Thursday, 4 April 2013

Software Project Management Sessional 2



FPA:
•System is decomposed into functional units
•2 categories:
•Data function types
–Internal Logical files
–External Interface files
•Transactional Function Types
–External Inputs
–External Outputs
–External Inquiry

•Independent of language, tools or methodologies
•Estimated from SRS; possible to estimate in early phases
•Change of requirements can easily be followed by a re-estimate
•Based on user’s external view of the system
•The five functional units are ranked according to their complexity i.e. Low, Average or High.
•Organization delelop criteria for ranking


CAF:
1. Reliable backup and recovery?
2. Data communication
3. Distributed processing functions?
4. Performance criticality
5. Heavily utilized operational environment?
6. Require online data entry
7. Multiple operation for online data entry
8. Master files updated online?
9. Inputs, outputs, files or inquiries complexity
10. Internal processing complexity
11. Reusable code?
12. Conversion and installation?
13. Multiple installations in diff orgs
14. Change & Ease of use







COST ESTIMATION
Advantages:
Disadvantages:
Carries risk
Empirical data not from broad base


Techiniques:
Past experience
Task breakdown, effort, size estimates
Empirical models
Automated tools




INTERMEDIATE COCOMO:

•Product attributes
–Requires software reliability (RELY)
–Database size (DATA)
–Product complexity (CPLX)
•Computer attributes
–Execution time constraint (TIME)
–Main storage constraint (STOR)
–Virtual machine volatility (VIRT)
–Computer turn around time (TURN)

•Personnel attributes
–Analyst capability (ACAP)
–Application experience (AEXP)
–Programmer capability (PCAP)
–Virtual machine experience (VEXP)
–Programming Language Experience (LEXP)
•Project attributes
–Modern programming practices (MODP)
–Use of software tool (TOOL)
–Required development schedule (SCED)




COST CONTROL:
-Use cheaper material
-Assign experienced people
-Reduce scope/reqments
-Improved methods for productivity




RISK MANAGEMENT:
1. Risk Identification:
•Brainstorming
•Delphi Technique
•Interviewing
•Root Cause Identification
•SWOT Analysis

2. Risk Analysis
–Qualitative Risk Analysis
•Prioritize risks: Estimate probability of occurrence & impact 

–Quantitative Risk Analysis
•Numerical analysis to estimate effect of each risk on objectives and deliverables

3. Risk Response
–Minimize threats
–Maximize opportunities
* Negative, positive, both risks
-Avoid, Transfer, Mitigate

4. Monitoring and Control:
performance measuring
information
evaluation
quality controlling

No comments:

Post a Comment