NewAccess System Requirements Report: A Comprehensive Analysis
VerifiedAdded on 2025/05/03
|22
|3649
|412
AI Summary
Desklib offers solved assignments and past papers to help students succeed.

SYSTEM ANALYSIS
Assessment item 3:Requirements Report
Assessment item 3:Requirements Report
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
List of Figures..................................................................................................................................3
Introduction......................................................................................................................................4
Non-Functional Requirements.........................................................................................................5
Review of cloud-based solutions.....................................................................................................6
Strength of cloud solution............................................................................................................7
The weakness of cloud solutions.................................................................................................9
SDLC Approach for System Development...................................................................................11
Adaptive SDLC Approach.........................................................................................................13
Pros of Adaptive SDLC.............................................................................................................14
Cons of Adaptive SDLC............................................................................................................15
Predictive SDLC Approach.......................................................................................................15
Pros of Predictive SDLC...........................................................................................................16
Cons of Predictive SDLC..........................................................................................................17
The recommended approach for NewAccess Project................................................................17
Conclusion.....................................................................................................................................19
References......................................................................................................................................20
List of Figures..................................................................................................................................3
Introduction......................................................................................................................................4
Non-Functional Requirements.........................................................................................................5
Review of cloud-based solutions.....................................................................................................6
Strength of cloud solution............................................................................................................7
The weakness of cloud solutions.................................................................................................9
SDLC Approach for System Development...................................................................................11
Adaptive SDLC Approach.........................................................................................................13
Pros of Adaptive SDLC.............................................................................................................14
Cons of Adaptive SDLC............................................................................................................15
Predictive SDLC Approach.......................................................................................................15
Pros of Predictive SDLC...........................................................................................................16
Cons of Predictive SDLC..........................................................................................................17
The recommended approach for NewAccess Project................................................................17
Conclusion.....................................................................................................................................19
References......................................................................................................................................20

List of Figures
Figure 1: Nonfunctional requirements.............................................................................................4
Figure 2: Cloud-Based Solution......................................................................................................6
Figure 3: Cloud Computing Strength..............................................................................................7
Figure 4: Cloud Computing Weakness............................................................................................9
Figure 5: Software Development Life cycle..................................................................................11
Figure 6: Six steps of system development...................................................................................12
Figure 7: Adaptive SDLC Approach.............................................................................................13
Figure 8: Predictive SDLC Approach............................................................................................15
Figure 1: Nonfunctional requirements.............................................................................................4
Figure 2: Cloud-Based Solution......................................................................................................6
Figure 3: Cloud Computing Strength..............................................................................................7
Figure 4: Cloud Computing Weakness............................................................................................9
Figure 5: Software Development Life cycle..................................................................................11
Figure 6: Six steps of system development...................................................................................12
Figure 7: Adaptive SDLC Approach.............................................................................................13
Figure 8: Predictive SDLC Approach............................................................................................15
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Introduction
This report is based on the requirements analysis of the New Access project that aims in the
development of a system that records the patient statement and circulates them to the correct
professionals. The report will discuss the SDLC methodologies and the appropriate methodology
for the development of the system, the nonfunctional requirement and the cloud-based
approaches along with an appropriate recommendation.
This report is based on the requirements analysis of the New Access project that aims in the
development of a system that records the patient statement and circulates them to the correct
professionals. The report will discuss the SDLC methodologies and the appropriate methodology
for the development of the system, the nonfunctional requirement and the cloud-based
approaches along with an appropriate recommendation.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Non-Functional Requirements
The definition of the NewAccess system attributes that includes the Security, Reliability,
Usability, and performance are all that is defined under the nonfunctional requirements. The
nonfunctional requirement ensures the quality of the system capabilities and development
methodologies.
Figure 1: Nonfunctional requirements
Source: (Tabassum et.al, 2014)
Following are the nonfunctional elements of the NewAccess Project:
Security
Security ensures that the data of the system are protected. The development team ensures that the
system is developed in a manner that it ensures that all the requirements are fulfilled under
security constraints that eliminate the constraints related to security and reduce the development
cost of the system.
Reliability
The definition of the NewAccess system attributes that includes the Security, Reliability,
Usability, and performance are all that is defined under the nonfunctional requirements. The
nonfunctional requirement ensures the quality of the system capabilities and development
methodologies.
Figure 1: Nonfunctional requirements
Source: (Tabassum et.al, 2014)
Following are the nonfunctional elements of the NewAccess Project:
Security
Security ensures that the data of the system are protected. The development team ensures that the
system is developed in a manner that it ensures that all the requirements are fulfilled under
security constraints that eliminate the constraints related to security and reduce the development
cost of the system.
Reliability

The measurement of the reliability is for ensuring that the system does not fail or does not fails
so often. Reliability of the project in terms of Mean Time Between Failure (MFBT). This ensures
that the frame ware, hardware and the software of the system are working accordingly satisfying
the requirements of the client.
Usability
Usability of the NewAccess project ensures that all the patient notes are created and are
circulated among the right professionals and usability is for ensuring that system is properly used
by the patient for achieving the objectives that quantified with efficiency and effectiveness.
Performance
Performance is that nonfunctional requirement that ensures that the efficiency of the system in
the management of the requirement according to the client. Performance ensures the response
timing of the system, notes are prepared correctly and all the benchmark specifications are under
performance requirement (Tabassum et.al, 2014).
Review of cloud-based solutions
Cloud computing is the latest hosting technology that has gained popularity in recent years. The
cloud-based solution basically refers to the services that are provided on demand, storage,
applications or the resources that are accessed by the internet or through some providers that
basically shares the cloud computing infrastructure. This new emerging technology enables the
sharing and storing data from anywhere and at any time. A cloud solution can be made available
to a single organization, that is termed as enterprise cloud, be present for different organizations
are termed as public cloud and the combination of both public and enterprise cloud also exist that
is termed as hybrid cloud.
so often. Reliability of the project in terms of Mean Time Between Failure (MFBT). This ensures
that the frame ware, hardware and the software of the system are working accordingly satisfying
the requirements of the client.
Usability
Usability of the NewAccess project ensures that all the patient notes are created and are
circulated among the right professionals and usability is for ensuring that system is properly used
by the patient for achieving the objectives that quantified with efficiency and effectiveness.
Performance
Performance is that nonfunctional requirement that ensures that the efficiency of the system in
the management of the requirement according to the client. Performance ensures the response
timing of the system, notes are prepared correctly and all the benchmark specifications are under
performance requirement (Tabassum et.al, 2014).
Review of cloud-based solutions
Cloud computing is the latest hosting technology that has gained popularity in recent years. The
cloud-based solution basically refers to the services that are provided on demand, storage,
applications or the resources that are accessed by the internet or through some providers that
basically shares the cloud computing infrastructure. This new emerging technology enables the
sharing and storing data from anywhere and at any time. A cloud solution can be made available
to a single organization, that is termed as enterprise cloud, be present for different organizations
are termed as public cloud and the combination of both public and enterprise cloud also exist that
is termed as hybrid cloud.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 2: Cloud-Based Solution
Source: (Aljawarneh et.al, 2017)
Companies and businesses are adopting the idea of cloud computing for increasing the capacity,
adding additional services and enhancing the functionality on the demand of the business without
many investments on expensive infrastructural requirements or the cost and the training the staff
regarding g the new concept. The use of the resources that are obtained by the combination of the
servers into a cloud or group decreases the down timing of the network and increases the site
traffic according to the capacity of the site in handling the traffic ensuring that the customers and
the user have always access to the services and the product of the online websites. Cloud
computing help the companies in reducing the upfront cost, allows upgrading the application
with faster services with less maintenance and increased manageability and help the IT
management teams in faster management of the resources in case of fluctuating business
demands. The growth of cloud computing is led by the high capacity networking capabilities,
and low-cost devices along with the hardware virtualization, utility and automatic computing,
and an architecture that is service oriented (Aljawarneh et.al, 2017).
Strength of cloud solution
The advancement in the field of technology has influenced human development as well as the
development of society with a wide range of computing and data sharing capabilities. The prime
idea behind cloud computing is merging the storage and the computational power in a scalable
Source: (Aljawarneh et.al, 2017)
Companies and businesses are adopting the idea of cloud computing for increasing the capacity,
adding additional services and enhancing the functionality on the demand of the business without
many investments on expensive infrastructural requirements or the cost and the training the staff
regarding g the new concept. The use of the resources that are obtained by the combination of the
servers into a cloud or group decreases the down timing of the network and increases the site
traffic according to the capacity of the site in handling the traffic ensuring that the customers and
the user have always access to the services and the product of the online websites. Cloud
computing help the companies in reducing the upfront cost, allows upgrading the application
with faster services with less maintenance and increased manageability and help the IT
management teams in faster management of the resources in case of fluctuating business
demands. The growth of cloud computing is led by the high capacity networking capabilities,
and low-cost devices along with the hardware virtualization, utility and automatic computing,
and an architecture that is service oriented (Aljawarneh et.al, 2017).
Strength of cloud solution
The advancement in the field of technology has influenced human development as well as the
development of society with a wide range of computing and data sharing capabilities. The prime
idea behind cloud computing is merging the storage and the computational power in a scalable
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

infrastructure that is dynamic that signifies that the system growth as according to the
requirement that leads to business decoupling from the infrastructure (Alshamrani et.al, 2015).
Figure 3: Cloud Computing Strength
Source: (Alshamrani et.al, 2015)
Following are some of the cloud computing strengths:
Strength of Cloud Solution
Cost saving With the application of Cloud computing solutions, the business requires less capital
money to be invested upon the storage of the servers and zero application
requirements. As the business always aim to increase the revenue by keeping the
operational cost and the capital cost to a minimum.
Manageability The cloud computing solutions are generally simplified and enhanced capabilities
regarding the management of IT infrastructure of any organization by the
administration of the resources centrally, management of the vendor infrastructure
and the agreement that is based on SLA backed. The service provider of cloud
solution minimizes or eradicates the requirement of the maintenance and the updates
of the IT infrastructure of the company. A simplified user interface is sufficient in
requirement that leads to business decoupling from the infrastructure (Alshamrani et.al, 2015).
Figure 3: Cloud Computing Strength
Source: (Alshamrani et.al, 2015)
Following are some of the cloud computing strengths:
Strength of Cloud Solution
Cost saving With the application of Cloud computing solutions, the business requires less capital
money to be invested upon the storage of the servers and zero application
requirements. As the business always aim to increase the revenue by keeping the
operational cost and the capital cost to a minimum.
Manageability The cloud computing solutions are generally simplified and enhanced capabilities
regarding the management of IT infrastructure of any organization by the
administration of the resources centrally, management of the vendor infrastructure
and the agreement that is based on SLA backed. The service provider of cloud
solution minimizes or eradicates the requirement of the maintenance and the updates
of the IT infrastructure of the company. A simplified user interface is sufficient in

cloud solution for accessing the services, applications, and software without the
requirement of installing the service and the SLA service provided by cloud
computing helps in the guaranteed delivery and time management as well as
maintenance of the IT services of the business.
Reliability Cloud solutions provide a manages platform for the IT services that is more
consistent and reliable compared to the in-house infrastructure of IT as the transfer
of the data through the computing network is through password and encryption
protection.
Strategic Edge Through the application of cloud computing solutions, the deployment of the critical
application is much easier with the delivery of the business benefits that are
significant and that to not involving any upfront cost and keeping the provision
timing to a minimum. With the help of cloud computing, the business and the
company need not worry about the technologies all that is to be focused on is the
business objectives and activities. The marketing time of any new product is also
reduced through cloud computing solutions (Bajaj et.al, 2015).
The weakness of cloud solutions
Immense benefits are provided by cloud computing to the business however with these benefits
there are certain disadvantage especially cybersecurity risk to cloud solutions as the entire
activity is under the third party control that is the cloud service provider and the person is able to
view all the information regarding the intellectual property of a company (Dzafic et.al, 2013).
requirement of installing the service and the SLA service provided by cloud
computing helps in the guaranteed delivery and time management as well as
maintenance of the IT services of the business.
Reliability Cloud solutions provide a manages platform for the IT services that is more
consistent and reliable compared to the in-house infrastructure of IT as the transfer
of the data through the computing network is through password and encryption
protection.
Strategic Edge Through the application of cloud computing solutions, the deployment of the critical
application is much easier with the delivery of the business benefits that are
significant and that to not involving any upfront cost and keeping the provision
timing to a minimum. With the help of cloud computing, the business and the
company need not worry about the technologies all that is to be focused on is the
business objectives and activities. The marketing time of any new product is also
reduced through cloud computing solutions (Bajaj et.al, 2015).
The weakness of cloud solutions
Immense benefits are provided by cloud computing to the business however with these benefits
there are certain disadvantage especially cybersecurity risk to cloud solutions as the entire
activity is under the third party control that is the cloud service provider and the person is able to
view all the information regarding the intellectual property of a company (Dzafic et.al, 2013).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 4: Cloud Computing Weakness
Source: (Dzafic et.al, 2013)
Following are some of the weakness of cloud computing solutions:
The weakness of cloud solutions
Security Although the prime function of cloud storage is ensuring the security and the
proper management of the company data there is always a risk to the data
while sharing with a third person service provider. Use of cloud services
refers to sharing the sensitive information of the company to the service
provider of the cloud solution and the person can get access to all the
information regarding the intellectual property of the company. That enables
the provider to identify, scan and exploit the vulnerabilities with the IT
infrastructure of the company.
Downtime Technical out sage can occur to the service providers due to the huge number
of client that is handled by a single service provider and this can lead to the
delay or suspension of delivery of the product for some time.
Limited Control As the service providers of the cloud services are responsible for the
management and the monitoring of the cloud infrastructure so the customers
hold only less control over the infrastructure management and monitoring.
The customers are only able to manage the front end process that includes the
management and the control of the services, applications, and data and the
Source: (Dzafic et.al, 2013)
Following are some of the weakness of cloud computing solutions:
The weakness of cloud solutions
Security Although the prime function of cloud storage is ensuring the security and the
proper management of the company data there is always a risk to the data
while sharing with a third person service provider. Use of cloud services
refers to sharing the sensitive information of the company to the service
provider of the cloud solution and the person can get access to all the
information regarding the intellectual property of the company. That enables
the provider to identify, scan and exploit the vulnerabilities with the IT
infrastructure of the company.
Downtime Technical out sage can occur to the service providers due to the huge number
of client that is handled by a single service provider and this can lead to the
delay or suspension of delivery of the product for some time.
Limited Control As the service providers of the cloud services are responsible for the
management and the monitoring of the cloud infrastructure so the customers
hold only less control over the infrastructure management and monitoring.
The customers are only able to manage the front end process that includes the
management and the control of the services, applications, and data and the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

backend processes that include the access to the server shell; firmware and
updating are not accessible and managed by the customers.
Vendor Lock-In Although it is believed that the cloud services are easy to operate and is very
flexible according to the organizational needs but the evolution of cloud
computing solution is not much that includes the facility of transferring the
services from one vendor to the other vendor. Support and interoperability
issues can be faced by any company if it wanted to integrate the present cloud
service to some other platform (Sakul-Ung et.al, 2017).
SDLC Approach for System Development
The task that is required to be performed and that is performed in the development of an
information system is defined by the Software Development Life Cycle (SDLC). The scenario of
the New Access requires the development of a system that will capture the story of the patient
such that the patient is not required to explain the concern to the different professionals, again
and again, the story will be captured once and the case notes will be transferred to the various
professionals to ensure the proper treatment to the young patients.SDLC structure will be
followed for the development of the system as it contains the specified planning of the system
development lifecycle that includes the proper planning of the steps of development, replacing
and maintenance of the system (Jain et.al, 2017).
updating are not accessible and managed by the customers.
Vendor Lock-In Although it is believed that the cloud services are easy to operate and is very
flexible according to the organizational needs but the evolution of cloud
computing solution is not much that includes the facility of transferring the
services from one vendor to the other vendor. Support and interoperability
issues can be faced by any company if it wanted to integrate the present cloud
service to some other platform (Sakul-Ung et.al, 2017).
SDLC Approach for System Development
The task that is required to be performed and that is performed in the development of an
information system is defined by the Software Development Life Cycle (SDLC). The scenario of
the New Access requires the development of a system that will capture the story of the patient
such that the patient is not required to explain the concern to the different professionals, again
and again, the story will be captured once and the case notes will be transferred to the various
professionals to ensure the proper treatment to the young patients.SDLC structure will be
followed for the development of the system as it contains the specified planning of the system
development lifecycle that includes the proper planning of the steps of development, replacing
and maintenance of the system (Jain et.al, 2017).

Figure 5: Software Development Life cycle
Source :( Jain et.al, 2017)
System development lifecycle consists of the following steps:
Planning: This is the primary step of the development of the system that involved
understanding the requirement if the client and the system requirements. This project
requires the development of a system that can capture the patient information and can
prepare notes of the major issues. Based on the requirement that is identified scope
document is developed.
Implementation: According to the requirements of the client that were identified the
developers write codes implementing the system requirements and the client
requirements.
Testing: After the implementation of the requirement and coding the system requires the
prototype is tested for determining any bugs ion the system. Other functionalities are also
tested whether they are operational according to the client requirement.
Documentation: For reference in the future the steps that are conducted during the
development of the system are documented and also for any changes that can be
Source :( Jain et.al, 2017)
System development lifecycle consists of the following steps:
Planning: This is the primary step of the development of the system that involved
understanding the requirement if the client and the system requirements. This project
requires the development of a system that can capture the patient information and can
prepare notes of the major issues. Based on the requirement that is identified scope
document is developed.
Implementation: According to the requirements of the client that were identified the
developers write codes implementing the system requirements and the client
requirements.
Testing: After the implementation of the requirement and coding the system requires the
prototype is tested for determining any bugs ion the system. Other functionalities are also
tested whether they are operational according to the client requirement.
Documentation: For reference in the future the steps that are conducted during the
development of the system are documented and also for any changes that can be
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 22
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





