Com S 362 --- Object-Oriented Analysis and Design EXERCISE 8: IDENTIFYING OTHER REQUIREMENTS (File $Date: 2004/10/18 15:04:11 $) The purpose of this exercise is for you to get some experience with identifying other (nonfunctional) requirements. As with all exercises, this is to be done individually, not in teams. And it is due the day this topic is planned to be discussed in class, unless specified otherwise (see the syllabus at: http://www.cs.iastate.edu/~cs362/syllabus.shtml). As with all exercises, you have two choices for doing the work. You can either: - complete it as specified or - write down questions or problems that you had in trying to complete it. If you write down questions or problems you have, these should be detailed enough so that we can tell that you have read the materials and thought about them. (Don't just write: "I couldn't get it to work; say what you tried and what you didn't understand.) During the class where this exercise is discussed, you should try to get help with these by explaining what you did and what your problems or confusions are. Don't be shy; there will be other people with the same problem, and everyone can learn by discussing these issues. 1. [Supplementary Specification] Read sections 7.1-7.3 of Craig Larman's book Applying UML and Patterns (second edition, Prentice Hall PTR, Upper Saddle River, NJ, 2002). a. What do the letters in FURPS stand for? b. How are each of these URPS items different from functionality? 2. [Supplementary Specification: Controlling a Nuclear Power Plant] Read sections 7.1-7.3 of Craig Larman's book Applying UML and Patterns (second edition, Prentice Hall PTR, Upper Saddle River, NJ, 2002). Also, for more examples look at the web page for the StickSync project: http://www.cs.iastate.edu/~cs362/sticksync/supple.shtml Consider a system that supports human operators who control a nuclear reactor. Aside from functionality, what would be the key items you would include in a supplementary specification for such a system? WHAT TO HAND IN You should have at the beginning of class, written answers to the above questions (or written out questions and problems you encountered for each part). Make sure your name is on these. Attach the printouts, if any, requested above. ADDITIONAL READINGS If you have time, look at the online RISKS digest http://catless.ncl.ac.uk/Risks or see Nancy Leveson's book Safeware : System Safety and Computers, (Addison-Wesley, Reading, MA, 1995).