BIT230 System Analysis and Design

Bachelor and Associate Degree of
Information Technology
P a g e | 1
BIT230 System Analysis and Design
Assessment 1 – Semester 1, 2019
Assessment 1 Scoping Exercise
Weightage: 20%
Due: Week 8
Assessment Specification
Form a groups of 3 or 4 members as described by your tutor. Under exceptional
circumstances a group of 5 will be allowed. Due to late enrollments some groups may have
to take on an extra member and may be directed to by your lecturer/tutor. Give your group
a name. The group is to send an email to the lecturer listing the group member’s names,
student id and a copy of a signed participation form.
General Overview
Your group has been contracted by ChemExec to prepare an initial study of a proposed system . One
of you are the project manager for the selected vendor’s development team (Choose who needs to
lead the team).
Your company, MelPolSys, develops and markets software to retail and hospital pharmacies and has
decided to take on the ChemExec project to expand potential market share. MelPolSys and
ChemExec will jointly develop the new software. MelPolSys will then market the finished product to
other companies and pay a royalty to ChemExec for each sale.
Initial Study Specification
1. Develop a system scope document 5
Using the case study provided, develop a system scope document. This document must
include a section for each of the following:
• The business problem,
• A statement of purpose,
• The benefits
• System capabilities.
• Exclusions
Ensure you use business language and write in the third person (i.e. do not use I or we). This
section should be no longer than a page in length. All bullet lists must be introduced with at
least one sentence that provides context for the reader.
(2) Develop a document outlining the system’s FURPS+ requirements 5
Bachelor and Associate Degree of
Information Technology
P a g e | 2
This can be either in the form of a table (see Usefull resource on Moodle), or some other
format that you have researched.
(3) Develop a list of functional requirements: Event Table
Construct an event table for the proposed system. The events must correspond to the system
capabilities outlined in the scope document. Names that appear in the source and destination
columns of your event table should be identified and described in the case study. Your list
must include at least ten, but no more than 15, non-trivial events. Ensure your events follow
the patterns described in the lectures:
 Event: External agent (Source) + action
 Trigger: Name of data, form (a thing, not an action), or point in time
 Source: External agent that matches first word in event column – none
required for temporal events as the data is already in the system
 Use case: System response to action – First word is always a verb: create, update
 Response and Destination: Data (a thing, not an action) produced by the system
that goes to the Destination (a person or organisational group)
Once your event table is complete ensure you refine it using the guidelines and
checklists presented in the lecture slides. The table should look like this:

Event Trigger Source Use Case Response Destination

(4) Prepare a Use Case Diagram 5
Using the Use Cases identified in the Event Table for ChemExec, create a Use Case
Diagram that organizes the Use Cases by subsystem
Bachelor and Associate Degree of
Information Technology
P a g e 3 | 5
Submission of assignments
The assignment must be submitted as a single pdf file by each student via Moodle and as
a single hard copy by the group for marking by your lecturer (at a walkthrough attended by
the group). The hard copy must exactly match the prepared pdf file with a title page that
includes every group members name and student ID.
.
NOTE: Only one copy of the pdf and one hard copy needs to be submitted.
The submitted document must be presented with a professional look.
Bachelor and Associate Degree of
Information Technology
P a g e 4 | 5

ASSESSMENT 1 CRITERIA
NA Poor Fair Good Very
Good
Excellent
Scope
Document
• The business problem,
• A statement of purpose,
• The benefits
• System capabilities.
• Exclusions
The Furps+
Document
Functional requirements comprehensive
and reasonable
Non-functional requirements
comprehensive and reasonable
The Event
Table
Reasonable list of events, Events are
correctly named
Source and destinations correct and
appropriate
Trigger and responses correctly
identified
Use Cases well named and match
Events
Use Case Use Case Diagram correct symbols
Use Cases match Event list Actors
(Match the event list, correctly
modelled))
Subsystem (Reasonable grouping, at
least 2 subsystems)
Total (Max 20) Out of
20

Bachelor and Associate Degree of
Information Technology
P a g e 5 | 5
Peer assessment will be used to allocate the final marks accordingly between team
members, based on the contribution made by each team member as deemed by the group.
At the end of assessments 2 and 3, a peer evaluation sheet must be completed by each
group member.

4 3 2 1 Total
Participation Student
consistently
participates in
group work
Student
participates in
group work
most of the
time
Student
participates in
group work
some of the
time
Student
does not
participate in
group work
Role
Performance
Student
effectively
performs
assigned role
within the
group
Student
adequately
performs
assigned role
on a
consistent
basis
Student
adequately
performs
assigned role
some of the
time
Student
does not
perform
assigned
role within
the group
Works
Toward
Team Goals
Student
consistently
works toward
team goals
Student
works
toward team
goals most of
the time
Student
works toward
team goals all
of the time
Student
does not
work
towards
team goals
Cooperation Student
interacts well
within the
group and
respects other
group
members
Student
interacts
adequately
within the
group and
respects
other group
members
Students
interacts
adequately
within the
groups but
does not
respect
others
Student
does not
cooperate
with other
group
members

Leave a Reply