{"id":347781,"date":"2024-10-20T00:27:56","date_gmt":"2024-10-20T00:27:56","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-245702018-tc\/"},"modified":"2024-10-25T23:59:31","modified_gmt":"2024-10-25T23:59:31","slug":"bs-iso-iec-245702018-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-245702018-tc\/","title":{"rendered":"BS ISO\/IEC 24570:2018 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
179<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
184<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | Introduction to this Standard <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | 1 Scope 1.1 Purpose 1.2 Conformity 1.3 Applicability 1.4 Focus <\/td>\n<\/tr>\n | ||||||
189<\/td>\n | 2 Introduction to FPA 2.1 Brief description of FPA 2.1.1 Background, purpose and application of FPA 2.1.2 Rationale behind FPA <\/td>\n<\/tr>\n | ||||||
190<\/td>\n | 2.2 Use of FPA: application versus project functional size 2.3 Types of function point analyses 2.4 Function point analyses during a project <\/td>\n<\/tr>\n | ||||||
191<\/td>\n | 2.5 Scope of the analysis and boundary of the application to be analyzed 2.6 Users 2.7 Functions and function types <\/td>\n<\/tr>\n | ||||||
192<\/td>\n | 2.8 The complexity of a function <\/td>\n<\/tr>\n | ||||||
193<\/td>\n | 2.9 The valuing of functions 2.10 The functional size <\/td>\n<\/tr>\n | ||||||
194<\/td>\n | 3 Guidelines to perform an FPA 3.1 Step-by-step plan to perform an FPA 3.2 Types of function point analyses and their accuracy <\/td>\n<\/tr>\n | ||||||
195<\/td>\n | 3.2.1 Indicative function point analysis <\/td>\n<\/tr>\n | ||||||
196<\/td>\n | 3.2.2 High level function point analysis 3.2.3 Detailed function point analysis <\/td>\n<\/tr>\n | ||||||
197<\/td>\n | 3.3 Role of the quality of the specifications 3.4 FPA during a project <\/td>\n<\/tr>\n | ||||||
198<\/td>\n | 3.5 Determining the functional size of an application 3.5.1 Determining the application boundary <\/td>\n<\/tr>\n | ||||||
199<\/td>\n | 3.5.2 Functional size of new applications 3.5.3 Functional size of enhanced applications 3.5.4 Functional size of re-built applications <\/td>\n<\/tr>\n | ||||||
200<\/td>\n | 3.6 Determining the functional size of a project 3.6.1 Determining the scope of a project function point analysis <\/td>\n<\/tr>\n | ||||||
201<\/td>\n | 3.6.2 Functional size of development projects <\/td>\n<\/tr>\n | ||||||
202<\/td>\n | 3.6.3 Functional size of enhancement projects 3.6.4 The project function point analysis during the replacement of an application <\/td>\n<\/tr>\n | ||||||
203<\/td>\n | 3.7 Definition of functional change 3.7.1 General 3.7.2 Modification of a transactional function 3.7.3 Modification of a data function 3.7.4 Modification of a DET <\/td>\n<\/tr>\n | ||||||
204<\/td>\n | 3.8 FPA in specific situations 3.8.1 Analyzing on the basis of traditional design 3.8.2 Analyzing packaged software <\/td>\n<\/tr>\n | ||||||
206<\/td>\n | 3.8.3 Analyzing screens or windows <\/td>\n<\/tr>\n | ||||||
207<\/td>\n | 3.8.4 Analyzing when prototyping <\/td>\n<\/tr>\n | ||||||
208<\/td>\n | 3.9 Illustration: FPA and the application life cycle 3.9.1 FPA during the requirements phase <\/td>\n<\/tr>\n | ||||||
209<\/td>\n | 3.9.2 FPA during the analysis phase <\/td>\n<\/tr>\n | ||||||
210<\/td>\n | 3.9.3 FPA during the functional design phase <\/td>\n<\/tr>\n | ||||||
211<\/td>\n | 3.9.4 FPA during the construction phase 3.9.5 FPA during the implementation phase 3.9.6 FPA during the operation and maintenance phase <\/td>\n<\/tr>\n | ||||||
212<\/td>\n | 4 General FPA guidelines 4.1 Analyzing from a logical perspective 4.2 Applying the rules 4.3 No double counting 4.4 Built functionality, non-requested functionality <\/td>\n<\/tr>\n | ||||||
213<\/td>\n | 4.5 Production of re-usable code 4.6 Re-use of existing code 4.7 Screens, windows and reports 4.8 Input and output records 4.9 Security and authorization <\/td>\n<\/tr>\n | ||||||
214<\/td>\n | 4.10 Operating systems and utilities 4.11 Report generators and query facilities 4.12 Graphs 4.13 Help facilities <\/td>\n<\/tr>\n | ||||||
215<\/td>\n | 4.14 Messages 4.15 Menu structures 4.16 List functions 4.17 Browse and scroll functions <\/td>\n<\/tr>\n | ||||||
216<\/td>\n | 4.18 Cleanup functions 4.19 Completeness check on the function point analysis 4.20 FPA tables <\/td>\n<\/tr>\n | ||||||
217<\/td>\n | 4.21 Deriving logical files (data functions) from a normalized data model 4.21.1 Introduction 4.21.2 Denormalization rules <\/td>\n<\/tr>\n | ||||||
218<\/td>\n | 4.21.3 The nature of the relationship (cardinality and optionality) 4.21.4 Independence or dependence of an entity type <\/td>\n<\/tr>\n | ||||||
220<\/td>\n | 4.21.5 Conversion table: from normalized entity types to logical files 4.22 Shared use of data <\/td>\n<\/tr>\n | ||||||
223<\/td>\n | 4.23 Generic rule for counting data element types <\/td>\n<\/tr>\n | ||||||
224<\/td>\n | 5 Internal Logical Files 5.1 Definition of an internal logical file <\/td>\n<\/tr>\n | ||||||
225<\/td>\n | 5.2 Identifying internal logical files <\/td>\n<\/tr>\n | ||||||
226<\/td>\n | 5.3 Determining the complexity of internal logical files <\/td>\n<\/tr>\n | ||||||
227<\/td>\n | 6 External Logical Files 6.1 Definition of an external logical file <\/td>\n<\/tr>\n | ||||||
228<\/td>\n | 6.2 Identifying external logical files <\/td>\n<\/tr>\n | ||||||
230<\/td>\n | 6.3 Determining the complexity of external logical files 7 External Inputs <\/td>\n<\/tr>\n | ||||||
231<\/td>\n | 7.1 Definition of an external input <\/td>\n<\/tr>\n | ||||||
232<\/td>\n | 7.2 Identifying external inputs <\/td>\n<\/tr>\n | ||||||
233<\/td>\n | 7.3 Determining the complexity of external inputs <\/td>\n<\/tr>\n | ||||||
235<\/td>\n | 8 External Outputs 8.1 Definition of an external output <\/td>\n<\/tr>\n | ||||||
237<\/td>\n | 8.2 Identifying external outputs <\/td>\n<\/tr>\n | ||||||
239<\/td>\n | 8.3 Determining the complexity of external outputs <\/td>\n<\/tr>\n | ||||||
240<\/td>\n | 9 External Inquiries <\/td>\n<\/tr>\n | ||||||
241<\/td>\n | 9.1 Definition of an external inquiry <\/td>\n<\/tr>\n | ||||||
242<\/td>\n | 9.2 Identifying external inquiries <\/td>\n<\/tr>\n | ||||||
243<\/td>\n | 9.3 Determining the complexity of external inquiries <\/td>\n<\/tr>\n | ||||||
245<\/td>\n | Annex A (normative) Summary features for valuing function types <\/td>\n<\/tr>\n | ||||||
250<\/td>\n | Annex B (normative) Function Point Analysis glossary <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Software engineering. NESMA functional size measurement method. Definitions and counting guidelines for the application of function point analysis<\/b><\/p>\n |