EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

Topic - Scrum Method

By:   •  Essay  •  1,015 Words  •  February 11, 2011  •  1,659 Views

Page 1 of 5

Topic - Scrum Method

TOPIC - SCRUM METHOD

The system is interrelated with all the students and all their scientific requirements and to do so, the system needs to do some changes and some adjustments that may occur upon during real work. For higher efficiency of the work, it needs to do some tests in every single stage of the system. In terms of prompt completion, and the test that give positive results, during the design time of the project, there are some benefits that are derived from using agile methods and reasons forces us to use this method and compare it with the requirements of the project with the heavyweight methodologies for example- waterfalls and spiral models. To build the discussion forum for supporting MSc students learning semi-structured interviews, from where some samples are selected from students, librarians, lecturers. And this particular selection relies on the percentage of ever group. SCRUM is an agile framework for completing projects and the reason behind using this method is that it has many benefits to meet the needs for building its program for example it is flexible enough so that it can deal with the changes that may occur during the real work of the system. With the rapid achievement on the other methods, among the learning members of the project, the reports of the system can be delivered in 30 days only for all the tests done. This system will be designed by using one of the web languages such as ASP or JSP. MYSQL will be used to store data.

The support provided by the faculty, in terms of scientific interest, there are two parts to evaluate this system. 1) To calculate the number of posts and the number of users during a particular posts and to compared with the members who attended the course. 2) To prepare questions to evaluate the system which depends on the student's increasing knowledge with the crustal thinking. It also depends on the participation of the students in the discussion between them for exchanging ideas, views, knowledge, open dialogues which will definitely reflect on the scientific value. This questionnaire will be used to solicit the views of the students as well as the lecturers to see how far is it beneficial for the students by the faculty.

Through Data Protection Act (DTA), there are several rules to be followed while building this project. Those rules are as follows:-

To verify all the necessary personal information of the students and the faculty members and protecting those information. It appears only at the time when needed. These information may be in paper or stored in database

To secure the website from the external attack and exploitation of information by using proper language which has good security system.

Protection program for passwords can be provided so that no information are stolen form the programs and the files that are used.

To delete the unwanted information that are no longer required especially those, which are in papers.

Clarification of the data-

Different security levels are used in the project to secure the data. Firstly, each student and the faculty are provided with the user name and password. Secondly, if the user is not active, the system will automatically log-out and will have to log-in again. Thirdly, to install the anti-virus software so that no virus can harm the data this can be in the files. Fourthly, to take all the three types of backups which are as follows:-

To take the complete database of each and everyday.

To take backups after changing the previous complete data.

A copy of the entire database for a particular month.

With the use of all the levels of the security, both the students ans the faculty will be assured that their personal information is safe and thus will increase their confidence to rely on the system and in using the system without any kind of fear of loosing any data. And with the help of the antivirus software no virus can be transplanted in the computers and thus will increase participation and interaction between the users. There are two different ways to evaluate the security system:-

Sending a virus filled file and then monitoring the system to check the elimination of the virus

By sending several questions related to notes of the protect on system to check that the virus are eliminated or not.

Reflect Report

The research methods must be followed by the students academically which is considered as one of the most important modules in PhD's study. There are several

Download as (for upgraded members)  txt (7.3 Kb)   pdf (109.7 Kb)   docx (13.3 Kb)  
Continue for 4 more pages »