Product Stakeholders:
Users: All teachers
Customer: All Students
Software Engineer: System development, promotion, maintenance personnel
strong> Competitive Demand Analysis
N: Students can log in to check their own results, each teacher can log in to enter and modify student information. |
A: To do a A good security privacy system, the interface to be friendly, the function should basically meet the needs of customers. |
B: can help To help students understand their achievements in a timely manner, teachers can facilitate timely management of student information. |
C: interface to Friendly, functional to complete, security and privacy to protect the good, and constantly make bug fixes. |
D: First To introduce the basic functions of the system, and then promote their own features highlight features. |
Four Quadrant method functional Classification
|
peripheral function |
Killer function |
necessary requirements |
second quadrant Login interface is concise, landing response speed, record speed, fast query speed and so on. |
first quadrant |
Ancillary requirements |
Third Quadrant Clean the system interface and clear the malicious link plugin. |
Quadrant Four Fast running speed, good compatibility and strong self-repairing ability. |
Job 5 Requirements Analysis