ࡱ> q` 8bjbjqPqP ?t::e0  ***8*\.+ m2+~D-T-T-T-.| l94<'m)m)m)m)m)m)m$nhBq|Mm ?..??Mm T-T-bmBBB?p 8T- lT-'mB?'mBB*Wf v ,/jT-+ >&*?|giRk\xm0mivqw@q/jq /j<>0l>"B>><><><>MmMmsBj<><><>m???? * *   Functional Requirements Document Template VersionDescription of ChangeAuthorDate CONTENTS  TOC \o "1-2" 1 INTRODUCTION  PAGEREF _Toc143150771 \h 4 1.1 Purpose  PAGEREF _Toc143150772 \h 4 1.2 Scope  PAGEREF _Toc143150773 \h 4 1.3 Background  PAGEREF _Toc143150774 \h 4 1.4 References  PAGEREF _Toc143150775 \h 4 1.5 Assumptions and Constraints  PAGEREF _Toc143150776 \h 4 1.6 Document Overview  PAGEREF _Toc143150777 \h 5 2 METHODOLOGY  PAGEREF _Toc143150778 \h 5 3 FUNCTIONAL REQUIREMENTS  PAGEREF _Toc143150779 \h 5 4.1 Context  PAGEREF _Toc143150780 \h 5 4.2 User Requirements  PAGEREF _Toc143150781 \h 5 4.3 Data Flow Diagrams  PAGEREF _Toc143150782 \h 6 4.4 Logical Data Model/Data Dictionary  PAGEREF _Toc143150783 \h 6 4.5 Functional Requirements  PAGEREF _Toc143150784 \h 6 5 OTHER REQUIREMENTS  PAGEREF _Toc143150785 \h 6 5.1 Interface Requirements  PAGEREF _Toc143150786 \h 6 5.2 Data Conversion Requirements  PAGEREF _Toc143150787 \h 7 5.3 Hardware/Software Requirements  PAGEREF _Toc143150788 \h 7 5.4 Operational Requirements  PAGEREF _Toc143150789 \h 7 APPENDIX A - GLOSSARY  PAGEREF _Toc143150790 \h 11  INTRODUCTION [Provide an overview of the system and some additional information to place the system in context.] Purpose [Provide an overall description of the FRD, its purpose. Reference the system name and identifying information about the system to be implemented.] Scope [Discuss the scope of the document and how it accomplishes its purpose.] Background [Describe the organization and its overall responsibilities. Describe who is producing the document and why.] References [List references and controlling documents, including: meeting summaries, white papers, other deliverables, etc.] Assumptions and Constraints [Provide a list of contractual or task level assumptions and/or constraints that are preconditions to preparation of the FRD. Assumptions are future situations beyond the control of the project, whose outcomes influence the success of a project.] Assumptions Examples of assumptions include: availability of a technical platform, legal changes and policy decisions. Constraints Constraints are boundary conditions on how the system must be designed and constructed. Examples include: legal requirements, technical standards, strategic decisions. Constraints exist because of real business conditions. For example, a delivery date is a constraint only if there are real business consequences that will happen as a result of not meeting the date. If failing to have the subject application operational by the specified date places the organization in legal default, the date is a constraint. Preferences are arbitrary. For example, a date chosen arbitrarily is a preference. Preferences, if included in the FRD, should be noted as such.] Document Overview [Provide a description of the document organization.] METHODOLOGY [Describe the overall approach used in the determination of the FRD contents. Describe the modeling method(s) so non-technical readers can understand what they are conveying.] FUNCTIONAL REQUIREMENTS Context [Provide a context diagram of the system, with explanations as applicable. The context of a system refers to the connections and relationships between the system and its environment.] Exhibit 2 - Generic Context Diagram  User Requirements [Provide requirements of the system, user or business, taking into account all major classes/categories of users. Provide the type of security or other distinguishing characteristics of each set of users. List the functional requirements that compose each user requirement. As the functional requirements are decomposed, the highest level functional requirements are traced to the user requirements. Inclusion of lower level functional requirements is not mandatory in the traceability to user requirements if the parent requirements are already traced to them. User requirement information can be in text or process flow format for each major user class that shows what inputs will initiate the system functions, system interactions, and what outputs are expected to be generated by the system. The scenarios should be comprehensive, to the extent that all user types and all major functions are covered. Give each user requirement a unique number. Typically, user requirements have a numbering system that is separate from the functional requirements. Requirements may be labeled with a leading U or other label indicating user requirements.] Data Flow Diagrams [Decompose the context level diagrams to determine the functional requirements. Data flow diagrams should be decomposed down to the functional primitive level. These diagrams are further decomposed during design.] Logical Data Model/Data Dictionary [Create the initial Logical Data Model. Describe data requirements by providing data entities, decomposition, and definitions in a data dictionary. The data requirements describe the business data needed by the application system. Data requirements do not describe the physical database and are not at the level of identifying field names.] Functional Requirements [List the functional requirements of the system.] Functional Requirements Group 1 [List the functional requirements for each functional requirements group.] Exhibit 4 - Sample Requirements Group 1 Section/ Requirement ID Requirement DefinitionFR1.0.The system shall [parent requirement group 1].FR1.1The system shall [child/parent requirement].FR1.1.1The system shall [child requirement].FR1.1.2The system shall [child requirement].Functional Requirements Group 2, Etc. OTHER REQUIREMENTS [Describe the non-behavioral requirements.] Interface Requirements [Describe the user interfaces that are to be implemented by the system.] Hardware Interfaces [Define hardware interfaces supported by the system, including logical structure, physical addresses, and expected behavior.] Software Interfaces [Name the applications with which the subject application must interface. State the following for each such application: name of application, external owner of application, interface details (only if determined by the other application). It is acceptable to reference an interface control document for details of the interface interactions.] Communications Interfaces [Describe communications interfaces to other systems or devices, such as local area networks.] Data Conversion Requirements [Describe the requirements needed for conversion of legacy data into the system.] Hardware/Software Requirements [Provide a description of the hardware and software platforms needed to support the system.] Operational Requirements [Provide the operational requirements in this section. Do not state how these requirements will be satisfied. For example, in the Reliability section, answer the question, How reliable must the system be? Do not state what steps will be taken to provide reliability. Distinguish preferences from requirements. Requirements are based on business needs, preferences are not. If, for example, the user requires a special response but does not have a business-related reason for it, that requirement is a preference. Other applicable requirements on system attributes may be added to the list of subsections below.] Operational requirements describe how the system will run and communicate with operations personnel. Security and Privacy [Provide a list of the security requirements using the following criteria: A. State the consequences of the following breaches of security in the subject application: Loss or corruption of data Disclosure of secrets or sensitive information Disclosure of privileged/privacy information about individuals Corruption of software or introduction of malware, such as viruses State the type(s) of security required. Include the need for the following as appropriate: Physical security. Access by user role or types. State access control requirements by data attribute. For example, one group of users has permission to view an attribute but not update it while another group of users has permissions to update or view it. State access requirements based on system function. For example, if there is a need to grant access to certain system functions to one group of users, but not to another. For example, "The system shall make Function X available to the System Administrator only". State if there is a need for certification and accreditation of the security measures adopted for this application] The Security Section describes the need to control access to the data. This includes controlling who may view and alter application data. Audit Trail [List the activities recorded in the applications audit trail. For each activity, list the data recorded.] Reliability A. [State the following in this section: State the damage can result from failure of this systemindicate the criticality of the software, such as: Loss of human life Complete or partial loss of the ability to perform a mission-critical function Loss of revenue Loss of employee productivity What is the minimum acceptable level of reliability? B. State required reliability: Mean-Time-Between-Failure is the number of time units the system is operable before the first failure occurs. Mean-Time-To-Failure is the number of time units before the system is operable divided by the number of failures during the time period. Mean-Time-To-Repair is the number of time units required to perform system repair divided by the number of repairs during the time period.] Reliability is the probability that the system processes work correctly and completely without being aborted. Recoverability [Answer the following questions in this section: A. In the event the application is unavailable to users (down) because of a system failure, how soon after the failure is detected must function be restored? B. In the event the database is corrupted, to what level of currency must it be restored? For example The database must be capable of being restored to its condition of no more than 1 hour before the corruption occurred. C. If the processing site (hardware, data, and onsite backup) is destroyed, how soon must the application be able to be restored?] Recoverability is the ability to restore function and data in the event of a failure. System Availability [State the period during which the application must be available to users. For example, The application must be available to users Monday through Friday between the hours of 6:30 a.m. and 5:30 p.m. EST. If the application must be available to users in more than one time zone, state the earliest start time and the latest stop time. Consider daylight savings time, too. Include use peak times. These are times when system unavailability is least acceptable.] System availability is the time when the application must be available for use. Required system availability is used in determining when maintenance may be performed. General Performance [Describe the requirements for the following: A. Response time for queries and updates B. Throughput C. Expected rate of user activity (for example, number of transactions per hour, day, or month, or cyclical periods) Specific performance requirements, related to a specific functional requirement, should be listed with that functional requirement. Capacity [List the required capacities and expected volumes of data in business terms. Do not state capacities in terms of system memory requirements or disk spaceif growth trends or projections are available, provide them] Data Retention [Describe the length of time various forms of data must be retained and the requirements for its destruction. For example, The system shall retain application information for 3 years. Different forms of data include: system documentation, audit records, database records, access records.] Error Handling [Describe system error handling.] Validation Rules [Describe System Validation Rules.] Conventions/Standards [Describe system conventions and standards followed. For example: Microsoft standards are followed for windows, Institute of Electrical and Electronics Engineers (IEEE) for data formats, etc.] APPENDIX A - GLOSSARY [Define terms, acronyms, and abbreviations used in the FRD.]     PAGE  #$,-9?GIJuʿwiXiiwTNT h4aJh4 jh fUmHnHujh4UmHnHuh4aJmHnHuh4mHnHujh%t)Uh%t)hl hl5h%t)mH nH uh/5mH nH uh~5mH nH uhF5mH nH u&hFh%t)5CJ OJQJmH nH u h%t)5CJ OJQJmH nH u h|{5CJ OJQJmH nH u$-./0123456789:;<=>?@ABCDE$a$gdF$a$e8888EFGHIJRhot $$Ifa$ tuvwxy5////$Ifkd$$IflS\D8x (&&&&04 lap(&&&&yz{|}~gaaaa$Ifkd#$$Ifl\D8x04 la~ O ~ gec\ZZZZZZ ! kd$$Ifl\D8x04 la        # $ / 0 J K L M N O R S ^ _ y z { | } ~ ⢗h4aJmHnHuh4mHnHujh fUjh fUjh fUjh fUjh fU h4aJjh fUh4jh4U;      ! " # $ < = W X Y Z [ \ _ ` h i   7 ̷jh fUjh fUjh fUjh4U h4aJh4 jh fUmHnHuh4aJmHnHu j h fUmHnHujh4UmHnHuh4mHnHu5 " \ < x ) l U ] AL8gdv  & F & F  !  ! 7 8 9 : ; < ? @ X Y s t u v w x y z $ % & ' ( ) , - L M g h εΤεj h fUjo h fUj h fU ju h fUmHnHujh4UmHnHuh4aJmHnHuh4mHnHujh fU h4aJh4jh4Uj{h fU3h i j k l o p   3 4 6 R U ] ٺ˯ypyghv mH nH uhB}]mH nH uh9mH nH uhRmH nH uh%t)h%t)mH nH uhmKmH nH ujh%t)UmH nH uh4aJmHnHu j h fUmHnHujh4UmHnHuh4mHnHuji h fU h4aJh4jh4U% ALMU58TILXwxz %')Pbemnwyhz kmμγhMmH nH uhbmH nH uh VmH nH uhmH nH uh?~JmH nH uh$mH nH uhxmH nH uhmH nH uh DmH nH uh%t)h%t)mH nH uhBmH nH u;8TLXzhzmFjl~$a$ & F & F & F  & F  & F'gd?~Jgdgd D & F  & F 4CDEFjkl~ cwg;CDuvէّ{Սsl hvh%t)hvh%t)5hvmH nH uh2zmH nH uhP"hvhmH nH uhumH nH uh21mH nH uh21h0z mH nH uhnmH nH ujc h%t)6UmH nH uh%t)h%t)6mH nH uh0mH nH uh%t)mH nH uh(mH nH u'gD]tuZkd$$If9440T"  0S"4 9af4p$If & F & F vw <>]cw" $ 6 B I W a i !!y!!!"d"}"L%T%`%a%& &&&&۱h3MmH nH uh7KmH nH uh.!mH nH uhlqqh%t)5mH nH uh%t)mH nH uh(mH nH uhP"mH nH uh%t)h(hP"hv hvh2z hvh%t) hvhv;u|tkd$$If940T"0S"4 9af4$If$Iftkdx$$If940T"0S"4 9af4=$Iftkd$$If940T"0S"4 9af4=>dw !!y!~|w||||| & F & F & Fvkd$$If94T0T"0S"4 9af4 y!!!"d"}""#$$L%a%%&#&R&&&0'C'c'2(;) & F# h^gd%t)  & F hgd%t) & F" h^gd%t) h^h` & F & F&"&1&2&Q&R&s&&&&&&&0'A'C'^'b'c'i'p'x''?(L( ) )X)j))9*:*F*****+@+R++;,<,@,A,H,I,,,,,,,2-3-7-8-훟hC^mH nH uh/hC^h%t)h%t)6mH nH uh1>FmH nH uh! mH nH uhn  |`! `p->n ;A HD ) xZ p>ww HxGHGG`y)!;EĠiC !<)VFZ)؆ul)q 8RQT Ƒ2!dِa󳙓={~ݻ20.:$<=*RSf<t/%rRmcga)cy $. 美Iu8zu0LB}4,l(<('8MzT+" `v]csQ]G2Qfb\.Mc_3bNtDK/k 퇲 EI2kKGLn~_oѩṃǾ ۦA6d=yc2F>)"[{}0pRY4Wƚ%-,X(IC5,[?q|1zy &r&_mqMU~>-CFhj/Ѣ*USoeH&ʽ2]ʩr,*WnB}MqT, |E㹽W$=#2a"iˎb*2;QWk: sQf|Xүxֽ0,otMuPF3 _kLnK TUw$ }En)Ǘ_A0n~gVTZپ}5tcTo|\'Ti-(0sx/~ȧ?7a=~&0U;LgH6/O?\5? v#wbx9Oq~nO ͰR{Pk@{&{PRqP.ZDً˟PUr7$?cd' !>un-?vgۉOE҃Ƥ[8zq Qr HJưKPg 痠G`o"7*S|+SX ?Ʀ_]]cK `>5ޅux\7vCmm  .}?J o]G繈0{!X]S"<:ۆM;S(s͝Oqm4>`sYqkzo|~CF~mX1{șfcU#={߫vvU ҷ75,V!c>󽏿Tw%"G!Ba\s涚HH_K?,.1f|/.L1y]l1+Deshpjw#Z)Lq#HW"(vՙVDU5HH?(ְ8LA<(rꄌCX,qx LG"˩KD ,Z$QNhWdK^Jx=34! =b=7x&F 98D=<\aZ !Hp9O^TGϊsx`T爝 ᇜoLOA\oƫxLR.P8ߘ`} #I53|EwDE5hk 6XFMG,qC#$IVsS\iw3v\ qƅhxk0.?C} ,E\1/JwTO\286Jp$jo) Aec1xg#՝Ԑ:Z6厡ܷsku[Iպcc0aD;|ꊙP,G}FBQA~NK.Zc!UvEu0Ot9}?qykX|\e-$KpHvmYo^zmYZ q+[y %g/"7i,^ K X$[Qj]nnپAu\X_鳋6F 4)m-(7|6P&p/LwqAƌ?S]d|m3O!"@u`C|up=nN3,[Vk5˪4;2{Gxrf9SWMwCӯtkӿ{~qӶ|x+=4QoǗkgP7onmeN>0˷}X A}S:T)u¼|hpBײq:e颢y^ĒX6{{90&(.N#9oK F&:{mY##daL݈fFzXSoKp,(OJZQlߢGŽGؑ ڭV4DnЭDvDŽH"rUF$V";JsWÎe>!05밣_k;*AkaE%i5QCVaÎ4(zjxmśG1+TAkuP D$-h%ߘC_U.?#iRIp,.ʛ_=ĿK`]7VO'V͞f?.ARǥeO1G߃.;e[?|f30y)R#[sks-鹠-IZsY%xn@eĨ{-]+,~L_n96|LJOL7ALf$$If!vh55#v#v:V 944  0S",5544 9f4p$$If!vh55#v#v:V 940S"5544 9f4$$If!vh55#v#v:V 940S"5544 9f4$$If!vh55#v#v:V 940S"5544 9f4$$If!vh55#v#v:V 94T0S"5544 9f4'8@8 Normal_HmH sH tH `@` Heading 1,1 heading$ & F x@&5CJL@L Heading 2$ & F<@&5CJL@L Heading 3$ & F<@&5CJL@L Heading 4$ & F<@&5CJD@D Heading 5 & F<@&CJZ@Z Heading 6% <@&^`6CJf@f Heading 7. & F @<@&^` CJOJQJj@j Heading 8. & F `<@&^``6CJOJQJl @l Heading 9. & F `00<@&^0`56CJOJQJDA@D Default Paragraph FontVi@V  Table Normal :V 44 la (k(No List N@NTOC 2 ! x^CJmHnHuNB@N Body Text,bt $xa$CJmHnHuZC@Z Body Text Indent$0^`0a$CJB1@"B List Number  & FCJ@O2@ Bullets$ & FPa$CJ@OB@ Bullet1$ & F xa$CJ:OR: Bullet2  & FxCJRObR Bullet3% & F >x^`>CJPOrP Table Text Bullet & F h <O< Table Text ((CJ<>@< Title$a$5CJ.@. TOC 1xCJNNTOC 3 ! x^CJmHnHu8@8 Header  !CJ.)@. Page Number.. TOC 7 ^8 @8 Footer  !CJFOF Bullet Both & F<<CJ.. TOC 4 !X^XLO"L Bullet2 over" & F $xCJ.. TOC 5 # ^ .. TOC 6 $^.. TOC 8 %x^x.. TOC 9 &@^@000t$-./0123456789:;<=>?@ABCDEFGHIJRhotuvwxyz{|}~ O~"\<x)lU]AL8TLXz h z m F j l ~ gD]tu|=>dwyd}La#R0Cc2 ;!!:"F""""S#f####$7$$.%%(&7&h&''i(((I**K+_++++9,,,--...//8/N//0&0d0e0g0h0j0k0m0n0p0q0z0{0|0}0~000000000000000000000000000000000000000000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000000000000000000000000 00 00U 00 00A 00 008( 080L( 080' 0' 0 00h  00  0 0m 0 0 0  0m 0l 0l  0m 0 0m 0 0m 0g( 0gg000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ( 0gg 00d 0dd0( 00( 000( 00 0dd0y 0dd0 0dd0d0d0d0d0d( 0dd0L0L" 0L" 0L" 0L" 0L 0L# 0L# 0L# 0L# 0L# 0L0L( 0dd0:"( 0dd0"$ "0"% 0"% 0"% 0"% 0"$ 0"0"& 0"& 0"& 0"0"( 0dd0(&0(&0(&0(&0(&( 0dd0(0(0(( 0dd0K+0K+0K+0K+0K+( 0dd0,( 0dd0-0-( 0dd0.( 0 dd0/( 0 dd00000@0I00@0I00@0I00@0I00@0@0@0@0@0@0@0@0I0000000|X    7 h v&8-&88$%'()+-358Ety~ 8u=y!;)(.788 !"#&*,./01246798/KM^z| <XZh8:Xtv %'Lhj0 %%%%%%%%%%%%%%%%%%%%  !    /Xb$f*0&AAtG a](b$趇4a/.1Sƅ*@ 0(  B S  ?H0(  0 f _Toc1975932 _Toc1985359 _Toc1985436 _Toc2658582 _Toc143150771 _Toc533583718 _Toc143150772 _Toc2658584 _Toc143150773 _Toc2658585 _Toc143150774 _Toc2563410 _Toc2658587 _Toc143150775 _Toc143150776 _Toc10010904 _Toc10010905 _Toc10010906 _Toc143150777 _Toc10010907 _Toc143150778 _Toc10010908 _Toc143150779 _Toc10010909 _Toc12350051 _Toc12411477 _Toc143150780 _Toc12350052 _Toc12411478 _Toc143150781 _Toc10010911 _Toc12350053 _Toc12411479 _Toc143150782 _Toc10010912 _Toc12350054 _Toc12411480 _Toc143150783 _Toc10010913 _Toc12350055 _Toc12411481 _Toc143150784 _Toc10010914 _Toc12350056 _Toc12411482 _Toc10010916 _Toc143150785 _Toc10010917 _Toc12350059 _Toc143150786 _Toc10010918 _Toc12350060 _Toc12411486 _Toc10010919 _Toc12350061 _Toc12411487 _Toc10010920 _Toc12350062 _Toc12411488 _Toc10010921 _Toc12350063 _Toc143150787 _Toc10010922 _Toc12350064 _Toc143150788 _Toc10010923 _Toc12350065 _Toc143150789 _Toc10010924 _Toc12350066 _Toc12411492 _Toc10010925 _Toc12350067 _Toc12411493 _Toc10010926 _Toc12350068 _Toc12411494 _Toc10010927 _Toc12350069 _Toc12411495 _Toc10010928 _Toc12350070 _Toc12411496 _Toc10010929 _Toc12350071 _Toc12411497 _Toc10010930 _Toc12350072 _Toc12411498 _Toc10010931 _Toc12350073 _Toc12411499 _Toc10010932 _Toc12350074 _Toc12411500 _Toc10010933 _Toc12350075 _Toc12411501 _Toc10010934 _Toc12350076 _Toc12411502 _Toc143150790UUAA8Lh h m m l l l ggggddyyydddLLL:":":""""(&(&(&(((K+K+K+,,,---...///8/8/8/00   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdeU\KKSLLLLWy y } } } ~~~~kv|||TTTE"E"E""""6&6&6&(((^+^+^+,,,---...///M/M/M/%00GLԄYHLwdILnd///0///09*urn:schemas-microsoft-com:office:smarttagsplace=*urn:schemas-microsoft-com:office:smarttags PlaceType=*urn:schemas-microsoft-com:office:smarttags PlaceName ,e0e0g0g0h0h0j0k0m0n0p0q00000..00e0e0g0g0h0h0j0k0m0n0p0q0000033II  ""QQJJ""#R#;$<$@$A$H$I$$$$$$$2%3%7%8%:%;%(())"*H*Q*Z*_*_*---.i.j.....d0e0e0g0g0h0h0j0k0m0n0p0q0|0|0000e0e0g0g0h0h0j0k0m0n0p0q000000&m"B JE#=u"t9"wΔ6 U  m& )"K _oA }~D^SU9"Btq^$ j&?"`.nN&v4 0c6^g;j>.$w9C6V|GXNb*R qZh/[z5 W],tr  ,j_P` v`"4 elݴ;!i@}l4̚eo| -\u Zgvbx 0|q@~ hh^h`.0^`0o(.P^`P@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........hh^h`o(.hh^h`56CJOJQJo(.hh^h`CJOJQJo(hh^h`)hh^h`56CJOJQJo(.P^`P@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........hh^h`56CJOJQJo(.hh^h`CJOJQJo(P^`P@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........P^`P@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........hh^h`.P^`PB*OJQJo(hh^h`56CJOJQJo(.hh^h`.hh^h`56>*B*CJOJQJo(@@^@`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........hh^h`56CJOJQJo(.P^`P56CJOJQJo()hh^h`56CJOJQJo(.hh^h`56CJOJQJo(.hh^h`.hh^h`56CJOJQJo(. h^ `CJOJQJo(P^`P@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........hh^h`56CJOJQJo(.hh^h`.hh^h`56>*B*CJOJQJo(@@^@`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........P^`P@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........0^`0B*OJQJo( hh^h`OJQJo(hh^h`CJOJQJo(hh^h`.hh^h`56CJOJQJo(.hh^h`.hh^h`56CJOJQJo(.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH' W])"K eov4}lh/[!i0c6v` e }U9"j&E#)"K ,j_A g;j>"tZgvm& 0|qZ|GXN`.w9C"9"wq^$-\ubxb*R U P`q@~&&         a`jCBw0z ! FZwDQb2~6(3T f4.!P"$%t)M ,/0m2}53ABC_C D1>F6JF?~JmK7K3MMm(M{gMP>Q VvXj2Z[B}]+^C^2abHhwh+j=m`nlqqftux2z~>9~od~]pv *1HMzXFl(vb o|RN&Sre0g0j0m0p000A @80P@UnknownGz Times New Roman5Symbol3& z Arial;Wingdings?5 z Courier New"1hb`"&Ch^Z32)-32)-4d//) 2QX?&S6&)Functional Requirements Document Template&                           ! " # $ % Oh+'0H\ ht    ,Functional Requirements Document TemplateHVisit the original Managing Requirements website at: www.jiludwig.com Normal.dot94Microsoft Office Word@ @?@!#@&32)՜.+,0$ px  -/ *Functional Requirements Document Template Title  !"#$%&'()*+,-./0123456789:<=>?@ABCDEFGHIKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry F K&Data ;_1TableJbrWordDocument?tSummaryInformation(DocumentSummaryInformation8CompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q