Bachelor and Associate Degree of
Information Technology
P a g e | 1
BIT230 System Analysis and Design
Assessment 1 – Semester 1, 2019
Assessment 1 Scoping Exercise
Weightage: 20%
Due: Week 8
Assessment Specification
Form a groups of 3 or 4 members as described by your tutor. Under exceptional
circumstances a group of 5 will be allowed. Due to late enrollments some groups may have
to take on an extra member and may be directed to by your lecturer/tutor. Give your group
a name. The group is to send an email to the lecturer listing the group member’s names,
student id and a copy of a signed participation form.
General Overview
Your group has been contracted by ChemExec to prepare an initial study of a proposed system . One
of you are the project manager for the selected vendor’s development team (Choose who needs to
lead the team).
Your company, MelPolSys, develops and markets software to retail and hospital pharmacies and has
decided to take on the ChemExec project to expand potential market share. MelPolSys and
ChemExec will jointly develop the new software. MelPolSys will then market the finished product to
other companies and pay a royalty to ChemExec for each sale.
Initial Study Specification
1. Develop a system scope document 5
Using the case study provided, develop a system scope document. This document must
include a section for each of the following:
• The business problem,
• A statement of purpose,
• The benefits
• System capabilities.
• Exclusions
Ensure you use business language and write in the third person (i.e. do not use I or we). This
section should be no longer than a page in length. All bullet lists must be introduced with at
least one sentence that provides context for the reader.
(2) Develop a document outlining the system’s FURPS+ requirements 5
Bachelor and Associate Degree of
Information Technology
P a g e | 2
This can be either in the form of a table (see Usefull resource on Moodle), or some other
format that you have researched.
(3) Develop a list of functional requirements: Event Table
Construct an event table for the proposed system. The events must correspond to the system
capabilities outlined in the scope document. Names that appear in the source and destination
columns of your event table should be identified and described in the case study. Your list
must include at least ten, but no more than 15, non-trivial events. Ensure your events follow
the patterns described in the lectures:
Event: External agent (Source) + action
Trigger: Name of data, form (a thing, not an action), or point in time
Source: External agent that matches first word in event column – none
required for temporal events as the data is already in the system
Use case: System response to action – First word is always a verb: create, update
Response and Destination: Data (a thing, not an action) produced by the system
that goes to the Destination (a person or organisational group)
Once your event table is complete ensure you refine it using the guidelines and
checklists presented in the lecture slides. The table should look like this:
Event | Trigger | Source | Use Case | Response | Destination |
(4) Prepare a Use Case Diagram 5
Using the Use Cases identified in the Event Table for ChemExec, create a Use Case
Diagram that organizes the Use Cases by subsystem
Bachelor and Associate Degree of
Information Technology
P a g e 3 | 5
Submission of assignments
The assignment must be submitted as a single pdf file by each student via Moodle and as
a single hard copy by the group for marking by your lecturer (at a walkthrough attended by
the group). The hard copy must exactly match the prepared pdf file with a title page that
includes every group members name and student ID.
.
NOTE: Only one copy of the pdf and one hard copy needs to be submitted.
The submitted document must be presented with a professional look.
Bachelor and Associate Degree of
Information Technology
P a g e 4 | 5
ASSESSMENT 1 CRITERIA | |||||
NA | Poor | Fair | Good | Very Good | Excellent |
Scope Document | • The business problem, • A statement of purpose, • The benefits • System capabilities. • Exclusions | ||||
The Furps+ Document | Functional requirements comprehensive and reasonable Non-functional requirements comprehensive and reasonable | ||||
The Event Table | Reasonable list of events, Events are correctly named Source and destinations correct and appropriate Trigger and responses correctly identified Use Cases well named and match Events | ||||
Use Case | Use Case Diagram correct symbols Use Cases match Event list Actors (Match the event list, correctly modelled)) Subsystem (Reasonable grouping, at least 2 subsystems) | ||||
Total (Max 20) | Out of 20 |
Bachelor and Associate Degree of
Information Technology
P a g e 5 | 5
Peer assessment will be used to allocate the final marks accordingly between team
members, based on the contribution made by each team member as deemed by the group.
At the end of assessments 2 and 3, a peer evaluation sheet must be completed by each
group member.
4 | 3 | 2 | 1 | Total |
Participation | Student consistently participates in group work | Student participates in group work most of the time | Student participates in group work some of the time | Student does not participate in group work |
Role Performance | Student effectively performs assigned role within the group | Student adequately performs assigned role on a consistent basis | Student adequately performs assigned role some of the time | Student does not perform assigned role within the group |
Works Toward Team Goals | Student consistently works toward team goals | Student works toward team goals most of the time | Student works toward team goals all of the time | Student does not work towards team goals |
Cooperation | Student interacts well within the group and respects other group members | Student interacts adequately within the group and respects other group members | Students interacts adequately within the groups but does not respect others | Student does not cooperate with other group members |