Evaluation of the product:
The finished product has been thoroughly tested by a tester - the client, as well as many outside
occasional testers, examined against the success criteria and sent to the client. A detailed, interim
feedback from the client was obtained and taken into consideration while applying changes to the
beta version of the product - see Appendix 2. Thereafter, a final interview with the client was
conducted during which the client examined and evaluated the product against the success criteria
(Appendix 3). Despite some minor negligence, the result was exceptionally successful. The product
complied with all the success criteria as follows:
Success criteria Result Additional comment
(if needed)
1. The graphical interface of the Fully met
product is a transparent,
symmetric website
2. The customers can register Fully met
to the site
3. The validity of users' input is Fully met Except for the presumptuously
checked safe administrator's inputs
4. The sanity of users' input is Fully met
ensured
5. The users' e-mails are Fully met The confirmation e-mails are
confirmed considered spam by the most
of the standard mail boxes
6. An ability to encrypt personal Fully met The messages could potentially
data of users be encrypted, although the
most of the standard
communicators do not hash it
either
7. The customer's level of Fully met
access is recognised after
logging in
8. The Navigation Bar of the Fully met
site contains working and
visible links
9. The Foot of the site contains Fully met
client's name and social media
links
10. The inputs are filtered to Fully met
prevent MySQL injection
11. The users are examined to Fully met
verify if they are not bots
12. The customers' passwords Fully met
are hashed
13. The current time is Fully met