Specifications

Level One: Protege GX Installer Study Guide | August 2013 147
Determine User Requirements
Next, we need to look at the people we are trying to manage.
We need a list of these people, and we need to group them by function. For example, Managers, Office staff,
Cleaners.
This, along with the information we already have will allow us to create our Users and Access Levels.
Determine Information Requirements
Finally, the why part of the questioning relates to how the end user intends to extract information from the
system once it is up and running. Are they going to have operators actively monitoring the system, or are they
only intending to generate reports as required?
Once you have all this information, collate it into a design document which all parties agree on. This document
will be used throughout your installation and programming.