3. Systems Analysis
Requirements Validation — Quiz
Test your understanding of requirements validation with 5 practice questions.
Practice Questions
Question 1
A project team is developing a new mobile application. During requirements validation, a key stakeholder raises a concern that the proposed user interface (UI) design, while aesthetically pleasing, might be confusing for elderly users who are a significant part of the target demographic. Which specific aspect of requirements validation is primarily being challenged, and what is the most effective technique to address this concern?
Question 2
In a large-scale government project for a new national database system, a requirement states: 'The system shall comply with all relevant data privacy regulations, including GDPR and CCPA.' During requirements validation, it is discovered that the interpretation of 'compliance' varies significantly among legal, technical, and operational teams. Which of the following best describes the primary issue with this requirement, and what is the most critical step to resolve it?
Question 3
A software development project for a new medical device control system has a requirement: 'The system shall respond to emergency stop commands within $100$ milliseconds.' During the requirements validation phase, the team needs to ensure this critical safety requirement is met. Which validation technique would provide the most rigorous and quantitative evidence that this performance requirement is achievable and will function correctly under operational conditions?
Question 4
Consider a project to develop a new air traffic control system. A requirement states: 'The system shall display all aircraft within a $100$-mile radius of the control tower, updating their positions every $2$ seconds.' During requirements validation, it is discovered that the existing radar infrastructure can only provide updates every $5$ seconds. Which quality attribute of the requirement is primarily violated, and what is the most appropriate immediate action?
Question 5
A large financial institution is developing a new trading platform. A critical security requirement states: 'All user authentication attempts must use multi-factor authentication (MFA) and be logged for audit purposes.' During requirements validation, the security team expresses concern that the proposed MFA solution might introduce unacceptable latency for high-volume traders, impacting their ability to execute trades quickly. Which of the following best describes the conflict arising during validation, and what technique would be most effective in resolving it?
