Asm1 1631 NHHK
Asm1 1631 NHHK
Asm1 1631 NHHK
P1 P2 P3 M1 M2 D1
Assessor Feedback:
*Please note that constructive and useful feedback should allow students to understand:
a) Strengths of performance
b) Limitations of performance
c) Any improvements needed in future assessments
Feedback should be against the learning outcomes and assessment criteria to help students understand how these
inform the process of judging the overall grade.
Feedback should give full guidance to the students on how they have met the learning outcomes and
assessment criteria.
Resubmission Feedback:
*Please note resubmission feedback is focussed only on the resubmitted work
* Please note that grade decisions are provisional. They are only confirmed once internal and external
moderation has taken place and grades decisions have been agreed at the assessment.
Programme: BTEC
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students who break the
rules, however innocently, may be penalised. It is your responsibility to ensure that you understand correct
referencing practices. As a university level student, you are expected to use appropriate references throughout
and keep carefully detailed notes of all your sources of materials for material you have used in your work,
including any material downloaded from the Internet. Please consult the relevant unit lecturer or your course
tutor if you need any further advice.
Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of
plagiarism. I declare that the work submitted for assessment has been carried out without assistance other than
that which is acceptable according to the rules of the specification. I certify I have clearly referenced any
sources and any artificial intelligence (AI) tools used in the work. I understand that making a false declaration is
a form of malpractice.
I. Introduction..................................................................................................................................................... 6
II. Describe two iterative and two sequential software data lifecycle models .................................................... 6
2. Discuss the suitability of each SDLC models for the project ...................................................................... 15
III. Explain how risk is managed in the Spiral life cycle model ......................................................................... 15
1. Definition ................................................................................................................................................. 19
References ............................................................................................................................................................ 24
II. Describe two iterative and two sequential software data lifecycle
models
1. Describe the following SDLC
The Software Development Life Cycle (SDLC) is a process designed to produce high-quality software at
the lowest cost and in the shortest possible time. It offers a structured sequence of phases that enable an
organization to efficiently create well-tested, production-ready software. Specifically, the SDLC
methodology emphasizes six key phases of software development. Popular SDLC models include the
Waterfall model, Spiral model, and Agile model. (Alexandra, 2024)
Requirement analysis: At this stage, input is gathered from various stakeholders, including
customers, salespeople, industry experts, and programmers. The goal is to identify the strengths
and weaknesses of the current system to determine how it can be improved.
Planning: At this stage of the SDLC, the team evaluates the cost and resources needed to fulfill
the analyzed requirements. They also discuss potential risks and propose sub-plans to mitigate
them.
Software design: In this stage of the SDLC, the software specifications are transformed into a
design plan known as the Design Specification. All stakeholders then review the proposal, offering
feedback and suggestions. It is crucial to have a strategy in place for obtaining and incorporating
stakeholder feedback into this document. Failure at this stage often leads to cost overruns at best
and project failure at worst.
Testing: At this point, developers review and correct any errors in the software to ensure it meets
the highest quality standards before being delivered to customers.
Deployment: The objective of this step is to deploy the software to the production environment,
enabling users to start using the product. Additionally, this allows for the identification of any
remaining flaws before the product is officially released.
Design Stage: Determine the programming language to be utilized, such as Java, PHP, .NET, or
select the database management system, along with other pertinent high-level technical
specifications for the project.
Test Stage: During this phase, software testing is conducted to ensure that it conforms to the
specifications provided by the client.
Maintenance stage: After the system is prepared for use, you may find it necessary to modify the
code in accordance with customer requests.
Disadvantage Advantage
Errors can only be fixed during the specified Each phase must be completed before the next
phase phase of development can begin.
This model is not suitable for complex This model is suited for smaller projects where
projects where requirements frequently requirements are well-defined.
change
The testing phase takes place relatively late Quality assurance tests (Verification and
in the development process Validation) should be performed before
completing each stage.
Client feedback cannot be incorporated The project relies heavily on the project team
during the ongoing development phase with minimal client intervention.
Minor changes or errors that occur in the Any changes to the software are made during
completed software can lead to significant the development process.
problems.
Figure 2 V-model
Requirement Gathering Stage: The initial stage involves gathering as much information as
possible about the specific details and specifications of the desired software from the client. This
phase is commonly referred to as the Requirements Gathering stage.
Build Stage: Following the design stage is the build stage, which involves the actual coding of the
software.
Test Stage: Following that, you test the software to ensure it aligns with the specifications
provided by the client.
Maintenance Stage: Once the system is ready for use, you may need to modify the code later
based on customer requests.
Disadvantage Advantage
Inflexible Simple
Modifying the scope is challenging and costly. Every phase is associated with distinct
deliverable
The model lacks a clear mechanism for Works effectively in situations where
addressing issues identified during testing requirements are readily comprehensible.
phases.
It is expensive and time-consuming, requiring Verifying and validating the product in the
a comprehensive plan. early stages of development ensures higher
quality.
07.03-BM/ĐT/HDCV/FE 1/0
10/24
1.3 Prototyping
The prototyping model is a systems development approach where a prototype is created, tested, and
refined repeatedly until an acceptable outcome is achieved, from which the complete system or product
can be developed. This model is most effective in situations where project requirements are not fully
detailed in advance. It involves an iterative, trial-and-error process that occurs between developers and
users (GeeksforGeeks, 2024).
1.4 Scrum
Scrum is a project framework that adheres to the agile methodology, outlining roles, procedures, tools, and
processes to ensure the efficient and timely delivery of projects through iterative development cycles. This
07.03-BM/ĐT/HDCV/FE 1/0
11/24
methodology is typically used in environments that require a rapid development process and significant
stakeholder involvement. Scrum continuously monitors software development throughout the project's
lifecycle. (GeeksforGeeks, 2024)
Figure 4 Scrum
Disadvantage Advantage
Frequent changes in the project can cause Defined deadlines at each step keep developers
delays in the delivery timeline. motivated and empowered throughout the
process.
It utilizes more resources and requires Feedback at every stage of the project ensures
stakeholder involvement for every minor detail that a high-quality product is delivered in the
change and discussion. end.
07.03-BM/ĐT/HDCV/FE 1/0
12/24
1.5 Spiral
The Spiral Model is a risk-driven approach to software development, combining aspects of the waterfall
model and the iterative model. It allows for the incorporation of elements from multiple process models
based on unique risk patterns, thereby facilitating an efficient development process. (GeeksforGeeks,
2024)
Plan: The Spiral Model encompasses estimating the cost, schedule, and resources for each
iteration. It also involves comprehending the system requirements and maintaining continuous
communication between the system analyst and the customer.
Risk Analysis: The identification of potential risks is conducted concurrently with the planning
and finalization of the risk mitigation strategy.
07.03-BM/ĐT/HDCV/FE 1/0
13/24
Engineering: This involves testing, coding, and deploying the software at the customer's site.
Evaluate: This stage involves the evaluation of the software by the customer, as well as the
identification and monitoring of risks such as schedule slippage and cost overrun.
The Waterfall model, although commonly used in small projects, poses a high risk of failure in complex
and object-oriented projects. Correcting flaws in such projects incurs substantial costs as updates must be
made across documentation and reasoning. Moreover, incomplete software development documentation
can lead the project astray.
Similarly, the V-model has drawbacks that make it unsuitable for this project. Since all requirements are
known upfront, it struggles to accommodate dynamic changes. Additionally, lacking risk analysis
activities, it faces challenges in managing risks and experiences a high rate of project failure.
Given these considerations, the Spiral model emerges as the most suitable choice because:
07.03-BM/ĐT/HDCV/FE 1/0
14/24
2. Discuss the suitability of each SDLC models for the project
07.03-BM/ĐT/HDCV/FE 1/0
15/24
Wrong UI High High Task analysis,
prototyping and
wireframing, scenario
definition, and user
profiling.
This table lists potential risks associated with a project or system, along with the probability of
occurrence, the impact of the risk, and proposed solutions to manage these risks.
Outdated Technology
Probability: Medium
Impact: Medium
Solution: Ensure to regularly update to the most recent and cutting-edge technology available.
Explanation: The risk of using outdated technology has a medium probability and a medium
impact on the project. The solution is to continuously update and use the latest technology to
ensure the system does not become obsolete.
Probability: Medium
Impact: High
Solution: User research and surveys, prototyping and wireframing, early user manuals and
guidance, organization and business analysis, mission and requirements analysis, operations
concept formulation.
07.03-BM/ĐT/HDCV/FE 1/0
16/24
Explanation: The risk of inaccurate system functions has a medium probability but a high impact.
To mitigate this risk, user research, surveys, prototyping, early user manuals, and detailed analysis
of organizational and business requirements should be conducted to ensure system functions are
accurate and appropriate.
Wrong UI
Risk: Wrong UI
Probability: High
Impact: High
Solution: Task analysis, prototyping and wireframing, scenario definition, and user profiling.
Explanation: The risk of having an incorrect user interface has both high probability and high
impact. The solution is to conduct task analysis, create prototypes and wireframes, define usage
scenarios, and profile users to ensure the user interface is suitable and effective.
Probability: Medium
Impact: Medium
Explanation: The ongoing flow of requirement changes has a medium probability and medium
impact. The solution is to control information, implement changes gradually, and set a high
threshold for changes, postponing them to later stages of the project.
This table provides a comprehensive view of the risks and proposes specific solutions to manage and
mitigate the negative impacts of each risk. These solutions should be applied to ensure the project's
success.
07.03-BM/ĐT/HDCV/FE 1/0
17/24
and assess risks throughout the project lifecycle, leveraging their organizational structure and
administrative practices to mitigate risks in favor of the project. Project complexity and organizational
maturity are recognized as critical factors that can influence project success. (Thomas, 2024)
Risk assessments are crucial components of occupational health and safety management plans. They
serve to:
Identify individuals who may be at risk (e.g., employees, cleaners, visitors, contractors, the
public, etc.).
Assess the adequacy of existing control measures or identify areas for improvement.
Prevent injuries or illnesses, particularly when conducted during the design or planning phase.
1) Risk Identification: Identify and document potential risks that could impact the project or
organization.
2) Risk Analysis: Assess the likelihood and potential impact of each identified risk. This step
involves determining the probability of occurrence and the severity of consequences associated
with each risk.
3) Risk Evaluation: Evaluate the identified risks based on their significance and prioritize them for
further action. This involves comparing the level of risk against predetermined criteria to
determine which risks require attention.
4) Risk Treatment: Develop and implement strategies to mitigate, transfer, avoid, or accept the
identified risks. This step involves selecting and implementing appropriate risk response actions to
address the prioritized risks.
5) Risk Monitoring and Review: Continuously monitor the effectiveness of risk treatment measures
and review the risk management process regularly to identify new risks or changes in existing
07.03-BM/ĐT/HDCV/FE 1/0
18/24
risks. This step ensures that risk management remains an ongoing and proactive process
throughout the project or organizational lifecycle.
Technical feasibility evaluates the engineering aspects of the project, including civil, structural, and other
relevant factors necessary for project design. It considers the technical capabilities of projected
technologies and the expertise of personnel involved in the project. In certain scenarios, especially in
third-world countries, technology transfer between cultures and geographic areas is analyzed to
understand productivity implications and other challenges arising from differences in fuel availability,
geography, infrastructure support, and other factors.
• Economic Feasibility:
Economic feasibility involves analyzing the cost and benefits of the project. This entails a detailed
examination of the project's development costs, including hardware and software resources, design and
development expenses, operational costs, and more. It evaluates whether the project will be financially
beneficial for the organization.
07.03-BM/ĐT/HDCV/FE 1/0
19/24
Return on Investment (ROI): ROI is a crucial tool in economic feasibility, measuring the
profitability of investing money and resources into a business idea. It calculates the profitability of
the investment in terms of returns or gains, comparing the gain of investment over the full
investment to assess the ROI of a business or project plan. Investors prioritize investments with
higher ROI, as they offer greater profitability compared to those with lower ROI.
Net Present Value (NPV): NPV represents the difference between the present value of cash
inflows and outflows over a period. It is utilized in capital budgeting and investment planning to
analyze the profitability of a projected investment or project. NPV calculates the present value of
future cash flows to determine the project's profitability.
Cash Flow: Cash flow refers to the net balance of cash moving into and out of a business at a
specific point in time. Positive cash flow indicates that a company has more money coming in than
going out, while negative cash flow indicates the opposite.
Break-Even Point: The break-even point (BEP) is the juncture at which costs or expenses and
revenue are equal, resulting in neither profit nor loss. It signifies the time or volume of units sold
when estimated income exactly matches total expenses, marking the transition from loss to profit
accumulation, indicating financial viability.
• Organizational Feasibility:
Organizational feasibility assesses the management capabilities and resource sufficiency required to bring
a product or idea to market. It evaluates the management team's expertise, passion for the business idea,
industry knowledge, educational background, and professional experience. Honest self-assessment of
these areas is crucial for founders to accurately gauge organizational feasibility.
07.03-BM/ĐT/HDCV/FE 1/0
20/24
V. How technical solutions can be compared
07.03-BM/ĐT/HDCV/FE 1/0
21/24
This table appears to be a comparison of three programming languages (C#, JavaScript, and PHP) based
on various evaluation criteria. Each criterion has an assigned importance weight, and each language is
given a score for each criterion. The total scores for each language are then compared to determine which
language is the most suitable based on the criteria.
1. Technical Issues
2. Economic Issue
C#: Visual Studio and .Net cost $4500 (Score: 4, Weighted: 40)
07.03-BM/ĐT/HDCV/FE 1/0
22/24
Server cost less than $11000 (Importance: 10)
3. Organizational Issues
Total Scores
C#: 420
JavaScript: 430
PHP: 450
Based on the comparison table of programming languages C#, JavaScript, and PHP according to the
evaluation criteria for technical, economic, and organizational aspects, PHP has the highest total score of
450. This indicates that PHP might be the best choice according to the given criteria. JavaScript is second
with 430 points, and C# is third with 420 points.
Therefore, if choosing a programming language based on the criteria and scores in this table, PHP would
be the preferred language.
07.03-BM/ĐT/HDCV/FE 1/0
23/24
References
Alexandra, 2024. What Is SDLC? Understand the Software Development Life Cycle. [Online]
Available at: https://stackify.com/what-is-sdlc/
[Accessed 25 5 2024].
Indeed Editorial Team, 2024. What Is A Feasibility Report? (Definition and Template). [Online]
Available at: https://www.indeed.com/career-advice/career-development/feasibility-
report#:~:text=A%20feasibility%20report%20is%20a,recommendation%20for%20the%20best%20solution.
[Accessed 25 5 2024].
Thomas, C., 2024. Five Steps of the Risk Management Process. [Online]
Available at: https://www.360factors.com/blog/five-steps-of-risk-management-process/
[Accessed 25 5 2024].
07.03-BM/ĐT/HDCV/FE 1/0
24/24