176
社区成员




In order not to miss any homework details, here’s a checklist for students to quickly review.
Demand Analysis Assignment
(1) 1 blog essay (including the assignment directory, and checking the scoring points);
(2) 1 copy of the requirements specification (Word electronic version) (upload to gitcode or CSDN, give a link in the blog, it is recommended to save it as a PDF for upload);
(3) 1 demand analysis report PPT (classroom narrative) (upload to gitcode or CSDN, give a link in the blog, it is recommended to save it as a PDF for upload);
(4) 1 demand analysis review form (Tencent shared document)
Deadline
1. Assignment Content
Blog Content
Student ID | Task Description | Contribution |
---|---|---|
Requirements:
Group number, project name, student IDs of all group members, and the content being reviewed;
Grading for each group (percentage);
Grading reasons, including format, content, PPT, presentation, strengths, issues (at least 3 points), suggestions, etc. (Respect other groups, give fair and honest assessments, and ensure that the scores accurately reflect the quality of the report, avoiding uniformly high or low scores);
Customized table (Tencent shared document).
2. Assignment Evaluation Items and Evaluation Rules
Total score for this assignment: 100 points
(20 points) Blog Writing [Covered Course Objective 7]
(5 points) Correctly provide links to software requirements specifications and requirements analysis PPT links
(5 points) Blog formatting using markdown.
(4 points) Analysis of possible key points and challenges during the assignment.
(6 points) Division of labor among team members and the proportion of their contributions to the assignment.
(16 points) To strengthen the division of labor and collaboration among team members, it is necessary to describe the members’ collaboration methods in the blog. [Covering Course Objective 6]
(32 points) Writing Software Requirements Specification [Covering Course Objective 2]
The process description specification details the design ideas, problems encountered and solutions to the implementation process.
(2’) Introduction
(8’) User scenario
(8’) Class diagram
(8’) Interface prototype
(3’) Function description
(3’) Acceptance verification standards
(12 points) Refer to the national standard text of the “Software Requirements Specification” to write the software requirements specification for the corresponding project. [Covering Course Objective 5]
(20 points) Presentation Score
(8 points) [Covering Course Objective 2]
(4 points) [Covering Course Objective 6]
(8 points) [Covering Course Objective 5]
(4 points) PPT presentation.
(4 points) Report.
3. Rules & Formats
1. To facilitate reading and assistant grading, please provide a blog table of contents at the beginning of the blog as content index.
Make sure to include the following major headings, or similar meanings are acceptable, and you can personalize your own headings:
2. For other schools’ teachers or assistants to understand the course situation, please add format descriptions at the beginning of the assignment:
This assignment belongs to which course | < Class Link > |
---|---|
Where this assignment is required | < Assignment Requirements Link > |
Team name | |
The goal of this assignment | < Specific aspects > |
Other references | … |
3. Submission Rules
4. Questions and Clarifications
If there are unclear aspects of the assignment or if you don’t understand something, you can ask in the QQ or WeChat group.
Appendix “Demand Rules Specification” Reference
Table of contents
1 Introduction
1.1Purpose of writing
1.2Project background
1.3References
2.Overall description
2.1 Objectives
2.1.1 Development intention
2.1.2Application goals and scope
2.1.3 Product Prospects
3. Specific requirements
3.1 Class Diagram
3.2 Properties
3.2.1 Availability
3.2.2 Security
4. Interface prototype
5. Function description and acceptance verification standards
5.1Detailed function description
5.2 Input and output format
5.3 Interface Acceptance Criteria
5.4 Functional Acceptance Criteria
Reference example
Introduction
1.1 Purpose of writing
The function of the project is to implement DES_RSA hybrid encryption. For our team, it is to improve Java programming capabilities, and then combine it with cryptography knowledge to lay a solid foundation for future professional learning. It is also for potential ordinary users to implement daily file encryption.
1.2 Project background
Software name: DES_RSA hybrid encryptor
Project task proposer: Teacher Lou
-Project developer: AWN team
1.3 References
Teacher Registration System Requirements Specification
Buy together Required Specifications
2.General description
2.1 Goals
2.1.1 Development intention
Use UI technology to make the complex DES_RSA hybrid encryption file technology into an interface, and realize file encryption through simple buttons.
2.1.2 Application goals and scope
This system is aimed at all students who love passwords and implements simple txt file encryption.
2.1.3 Product prospects
The function of the system just now is relatively simple, but the big framework has been completed. We look forward to enriching the functions of the system after learning more knowledge in the future, and the product prospects are good.
3.2.1 Security
Keys, ciphertext and other files exported during program running are stored in a secure folder.
4 interface prototype
It’s not implemented yet, it will be added later.
5.2 Input and output format
The imported plain text file format is .txt
The exported plain text file format is .txt
5.3 Interface acceptance criteria
User encryption interface
Input the file. There is a display box in the middle to display the file name of the file to be encrypted; there is an import file button on the right for importing plain text and an encryption button.
The encryption module has a prompt on the far right of the selection box for the number of digits of prime numbers p and q (the number of digits for p and q is preferably more than 200). There is a button in the middle to generate a prime number p and export a prime number p, and there is a corresponding display box to generate a prime number q and export it. The button of prime number q has a corresponding display box. There is a button to generate prime number pairs, and there are buttons to export modulo n, public key e, and private key d below the interface. Finally, there is a DES key export button and a corresponding display box.
Output file There is a display box in the middle to display the file name of the encrypted file; there is an export file button on the right for exporting ciphertext.
User decryption interface
Input file There is a display box in the middle to display the file name of the file to be decrypted; there is an import file button on the right for importing ciphertext.
The decryption module has an input box for entering the password (DES public key file)
Output file There is a display box in the middle to display the file name of the successfully decrypted file; there is an export file button on the right for exporting plain text.
5.4 Functional acceptance criteria
Implement all functions introduced in the interface.