURE 2 : LOGIN FUNCTION LEVEL 0

5.2.Login function level 1 :

Access
1 1.2
request
USER LOGIN VIA GOOGLE ACCEPT PERMISSION

Verify

Account
Check

D2 GOOGLE DATABASE
D2

FIGURE 3 : LOGIN FUNCTION LEVEL 1

9
6. Legacy system :

System OS Window

System database SQL sever

Hardware Custom build 20tb memory

Service C# (Microsoft Visual Studio)

Functional Log in, purchase , display, download

TABLE 2 : LEGACY SYSTEM

10
P7
Explain how user and software requirements have been
addressed.

* LOG IN FORM INTERFACE :

FIGURE 4 : LOG IN FORM

11
*Log in function implemented in C# :

namespace AS1
{
class Class1
{
public int checkLogin(string username, string password)
{
string query = "SELECT userID FROM User WHERE username = ? AND password = ?";
int userId = -1;
SqlConnection conn = null;
SqlDataReader reader = null;

string inputCity = "London";


try
{
// instantiate and open connection
conn = new
SqlConnection("Server=(local);DataBase=MyDB;user=thang;password=15031911");
conn.Open();

// don't ever do this


// SqlCommand cmd = new SqlCommand(
// "select * from Customers where city = '" + inputCity + "'";
// 1. declare command object with parameter

SqlCommand cmd = new SqlCommand(


""SELECT userID FROM User WHERE username = @username AND password = @password, conn);

// 2. define parameters used in command object


SqlParameter param = new SqlParameter();
param.ParameterName = "@username";
param.Value = username;

// 3. add new parameter to command object


cmd.Parameters.Add(param);
// 2. define parameters used in command object
SqlParameter param = new SqlParameter();
param.ParameterName = "@password";
param.Value = password;

// 3. add new parameter to command object


cmd.Parameters.Add(param);

// get data stream


reader = cmd.ExecuteReader();
// write each record
if (reader.Read())
{
return reader["userID"]
}
}

return userID;
}
}

12
*Verify login function implemented in C# :

namespace AS1
{
class Class2
{
{
private string username;
private string password;
public int verifyLogin()
{
int userId = -1;
UserDataAccess uda = new UserDataAccess();
userId = UserDataAccess.checkLogin(this.username, this.password);
return userId;

}
}
}

13
REFERENCES

Simplypsychology.org. (2018). Questionnaire | Simply Psychology. [online] Available at:


https://www.simplypsychology.org/questionnaires.html [Accessed 18 Dec. 2018].

Requirements Techniques. (2018). Questionnaire. [online] Available at:


https://requirementstechniques.wordpress.com/elicitation/questionnaire/ [Accessed 18 Dec. 2018].

www.tutorialspoint.com. (2018). Website Security Consideration. [online] Available at:


https://www.tutorialspoint.com/internet_technologies/website_security.htm [Accessed 18 Dec. 2018].

Creately.com. (2018). Creately - Online Diagram Editor - Try it Free. [online] Available at:
https://creately.com/app/?tempID=i1rmvtsp1&login_type=demo# [Accessed 18 Dec. 2018].

14

You might also like