25.2 b Functional and Technical Specification Form Additional Pay data Conversion

advertisement
Functional and Technical Specification for Customization
Customer Requirement Document
Mod. Tracking #:
Design # – Conversion 2
Initial Specification Approval
Customer Requirement Document
Prepared:
Amie Salamido
Prepared By:
Peralta Technical Lead Approval:
Initial:
Date Prepared:
Initial:
Date Reviewed:
Initial:
Date Reviewed:
Initial:
Date Reviewed:
Initial:
Date Approved:
Initial:
Date Approved:
Minh Lam
Reviewed By:
Peralta Functional Lead
2008-07-21
David Betts
Approval:
Michelle Lenh
Reviewed By:
Peralta User Approval:
Michelle Lenh
Reviewed By:
Peralta Sponsor Approval:
Thomas Smith
Approved By:
CIBER Project Manager Approval:
Kim Groshek
Approved By:
Completed Modification Acceptance
Customer Requirement Document
Prepared:
Amie Salamido
Prepared By:
Peralta Technical Lead Approval:
Approval:
Date Prepared:
Initial:
Date Reviewed:
Initial:
Date Reviewed:
Initial:
Date Reviewed:
Initial:
Date Approved:
Initial:
Date Approved:
Minh Lam
Reviewed By:
Peralta Functional Lead
Initial:
David Betts
Michelle Lenh
Reviewed By:
Peralta User Approval:
Michelle Lenh
Reviewed By:
Peralta Sponsor Approval:
Thomas Smith
Approved By:
CIBER Project Manager Approval:
Kim Groshek
Approved By:
Document Control
Change Record
Date
Author
Version
Change Reference
2008-07-21
Amie Salamido
1.0
n/a
Reviewers
Sign-Off
Date
Reviewer Name
Copy No.
Name
Position
Sign-Off
Distribution
Version #:1.0 (Ju1 2008)
CIBER Confidential
Page 2
Last saved: 2016-06-28
Functional Specifications
Detailed Business Requirements
Peralta has over 800 regular employees. In order to allow better budget control with limited
maintenance, positions will be created and budgets established by position. A portion of these 800
regular employees have amounts paid to them using additional pay. With the entry of the budget
string (combo code) at the budget level, it will no longer be necessary to enter the combo code on
additional pay. Because of the large volume, a solution should be developed that will insert a row in
additional pay that removes the combo code currently entered rather than performing this update
manually. This will be a one-time load. On going maintenance will occur on-line.
For each employee having additional pay rows, new effective-dated rows will be inserted in
ADDL_PAY_EFFDT and ADDL_PAY_DATA tables. All data from the current row will be copied
forward onto the newly inserted effective-dated row except for the EFFDT (which will be set to the
specified implementation date) and the ACCT_CD (Combination Code), which will be set to
blank.
When processing, the conversion program will produce an exception report (EmplID, Name,
exception message(s) ) for the following conditions:
1. Future dated additional pay data exists
2. The value in the ACCT_CD field on ADDL_PAY_DATA differs from that found on the
current row on the JOB_EARNS_DIST table for the same ee.
Business Justification
Using position management will reduce on-line maintenance as employees move into and out of
positions. Using an automated load for initial implementation will reduce time required and possible
data entry errors. An automated load can be re-used consistently in multiple environments.
Risks
Testing required to ensure that data loaded by automated means behaves like data entered on-line.
Alternative Work Around (Not requiring customization)
Enter rows in additional pay data manually on-line
Disadvantages of the Alternative Work Around
Manual entry is time consuming, prone to user error and cannot be re-used in multiple environments.
Stakeholders
Stakeholders are individuals or groups with an interest in the project that are not users of the project
deliverables. List and describe the stakeholders along with their responsibilities as they relate to this
project.
Name
Version #:1.0 (Ju1 2008)
CIBER Confidential
Description
Responsibilities


Page 3
Last saved: 2016-06-28
Name
Description
Responsibilities

Users
Briefly describe the users, including their responsibilities to the project, their affiliation, and how they will
use the software. When possible, refer to roles rather than individual names. If necessary, use real names.
Name
Version #:1.0 (Ju1 2008)
CIBER Confidential
Description
Responsibilities/Interests


Page 4
Last saved: 2016-06-28
Assumptions
All amounts paid under additional pay are distributed exactly as regular pay.
Who will be using this modification
Payroll functional users
Process Flows/Frequencies
One-time data load at go-live
What are the inputs and outputs of the modification in terms of
business processing
N/A
Capabilities
Capabilities statements describe functionality of the software including reports and interfaces with
other systems. They are extracted from users stories. If a capability describes a report or interface,
place an X in the appropriate box. The modification will be tested against these capabilities during
acceptance testing.
No.
Capability
Report Interface
Security
N/A
Dependencies
N/A
Acceptance Criteria
Queries on target tables show that data has been successfully loaded in the correct fields and
formats. On-line transactions using the loaded data complete successfully.
Glossary
Include any terms or acronyms unique to this project, the district, or the department.
Term
Version #:1.0 (Ju1 2008)
CIBER Confidential
Definition
Page 5
Last saved: 2016-06-28
Version #:1.0 (Ju1 2008)
CIBER Confidential
Page 6
Last saved: 2016-06-28
Technical Estimates
Approach
Describe the approach
Estimates
Estimate the technical effort required implementing this approach. Include the following where
appropriate:
 Number of PeopleSoft objects involved and the nature in which it is used (modified,
cloned, new)
 Number of lines of code modified or created
 Number and type of resources are required
 Any other useful estimates
Hours Estimate
8 hours
24 hours
40 hours
80 hours
est’d hours = ###
Risks
List any risks particular to this approach
Risk Mitigation
Discuss means to limit or eliminate the impact of risks identified above.
Assumptions
List any assumptions particular to this approach.
Constraints
Include anything outside of the control of the technical team that will affect technical decisions
(schedule, resources, etc)
Version #:1.0 (Ju1 2008)
CIBER Confidential
Page 7
Last saved: 2016-06-28
Impacted Objects
Impact Type (New,
Modify, or Delete)
Add a new field to
the existing record
Object Type
(Record, View, Page,
PeopleCode, etc)
Record
Obect Name
Comment
PS_PERSONAL_DATA
DATE
SUBMITTED:
Date Required
By:
Version #:1.0 (Ju1 2008)
CIBER Confidential
Page 8
Last saved: 2016-06-28
Technical Specifications
Modified Online Objects:
Project Name
Project Information
Comment:
Name:
Portal Registry Structure
Name:
Portal Registry Structure Definition
Type (Folder or Content):
Label:
Sequence:
Parent Folder:
Object Owner ID:
Product:
Long Description:
*Menu:
*Component:
Permission Lists:
* For Content Reference portal registry structures only
Menu
Menu Group
Modify
New
Menu
Bar
Component
Component
Component
New Modify
Search Record
Add Search Record
Actions Allowed (Add,
Update/Display, etc.)
Pages
Page:
Record
New
Modify
Field Name
Component:
Type
Display
Only
Invisi
ble
Disp
Cntrl
Rel
Disp
Lvl
Component/Page Security
Component
New Modify
Version #:1.0 (Ju1 2008)
CIBER Confidential
Page
Permission List
Display
Only (Y/N)
Actions (Add, Upd,
Upd/Disp, Corr)
Page 9
Last saved: 2016-06-28
Records
Record:
New
Field Name
Modify
Key
Dir
Req
Src
Key
Alt
Src
List
Box
Default Value
Table Edits
Indexes
Record:
Field Name
Index:
Column Position
Unique (Y or N):
A/D
Fields
Field Name
New Modify
Type
Len
Value
Active
Long Name
Short Name
Translate Values
Translate Values
Field Name
New Modify
Version #:1.0 (Ju1 2008)
CIBER Confidential
Eff Date
Long Name
Short Name
Page 10
Last saved: 2016-06-28
Queries
Query Name:
Query Type:
Records
Record Name
New
Description:
Owner:
Modify
Alias
Fields
Col Record.Fieldname
Criteria
Logical
Format
Expression 1
Order
By Num
Condition
Type
Agg
Heading Text
Expression 2
SQL
*Paste Screenshot of Query Preview below
HTML
HTML:
Record
New
Modify
Field Name
Message Catalog
Message Set
Number
New
Modify
Message
Number
Severity
Message Text
*Paste Screenshot of new or modified message below.
Version #:1.0 (Ju1 2008)
CIBER Confidential
Page 11
Last saved: 2016-06-28
PeopleCode
Type (Record, Page,
etc)
New Modify
Object Name
(Record.Field, Page,
etc)
Event
Processing Description
Application Engine
Program
New
Modify
Section
Step
Action (Do When, Do While, Do
Select, Do Until, PeopleCode,
SQL, Call Section, or Log
Message)
Definition
Qualifier
Definition Delimiter
File Layout Definition
File Layout
File Layout
Format
Default File Name:
File Record/Segment ID
Name
Seq No
Max
Rec
Length
File
Record
ID
ID
Length
Field
Lengt
h
Start
Positio
n
Field
Qualifier
Field
Inheritance
(REC.FIEL
D)
File Record/Segment ID
Name
Seq No
Max
Rec
Length
File
Record
ID
ID
Length
Field Name
Version #:1.0 (Ju1 2008)
CIBER Confidential
Default
Qualifie
r
Field
Delimiter
Default Value
Default
Qualifie
r
Field
Delimiter
Page 12
Last saved: 2016-06-28
Field Name
Field
Len
Start
Positio
n
Field
Qualifier
Field
Inheritance
(REC.FIEL
D)
Default Value
Process Definition
Process Name:
New
Modify
Process Definition
Process Type:
Description:
Priority:
API Aware:
Long Description:
Process Definition Options
Recurrence Name:
Server Name:
Component
Process Groups
Job Definition
Job Name:
New
Modify
Job Definition
Run Mode:
Description:
Seq
Priority:
Process Type
Server Name:
Component
Version #:1.0 (Ju1 2008)
CIBER Confidential
Process List
Process Name
Run Always
Job Definition Options
Recurrence Name:
Process Groups
Page 13
Last saved: 2016-06-28
Images (Paste New or Modified Images Below)
Page (Before Modification)
Page Print 1
Version #:1.0 (Ju1 2008)
CIBER Confidential
Page 14
Last saved: 2016-06-28
Page (After Modification)
Page Print 2
Version #:1.0 (Ju1 2008)
CIBER Confidential
Page 15
Last saved: 2016-06-28
Batch Objects
Programs
Program Name:
New
Modified
Subprograms:
New
Modified
Records include:
Usage Type: (Read/Write/Delete)
Suggested Unit Testing Approach
Testing Scenarios (should cover ensuring that the process works correctly and that
the process handles any unknown errors correctly)
Version #:1.0 (Ju1 2008)
CIBER Confidential
Page 16
Last saved: 2016-06-28
Download