SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Agenda:
• Different Roles in IT
• Bidding
• Kick of Meeting
• PIN
• Software Development Process
2
Software Team – Roles & Responsibilities
3
Software EngineerQA Engineer
Test Engineer
Project Manager
Program Manag erBusiness Analyst
Team Lead
Product Manager
Tech Lead
Architect
Tech Writer
Understanding your role and responsibility and
role and responsibility of others is critical to your success.
Different Roles in IT
Software Team – Roles & Responsibilities
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Bidding:
• It is defined as request for
proposal, estimations and
official agreement two parties
i.e., Sign in agreement.
4www.talentsprint.com
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Kick-Off-Meeting:
• It is an initial meeting conducted in company soon after the
Project is signed.
• Who?
 High Level Management-Managers(Product, Program,
Technical…)
• Objective: To discuss the over view of the Project & to select
PM.
5www.talentsprint.com
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
PIN (Project Initiation Note):
6www.talentsprint.com
• PIN is a mail prepaid by the project manager and send to
the CEO of the software company in order to get the
permission to start the project development.
• Once the mail is approved from the CEO, PM is going to
prepare one more mail hence this mail is also called as PIN
and is going to share all concern team members in the
project stating that they are about start a project.
PIN (Project Initiation Note):
Project Manager PIN CEO
Team Members
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
SDLC:
• Software Development Life Cycle
Phases or stages of a project
from inception through
completion and delivery of the
final product… and
maintenance too!
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Software Development Stages:
1. Requirement
2. Analysis
3. Design
4. Coding
5. Testing
6. Deployment
7. Maintenance
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Requirement Phase:
• Role: BA & EM
• Task: Interacting with the client and gathering the
information.
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Requirement Phase:
BA Client BRS EM/PM
SME
URS
PrototypeClientSRS
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Requirement Phase:
• Proof: The proof of Requirement Phase is BRS Document.
• BRS- BDD (or) BD.
• SRS (or) FSD (or) FRS.
• URS (or) CRS.
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Requirement Phase:
• Business Requirement (BRS)
1. Represent high-level objectives of the organization or
customer requesting the system or product.
2. Objectives captured in a project’s vision and scope
document
Ex.
The Flight Reservation System’s login operations must
provide basic security to access the system.
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Requirement Phase:
• User Requirements
1. Describe tasks the user must be able to accomplish
with the product.
Ex.
1. Enter user id in the Agent Name field
2. Enter the password in the Password field
3. Click OK
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Requirement Phase:
• Functional Requirements
1. Define the application’s software functionality to
enable users to accomplish their tasks, thereby
satisfying the business requirements
2. Documented in a Software Requirements Specification
(SRS).
Ex.
1. Allow access to authorized user ids and passwords
2. Deny access to invalid user ids and passwords
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Analysis Phase:
• The process of identifying requirements, current
problems, constraints, Opportunities for improvement ,
timelines and Resources costs .
• Roles: Managers (Program, Project, Product).
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Analysis Phase:
• Process:KT Sessions.
• …used for resolving any problems that need to be addressed.
• determine what attributes and behavior each object should
have, and how the objects should interact or interrelate with
each other.
• “Figuring out what your program should do in the best way
possible”.
• Feasibility study (social, economical etc).
• investigate the need for possible software automation in the
given system.
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Analysis Phase:
• Difficulties in conducting requirement
analysis
1. Analyst not prepared
2. Customer has no time/interest
3. Incorrect customer personnel involved
4. Insufficient time allotted in project schedule
• Proof: SRS
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Design Phase:
• The business of finding a way to
meet the functional
requirements within the
specified constraints using the
available technology.
• Roles: CA, TL
• Task: HLD, LLD.
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Design Phase:
CA (HLD) Tech Lead(LLD) Team
Modules Sub Modules
(DFD,UML)
Pseudo Code GUI
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Design Phase:
• Proof: TDD (Technical Design Document)
• Pseudo Code:
• - It is a set of English statements (or) Step by Step
Algorithm which will make the Developers more
comfortable while developing the actual code.
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Design Phase:
1. Determine the set of instructions that will lead to a solution that meets
the customer’s requirements.
2. This set of instructions is called an algorithm.
3. Algorithms are usually represented pictorially (by flowcharts or UML
state diagrams)
4. Architecture, including hardware and software, communication,
software design (UML is produced here) are all part of the deliverables
of a design phase
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Design Phase:
HLDS (High Level Design Specifications) From User Point
of view:
1. List of modules and a brief description of each.
2. Brief functionality of each module.
3. Interface relationship among modules.
4. Dependencies between modules.
5. Database tables identified with key elements.
6. Overall architecture diagrams along.
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Design Phase:
LLDS (Low Level Design Specifications) / Detailed Design
1. Detailed functional logic of the module, in pseudo code.
2. Database tables, with all elements, including their type
and size.
3. All interface details.
4. All dependency issues.
5. Error MSG listing.
6. Complete input and output format of a module
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Coding Phase:
Roles: Programmers/Developers
Task: Programming/Coding
Process:
1. Indentation
2. Proper color
coding
3. Commenting
TDD
Developer SCD Coding Standards
Proof: SCD
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Coding Phase:
1. The specifications from the detailed design phase are converted into
programs.
2. Code is produced from the deliverables of the design phase during
implementation, and this is the longest phase of the software
development life cycle.
3. Design must be translated into a machine-readable form taking input
as SRS.
1. Done by Team of developers.
2. Reviews after every 500 lines of code
1. Code Inspection
2. Code Walkthrough
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Testing Phase:
• Role: Test Engineer
• Task: Testing the System (or) Product.
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Testing Phase:
Test Cases (Review) Build Defect Report Dev Team
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Testing Phase:
1. Finding the hidden defects in developed Product.
2. During testing, the implementation is tested against the requirements
to make sure that the product is actually solving the needs addressed
and gathered during the requirements phase.
3. Unit, Integration, system and acceptance tests are done during this
phase. Unit tests act on a specific component of the system, while
system tests act on the system as a whole.
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Testing Phase:
• Proof: The proof of the testing phase is Quality Product
i.e., Error Free Product (or) System.
• Note:
• Test Case: It is an idea of a Test Engineer to test something
of an application based requirements.
• GUI: It is an interface between the user and something
developed with graphics in-order to make the user
comfortable to interact with that something.
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Deployment Phase:
• Task: Delivering the Software
• Roles: Deployment Engineer (or) Installation Engineer
• Process:
DEPLOY
Installation Engineer Client
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Deployment Phase:
Deploying the product at client side.
Installation and setup of software application at
the customer site.
Proof: After delivering the Product the official
agreement will be signed off. This document will
be the proof for delivery phase.
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Maintenance Phase:
1. Maintaining the software application
1. Fixing bugs
2. Integrate new features requested by customers
3. Provide support
2. Maintenance can be provided in 2 ways
1. Normal
2. Continuous
3. On Going Process
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Summary:
• In this session we have discussed
 Different Roles in IT
 Phases of SDLC
 Sequence and flow of SDLC phases
34www.talentsprint.com
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Review Questions:
35www.talentsprint.com
1. Which of the following requirements will provide the information
about the aspects what the user must able to accomplish?
1. User Requirements
2. System Requirements
3. Business Requirements
4. Non-functional Requirements
2. In the High-level design the database tables will be created with all
the columns in it defined.
1.TRUE
2.FALSE
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Review Questions:
36www.talentsprint.com
3. In which of the following stages of SDLC, the need for implementing the
automation for Testing is decided?
1. Requirements
2. Analysis
3. Design
4. Coding
4. Which of the Following is the last stage of SDLC ?
1. Analysis
2. Deployment
3. Maintenance
4. Coding
DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL
Assignments:
37www.talentsprint.com
1.Suppose you are involved in a team which is enhancing the
“www.newtours.demoaut.com”, with the new “Hotels” functionalities.
List-out what are the:
a) Business Requirements
b) User Requirements
c) Functional Requirements
2. Suppose you are involved in a team which is adding a new module to the
“www.newtours.demoaut.com”, which is nothing but the “Hotels”, where
customers can book the Hotels also.
List-out the activities involved here as per the SDLC.
38
Question and Answer

Weitere ähnliche Inhalte

Was ist angesagt? (19)

Process Models IN software Engineering
Process Models IN software EngineeringProcess Models IN software Engineering
Process Models IN software Engineering
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Software process Models
Software process ModelsSoftware process Models
Software process Models
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
 
Software development Life Cycle
Software development Life CycleSoftware development Life Cycle
Software development Life Cycle
 
Software Development Life Cycle
Software Development Life Cycle Software Development Life Cycle
Software Development Life Cycle
 
process models- software engineering
process models- software engineeringprocess models- software engineering
process models- software engineering
 
Sdlc models
Sdlc modelsSdlc models
Sdlc models
 
software development life cycle(SDLC)
software development life cycle(SDLC)software development life cycle(SDLC)
software development life cycle(SDLC)
 
Software Engineering Process Models
Software Engineering Process Models Software Engineering Process Models
Software Engineering Process Models
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
 
Software Engineering concept
Software Engineering concept Software Engineering concept
Software Engineering concept
 
Sdlc
SdlcSdlc
Sdlc
 
Software development PROCESS
Software development PROCESSSoftware development PROCESS
Software development PROCESS
 
Sdlc models
Sdlc modelsSdlc models
Sdlc models
 
The Waterfall Model
The Waterfall ModelThe Waterfall Model
The Waterfall Model
 
Software life cycle comparison
Software life cycle comparisonSoftware life cycle comparison
Software life cycle comparison
 
SDLC and Software Process Models
SDLC and Software Process ModelsSDLC and Software Process Models
SDLC and Software Process Models
 
Intro to Software Engineering - Life Cycle Models
Intro to Software Engineering - Life Cycle ModelsIntro to Software Engineering - Life Cycle Models
Intro to Software Engineering - Life Cycle Models
 

Ähnlich wie Mt s2 sdlc

Complete testing@uma
Complete testing@umaComplete testing@uma
Complete testing@umaUma Sapireddy
 
Complete guide to manual testing@uma
Complete guide to manual  testing@umaComplete guide to manual  testing@uma
Complete guide to manual testing@umaUma Sapireddy
 
Completeguidetomanualtestinguma 120608233901-phpapp01
Completeguidetomanualtestinguma 120608233901-phpapp01Completeguidetomanualtestinguma 120608233901-phpapp01
Completeguidetomanualtestinguma 120608233901-phpapp01bdivyadeepu
 
Completeguidetomanualtestinguma 120608233901-phpapp01
Completeguidetomanualtestinguma 120608233901-phpapp01Completeguidetomanualtestinguma 120608233901-phpapp01
Completeguidetomanualtestinguma 120608233901-phpapp01bdivyadeepu
 
Manual testing good notes
Manual testing good notesManual testing good notes
Manual testing good notesdkns0906
 
SDLC - Software Development Life Cycle
SDLC - Software Development Life CycleSDLC - Software Development Life Cycle
SDLC - Software Development Life CycleSaravanan Manoharan
 
Testing material (1).docx
Testing material (1).docxTesting material (1).docx
Testing material (1).docxKVamshiKrishna5
 
21UCAE65 Software Testing.pdf(MTNC)(BCA)
21UCAE65 Software Testing.pdf(MTNC)(BCA)21UCAE65 Software Testing.pdf(MTNC)(BCA)
21UCAE65 Software Testing.pdf(MTNC)(BCA)ssuser7f90ae
 
Software engineering jwfiles 3
Software engineering jwfiles 3Software engineering jwfiles 3
Software engineering jwfiles 3Azhar Shaik
 
Prashant technical practices-tdd for xebia event
Prashant   technical practices-tdd for xebia eventPrashant   technical practices-tdd for xebia event
Prashant technical practices-tdd for xebia eventXebia India
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notesSiva Ayyakutti
 
Continuous Integration for z using Test Data Management and Application D...
Continuous  Integration for z  using  Test Data Management  and Application D...Continuous  Integration for z  using  Test Data Management  and Application D...
Continuous Integration for z using Test Data Management and Application D...DevOps for Enterprise Systems
 
Discovery 101
Discovery 101Discovery 101
Discovery 101creed
 
Req.Management & Analysis.pptx
Req.Management & Analysis.pptxReq.Management & Analysis.pptx
Req.Management & Analysis.pptxKYaghi1
 
Agile UX in an Agency Environment
Agile UX in an Agency EnvironmentAgile UX in an Agency Environment
Agile UX in an Agency EnvironmentDan Kalafus
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principlessaurabhshertukde
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software EngineeringSweta Kumari Barnwal
 

Ähnlich wie Mt s2 sdlc (20)

Complete testing@uma
Complete testing@umaComplete testing@uma
Complete testing@uma
 
Complete guide to manual testing@uma
Complete guide to manual  testing@umaComplete guide to manual  testing@uma
Complete guide to manual testing@uma
 
Completeguidetomanualtestinguma 120608233901-phpapp01
Completeguidetomanualtestinguma 120608233901-phpapp01Completeguidetomanualtestinguma 120608233901-phpapp01
Completeguidetomanualtestinguma 120608233901-phpapp01
 
Completeguidetomanualtestinguma 120608233901-phpapp01
Completeguidetomanualtestinguma 120608233901-phpapp01Completeguidetomanualtestinguma 120608233901-phpapp01
Completeguidetomanualtestinguma 120608233901-phpapp01
 
Manual testing good notes
Manual testing good notesManual testing good notes
Manual testing good notes
 
Manual testing
Manual testing Manual testing
Manual testing
 
SDLC - Software Development Life Cycle
SDLC - Software Development Life CycleSDLC - Software Development Life Cycle
SDLC - Software Development Life Cycle
 
Testing material (1).docx
Testing material (1).docxTesting material (1).docx
Testing material (1).docx
 
21UCAE65 Software Testing.pdf(MTNC)(BCA)
21UCAE65 Software Testing.pdf(MTNC)(BCA)21UCAE65 Software Testing.pdf(MTNC)(BCA)
21UCAE65 Software Testing.pdf(MTNC)(BCA)
 
Software engineering jwfiles 3
Software engineering jwfiles 3Software engineering jwfiles 3
Software engineering jwfiles 3
 
Prashant technical practices-tdd for xebia event
Prashant   technical practices-tdd for xebia eventPrashant   technical practices-tdd for xebia event
Prashant technical practices-tdd for xebia event
 
Sdlc model
Sdlc modelSdlc model
Sdlc model
 
Software_Testing.pptx
Software_Testing.pptxSoftware_Testing.pptx
Software_Testing.pptx
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notes
 
Continuous Integration for z using Test Data Management and Application D...
Continuous  Integration for z  using  Test Data Management  and Application D...Continuous  Integration for z  using  Test Data Management  and Application D...
Continuous Integration for z using Test Data Management and Application D...
 
Discovery 101
Discovery 101Discovery 101
Discovery 101
 
Req.Management & Analysis.pptx
Req.Management & Analysis.pptxReq.Management & Analysis.pptx
Req.Management & Analysis.pptx
 
Agile UX in an Agency Environment
Agile UX in an Agency EnvironmentAgile UX in an Agency Environment
Agile UX in an Agency Environment
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principles
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 

Mehr von TestingGeeks

Istqb question-paper-dump-14
Istqb question-paper-dump-14Istqb question-paper-dump-14
Istqb question-paper-dump-14TestingGeeks
 
Istqb question-paper-dump-13
Istqb question-paper-dump-13Istqb question-paper-dump-13
Istqb question-paper-dump-13TestingGeeks
 
Istqb question-paper-dump-12
Istqb question-paper-dump-12Istqb question-paper-dump-12
Istqb question-paper-dump-12TestingGeeks
 
Istqb question-paper-dump-11
Istqb question-paper-dump-11Istqb question-paper-dump-11
Istqb question-paper-dump-11TestingGeeks
 
Istqb question-paper-dump-10
Istqb question-paper-dump-10Istqb question-paper-dump-10
Istqb question-paper-dump-10TestingGeeks
 
Istqb question-paper-dump-9
Istqb question-paper-dump-9Istqb question-paper-dump-9
Istqb question-paper-dump-9TestingGeeks
 
Istqb question-paper-dump-8
Istqb question-paper-dump-8Istqb question-paper-dump-8
Istqb question-paper-dump-8TestingGeeks
 
Istqb question-paper-dump-7
Istqb question-paper-dump-7Istqb question-paper-dump-7
Istqb question-paper-dump-7TestingGeeks
 
Istqb question-paper-dump-6
Istqb question-paper-dump-6Istqb question-paper-dump-6
Istqb question-paper-dump-6TestingGeeks
 
Istqb question-paper-dump-5
Istqb question-paper-dump-5Istqb question-paper-dump-5
Istqb question-paper-dump-5TestingGeeks
 
Istqb question-paper-dump-4
Istqb question-paper-dump-4Istqb question-paper-dump-4
Istqb question-paper-dump-4TestingGeeks
 
Istqb question-paper-dump-3
Istqb question-paper-dump-3Istqb question-paper-dump-3
Istqb question-paper-dump-3TestingGeeks
 
Istqb question-paper-dump-2
Istqb question-paper-dump-2Istqb question-paper-dump-2
Istqb question-paper-dump-2TestingGeeks
 
Istqb question-paper-dump-1
Istqb question-paper-dump-1Istqb question-paper-dump-1
Istqb question-paper-dump-1TestingGeeks
 
Istqb iseb bh0-010-ajoy_singha
Istqb iseb bh0-010-ajoy_singhaIstqb iseb bh0-010-ajoy_singha
Istqb iseb bh0-010-ajoy_singhaTestingGeeks
 

Mehr von TestingGeeks (20)

Sql
SqlSql
Sql
 
Qtp
QtpQtp
Qtp
 
Qtp ans
Qtp ansQtp ans
Qtp ans
 
Selenium
SeleniumSelenium
Selenium
 
Password
PasswordPassword
Password
 
Istqb question-paper-dump-14
Istqb question-paper-dump-14Istqb question-paper-dump-14
Istqb question-paper-dump-14
 
Istqb question-paper-dump-13
Istqb question-paper-dump-13Istqb question-paper-dump-13
Istqb question-paper-dump-13
 
Istqb question-paper-dump-12
Istqb question-paper-dump-12Istqb question-paper-dump-12
Istqb question-paper-dump-12
 
Istqb question-paper-dump-11
Istqb question-paper-dump-11Istqb question-paper-dump-11
Istqb question-paper-dump-11
 
Istqb question-paper-dump-10
Istqb question-paper-dump-10Istqb question-paper-dump-10
Istqb question-paper-dump-10
 
Istqb question-paper-dump-9
Istqb question-paper-dump-9Istqb question-paper-dump-9
Istqb question-paper-dump-9
 
Istqb question-paper-dump-8
Istqb question-paper-dump-8Istqb question-paper-dump-8
Istqb question-paper-dump-8
 
Istqb question-paper-dump-7
Istqb question-paper-dump-7Istqb question-paper-dump-7
Istqb question-paper-dump-7
 
Istqb question-paper-dump-6
Istqb question-paper-dump-6Istqb question-paper-dump-6
Istqb question-paper-dump-6
 
Istqb question-paper-dump-5
Istqb question-paper-dump-5Istqb question-paper-dump-5
Istqb question-paper-dump-5
 
Istqb question-paper-dump-4
Istqb question-paper-dump-4Istqb question-paper-dump-4
Istqb question-paper-dump-4
 
Istqb question-paper-dump-3
Istqb question-paper-dump-3Istqb question-paper-dump-3
Istqb question-paper-dump-3
 
Istqb question-paper-dump-2
Istqb question-paper-dump-2Istqb question-paper-dump-2
Istqb question-paper-dump-2
 
Istqb question-paper-dump-1
Istqb question-paper-dump-1Istqb question-paper-dump-1
Istqb question-paper-dump-1
 
Istqb iseb bh0-010-ajoy_singha
Istqb iseb bh0-010-ajoy_singhaIstqb iseb bh0-010-ajoy_singha
Istqb iseb bh0-010-ajoy_singha
 

Mt s2 sdlc

  • 1. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Agenda: • Different Roles in IT • Bidding • Kick of Meeting • PIN • Software Development Process
  • 2. 2 Software Team – Roles & Responsibilities
  • 3. 3 Software EngineerQA Engineer Test Engineer Project Manager Program Manag erBusiness Analyst Team Lead Product Manager Tech Lead Architect Tech Writer Understanding your role and responsibility and role and responsibility of others is critical to your success. Different Roles in IT Software Team – Roles & Responsibilities
  • 4. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Bidding: • It is defined as request for proposal, estimations and official agreement two parties i.e., Sign in agreement. 4www.talentsprint.com
  • 5. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Kick-Off-Meeting: • It is an initial meeting conducted in company soon after the Project is signed. • Who?  High Level Management-Managers(Product, Program, Technical…) • Objective: To discuss the over view of the Project & to select PM. 5www.talentsprint.com
  • 6. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL PIN (Project Initiation Note): 6www.talentsprint.com • PIN is a mail prepaid by the project manager and send to the CEO of the software company in order to get the permission to start the project development. • Once the mail is approved from the CEO, PM is going to prepare one more mail hence this mail is also called as PIN and is going to share all concern team members in the project stating that they are about start a project.
  • 7. PIN (Project Initiation Note): Project Manager PIN CEO Team Members
  • 8. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL SDLC: • Software Development Life Cycle Phases or stages of a project from inception through completion and delivery of the final product… and maintenance too!
  • 9. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Software Development Stages: 1. Requirement 2. Analysis 3. Design 4. Coding 5. Testing 6. Deployment 7. Maintenance
  • 10. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Requirement Phase: • Role: BA & EM • Task: Interacting with the client and gathering the information.
  • 11. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Requirement Phase: BA Client BRS EM/PM SME URS PrototypeClientSRS
  • 12. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Requirement Phase: • Proof: The proof of Requirement Phase is BRS Document. • BRS- BDD (or) BD. • SRS (or) FSD (or) FRS. • URS (or) CRS.
  • 13. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Requirement Phase: • Business Requirement (BRS) 1. Represent high-level objectives of the organization or customer requesting the system or product. 2. Objectives captured in a project’s vision and scope document Ex. The Flight Reservation System’s login operations must provide basic security to access the system.
  • 14. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Requirement Phase: • User Requirements 1. Describe tasks the user must be able to accomplish with the product. Ex. 1. Enter user id in the Agent Name field 2. Enter the password in the Password field 3. Click OK
  • 15. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Requirement Phase: • Functional Requirements 1. Define the application’s software functionality to enable users to accomplish their tasks, thereby satisfying the business requirements 2. Documented in a Software Requirements Specification (SRS). Ex. 1. Allow access to authorized user ids and passwords 2. Deny access to invalid user ids and passwords
  • 16. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Analysis Phase: • The process of identifying requirements, current problems, constraints, Opportunities for improvement , timelines and Resources costs . • Roles: Managers (Program, Project, Product).
  • 17. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Analysis Phase: • Process:KT Sessions. • …used for resolving any problems that need to be addressed. • determine what attributes and behavior each object should have, and how the objects should interact or interrelate with each other. • “Figuring out what your program should do in the best way possible”. • Feasibility study (social, economical etc). • investigate the need for possible software automation in the given system.
  • 18. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Analysis Phase: • Difficulties in conducting requirement analysis 1. Analyst not prepared 2. Customer has no time/interest 3. Incorrect customer personnel involved 4. Insufficient time allotted in project schedule • Proof: SRS
  • 19. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Design Phase: • The business of finding a way to meet the functional requirements within the specified constraints using the available technology. • Roles: CA, TL • Task: HLD, LLD.
  • 20. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Design Phase: CA (HLD) Tech Lead(LLD) Team Modules Sub Modules (DFD,UML) Pseudo Code GUI
  • 21. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Design Phase: • Proof: TDD (Technical Design Document) • Pseudo Code: • - It is a set of English statements (or) Step by Step Algorithm which will make the Developers more comfortable while developing the actual code.
  • 22. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Design Phase: 1. Determine the set of instructions that will lead to a solution that meets the customer’s requirements. 2. This set of instructions is called an algorithm. 3. Algorithms are usually represented pictorially (by flowcharts or UML state diagrams) 4. Architecture, including hardware and software, communication, software design (UML is produced here) are all part of the deliverables of a design phase
  • 23. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Design Phase: HLDS (High Level Design Specifications) From User Point of view: 1. List of modules and a brief description of each. 2. Brief functionality of each module. 3. Interface relationship among modules. 4. Dependencies between modules. 5. Database tables identified with key elements. 6. Overall architecture diagrams along.
  • 24. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Design Phase: LLDS (Low Level Design Specifications) / Detailed Design 1. Detailed functional logic of the module, in pseudo code. 2. Database tables, with all elements, including their type and size. 3. All interface details. 4. All dependency issues. 5. Error MSG listing. 6. Complete input and output format of a module
  • 25. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Coding Phase: Roles: Programmers/Developers Task: Programming/Coding Process: 1. Indentation 2. Proper color coding 3. Commenting TDD Developer SCD Coding Standards Proof: SCD
  • 26. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Coding Phase: 1. The specifications from the detailed design phase are converted into programs. 2. Code is produced from the deliverables of the design phase during implementation, and this is the longest phase of the software development life cycle. 3. Design must be translated into a machine-readable form taking input as SRS. 1. Done by Team of developers. 2. Reviews after every 500 lines of code 1. Code Inspection 2. Code Walkthrough
  • 27. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Testing Phase: • Role: Test Engineer • Task: Testing the System (or) Product.
  • 28. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Testing Phase: Test Cases (Review) Build Defect Report Dev Team
  • 29. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Testing Phase: 1. Finding the hidden defects in developed Product. 2. During testing, the implementation is tested against the requirements to make sure that the product is actually solving the needs addressed and gathered during the requirements phase. 3. Unit, Integration, system and acceptance tests are done during this phase. Unit tests act on a specific component of the system, while system tests act on the system as a whole.
  • 30. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Testing Phase: • Proof: The proof of the testing phase is Quality Product i.e., Error Free Product (or) System. • Note: • Test Case: It is an idea of a Test Engineer to test something of an application based requirements. • GUI: It is an interface between the user and something developed with graphics in-order to make the user comfortable to interact with that something.
  • 31. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Deployment Phase: • Task: Delivering the Software • Roles: Deployment Engineer (or) Installation Engineer • Process: DEPLOY Installation Engineer Client
  • 32. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Deployment Phase: Deploying the product at client side. Installation and setup of software application at the customer site. Proof: After delivering the Product the official agreement will be signed off. This document will be the proof for delivery phase.
  • 33. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Maintenance Phase: 1. Maintaining the software application 1. Fixing bugs 2. Integrate new features requested by customers 3. Provide support 2. Maintenance can be provided in 2 ways 1. Normal 2. Continuous 3. On Going Process
  • 34. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Summary: • In this session we have discussed  Different Roles in IT  Phases of SDLC  Sequence and flow of SDLC phases 34www.talentsprint.com
  • 35. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Review Questions: 35www.talentsprint.com 1. Which of the following requirements will provide the information about the aspects what the user must able to accomplish? 1. User Requirements 2. System Requirements 3. Business Requirements 4. Non-functional Requirements 2. In the High-level design the database tables will be created with all the columns in it defined. 1.TRUE 2.FALSE
  • 36. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Review Questions: 36www.talentsprint.com 3. In which of the following stages of SDLC, the need for implementing the automation for Testing is decided? 1. Requirements 2. Analysis 3. Design 4. Coding 4. Which of the Following is the last stage of SDLC ? 1. Analysis 2. Deployment 3. Maintenance 4. Coding
  • 37. DO NOT DISTRIBUTE – HIGHLY CONFIDENTIAL Assignments: 37www.talentsprint.com 1.Suppose you are involved in a team which is enhancing the “www.newtours.demoaut.com”, with the new “Hotels” functionalities. List-out what are the: a) Business Requirements b) User Requirements c) Functional Requirements 2. Suppose you are involved in a team which is adding a new module to the “www.newtours.demoaut.com”, which is nothing but the “Hotels”, where customers can book the Hotels also. List-out the activities involved here as per the SDLC.