Heavily Used Configuration describes the degree to which computer resource restrictions influenced the development of the application.
A heavily used operational configuration may require special considerations when designing the application. For example, the user wants to run the application on existing or committed equipment that will be heavily used.
Score As | Descriptions To Determine Degree of Influence |
---|---|
0 | No explicit or implicit operational restrictions are included. |
1 | Operational restrictions do exist, but are less restrictive than a typical application. No special effort is needed to meet the restrictions. |
2 | Stated operational restrictions require special constraints on one piece of the application in the central processor or a dedicated processor. |
3 | Stated operational restrictions require special constraints on one piece of the application in the central processor or a dedicated processor. |
4 | Stated operational restrictions require special constraints on the entire application in the central processor or a dedicated processor. |
5 | In addition, there are special constraints on the application in the distributed components of the system. |
Examples of operational restrictions may include the following (not an exhaustive list):