Application domain

The following is the domain checklist:

  • Has use been made of applied national or international standards, for instance to exchange of data via networks (OSI, TCP/IP, XML), of applications in the IBM-environment (SAA), or of a standard programming language that can be compiled on a wide variety of hardware?
  • Is a specific application present and in use for security?
  • Are input, output, and processing implemented separately?
  • Has data consistency been taken care of by use of checkpoint/restart utilities?
  • Will the data processing be done dually?
  • Has the data processing been split up into sub-transactions?
  • Is the operator able to supply status information?
  • Have check processes (watchdogs) been applied?
  • Are the subsystems distributed?
  • Are the program modules being reused?
  • Is use made of technical actions in interfaces?
  • Are the algorithms optimized, that is, for performance reasons?
  • Will user input be completed automatically?
  • Have you planned how your software architecture will be validated throughout its development?
  • Have you identified suitable validation techniques for use at each stage of the life cycle? Do you know when you will use each?
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset