Deck 3: Use Cases

ملء الشاشة (f)
exit full mode
سؤال
One benefit of the event decomposition technique is that it helps to identify use cases at the right level of detail.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The analyst begins identifying state events by asking about the specific deadlines that the system must accommodate.
سؤال
Another name for a state event is an internal event.
سؤال
When a customer buys an item of merchandise using his store credit account,a separate event is required to pay the store.
سؤال
The event decomposition technique begins by identifying use cases.
سؤال
The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.
سؤال
A state event is an event that occurs when something happens outside the system that triggers the need for processing.
سؤال
When using the CRUD technique,data ownership by foreign systems is an important consideration.
سؤال
A state event is a political or governmental activity.
سؤال
Before using the user goal technique the analyst must first identify and classify all the types of system users.
سؤال
Real-time systems require the system to react immediately to things that are going on in the environment.
سؤال
During analysis the analyst should be sure to identify system control events such as the user logging in or out.
سؤال
CRUD stands for create,reply,update,delete.
سؤال
One way to determine whether an occurrence is an event or part of the interaction before or after an event is by asking if any long pauses or intervals occur.
سؤال
The CRUD technique is often used to validate and enhance the list of use cases.
سؤال
During the interviews in the user goal technique,the analyst should not try to influence the users in discussing their work methods.
سؤال
The end product of the event decomposition technique is a list of use cases at the right level of analysis.
سؤال
The CRUD technique is most useful as a cross-check along with other techniques.
سؤال
When describing an external event,there is no need to worry about the person or thing causing the event.
سؤال
Temporal events always occur on a fixed date or at a fixed time.
سؤال
One technique to identify use cases is to ask users what they want to achieve with a particular business procedure.This technique is called the ______ technique.

A)business procedure"
B)event decomposition"
C)workflow"
D)user goal"
سؤال
Something that occurs at a specific time and place and should be remember by the system is called a(n)_______.

A)use case"
B)elementary business process"
C)user goal"
D)event"
سؤال
An event that occurs by reaching a point in time is called a _______ event.

A)internal"
B)external"
C)timed"
D)temporal"
سؤال
An actor is a person that plays a particular role within a business process.
سؤال
The even decomposition technique begins by identifying all of the _______.

A)operational users"
B)system users"
C)business events"
D)internal events"
سؤال
Checks or safety procedures are put in place to protect the integrity of the system is referred to as _______.

A)perfect technology assumption"
B)risk control assumption"
C)system controls"
D)technology protection"
سؤال
"Customer decides to buy a shirt" is an example of what?

A)An external event"
B)Activity prior to an event"
C)A temporal event"
D)Activity after an event."
سؤال
State events are also sometimes called _______ events.

A)external"
B)trigger"
C)system"
D)internal"
سؤال
The user goal technique normally begins by identifying,listing,and classifying _______ .

A)the system users"
B)the business events"
C)the business processes"
D)the system stakeholders"
سؤال
The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question: _______?

A)Is the user finished with the task?"
B)Is the system at rest?"
C)Is all the data input?"
D)Is all the printing completed?"
سؤال
A(n)_______ event occurs when something happens inside the system that triggers the need for processing.

A)logical"
B)state"
C)external"
D)temporal"
سؤال
The source of using the concept of events to define functional requirements was first emphasized with _______ systems.

A)business"
B)operating"
C)real-time"
D)batch"
سؤال
The type of event that occurs outside of the system is called a(n)_______.

A)outside event"
B)external event"
C)business event"
D)temporal event"
سؤال
An occurrence at a specific time and place,which can be described and is worth remember,is called a(n)_______.

A)business process"
B)event"
C)requirement"
D)business transaction"
سؤال
One technique used to help decide which events apply to controls is to assume that technology is perfect.
سؤال
In a use case diagram,and actor must always be a person.
سؤال
Which of the following is an example of a temporal event?

A)Month end billing is started"
B)User logs into the system"
C)Customer updates address"
D)Inventory reorder occurs"
سؤال
Which of the following is an example of a state event?

A)A customer places an order"
B)It is time to send a late notice"
C)Management checks order status"
D)Inventory reorder point is reached"
سؤال
Another name for the "includes" relationship is the "uses" relationship.
سؤال
Each use case is used by only one actor.
سؤال
In UML notation,the guillemets character is used to show what kind of notation?

A)classes"
B)subordinates"
C)relationships"
D)stereotypes"
سؤال
Checks and safety procedures that are put in place to protect the integrity of the system are called _______ .
سؤال
The technique used to identify use cases based on external,temporal,and state events is the _______.

A)user goals technique"
B)list of nouns technique"
C)event decomposition technique"
D)CRUD technique"
سؤال
In UML notation the includes relationship connects two use cases.The use case that is "included" use case is the one which _______ .

A)is connected to the tail of an arrow"
B)is connected to the head of an arrow"
C)cannot be determined"
D)is not connected to an actor"
سؤال
Two primary techniques to identify use cases are _______ and _______. (Choose two)

A)user goal technique"
B)CRUD technique"
C)system response technique"
D)event decomposition technique"
E)business function technique"
F)user procedure technique
سؤال
An important step in using the CRUD technique is to _______.

A)identify the system controls"
B)identify the external agents"
C)identify the business events"
D)identify the data entities"
سؤال
An external agent or person that interacts with the system by supplying data is called a(n)_______.
سؤال
The _______ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions.

A)perfect technology assumption"
B)ideal technology assumptions"
C)perfect processing control"
D)ideal processing control"
سؤال
A technique that is best used to validate the list of existing use cases is called the _______ technique.
سؤال
A one sentence description of a use case is called a(n)_______.

A)brief use case description"
B)short use case description"
C)intermediate use case description"
D)use case description"
سؤال
The _______ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions.
سؤال
An activity that the system performs in response to a user request is called a(n)_______.
سؤال
The UML notation for the "includes" relationship is a(n)_______.

A)a solid arrow"
B)a dashed arrow"
C)a straight line"
D)a dashed line"
سؤال
A(n)_______ is a task that is performed by one person in response to a business event,adds value,and leaves the system in a stable condition.
سؤال
A(n)_______ is something that occurs at a specific time and place and can be precisely measured.
سؤال
An event that occurs simply by reaching a point in time is called a(n)_______ event.
سؤال
In using the event decomposition technique,which of the following is NOT a type of event that is considered?

A)Event initiated by an external agent"
B)Event initiated by a point in time"
C)Event initiated by a system change"
D)Event initiated by a user login"
سؤال
The boundary between the automated portion of the system and the users of the system is called the _______.

A)software boundary"
B)application boundary"
C)system boundary"
D)automation boundary"
سؤال
The level of analysis to use when identifying user goals is the _______.

A)external event level"
B)elementary business process level"
C)temporal event level"
D)elementary activity level"
سؤال
The system's reaction to an event is called a(n)_______ .

A)system process"
B)use case"
C)activity"
D)system requirement"
سؤال
The _______ is the dividing line between the computerized portion of the system and the users who operate the system.
سؤال
An acronym for updating,deleting,reporting and creating of data is called _______.
سؤال
List the steps required to develop a Use Case Diagram.
سؤال
The _______ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.
سؤال
List the four steps for using the CRUD technique.
سؤال
An event that occurs outside the system is called a(n)_______.
سؤال
List three types of events and provide descriptions for each.
سؤال
Describe two techniques for identifying use cases.Which is the most comprehensive approach?
سؤال
The _______ technique is a technique to identify use cases by determining the external business events to which the system must respond.
سؤال
List the steps for using the event decomposition technique.
سؤال
A UML model that is used to show use cases and their relationships to actors is called a(n)_______.
سؤال
An event that occurs when something inside the system triggers the need for processing,but usually as a consequence of external activity is called a _______ event.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/72
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Use Cases
1
One benefit of the event decomposition technique is that it helps to identify use cases at the right level of detail.
True
2
The analyst begins identifying state events by asking about the specific deadlines that the system must accommodate.
False
3
Another name for a state event is an internal event.
True
4
When a customer buys an item of merchandise using his store credit account,a separate event is required to pay the store.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
5
The event decomposition technique begins by identifying use cases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
6
The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
7
A state event is an event that occurs when something happens outside the system that triggers the need for processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
8
When using the CRUD technique,data ownership by foreign systems is an important consideration.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
9
A state event is a political or governmental activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
10
Before using the user goal technique the analyst must first identify and classify all the types of system users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
11
Real-time systems require the system to react immediately to things that are going on in the environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
12
During analysis the analyst should be sure to identify system control events such as the user logging in or out.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
13
CRUD stands for create,reply,update,delete.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
14
One way to determine whether an occurrence is an event or part of the interaction before or after an event is by asking if any long pauses or intervals occur.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
15
The CRUD technique is often used to validate and enhance the list of use cases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
16
During the interviews in the user goal technique,the analyst should not try to influence the users in discussing their work methods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
17
The end product of the event decomposition technique is a list of use cases at the right level of analysis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
18
The CRUD technique is most useful as a cross-check along with other techniques.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
19
When describing an external event,there is no need to worry about the person or thing causing the event.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
20
Temporal events always occur on a fixed date or at a fixed time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
21
One technique to identify use cases is to ask users what they want to achieve with a particular business procedure.This technique is called the ______ technique.

A)business procedure"
B)event decomposition"
C)workflow"
D)user goal"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
22
Something that occurs at a specific time and place and should be remember by the system is called a(n)_______.

A)use case"
B)elementary business process"
C)user goal"
D)event"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
23
An event that occurs by reaching a point in time is called a _______ event.

A)internal"
B)external"
C)timed"
D)temporal"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
24
An actor is a person that plays a particular role within a business process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
25
The even decomposition technique begins by identifying all of the _______.

A)operational users"
B)system users"
C)business events"
D)internal events"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
26
Checks or safety procedures are put in place to protect the integrity of the system is referred to as _______.

A)perfect technology assumption"
B)risk control assumption"
C)system controls"
D)technology protection"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
27
"Customer decides to buy a shirt" is an example of what?

A)An external event"
B)Activity prior to an event"
C)A temporal event"
D)Activity after an event."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
28
State events are also sometimes called _______ events.

A)external"
B)trigger"
C)system"
D)internal"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
29
The user goal technique normally begins by identifying,listing,and classifying _______ .

A)the system users"
B)the business events"
C)the business processes"
D)the system stakeholders"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
30
The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question: _______?

A)Is the user finished with the task?"
B)Is the system at rest?"
C)Is all the data input?"
D)Is all the printing completed?"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
31
A(n)_______ event occurs when something happens inside the system that triggers the need for processing.

A)logical"
B)state"
C)external"
D)temporal"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
32
The source of using the concept of events to define functional requirements was first emphasized with _______ systems.

A)business"
B)operating"
C)real-time"
D)batch"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
33
The type of event that occurs outside of the system is called a(n)_______.

A)outside event"
B)external event"
C)business event"
D)temporal event"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
34
An occurrence at a specific time and place,which can be described and is worth remember,is called a(n)_______.

A)business process"
B)event"
C)requirement"
D)business transaction"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
35
One technique used to help decide which events apply to controls is to assume that technology is perfect.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
36
In a use case diagram,and actor must always be a person.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following is an example of a temporal event?

A)Month end billing is started"
B)User logs into the system"
C)Customer updates address"
D)Inventory reorder occurs"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following is an example of a state event?

A)A customer places an order"
B)It is time to send a late notice"
C)Management checks order status"
D)Inventory reorder point is reached"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
39
Another name for the "includes" relationship is the "uses" relationship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
40
Each use case is used by only one actor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
41
In UML notation,the guillemets character is used to show what kind of notation?

A)classes"
B)subordinates"
C)relationships"
D)stereotypes"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
42
Checks and safety procedures that are put in place to protect the integrity of the system are called _______ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
43
The technique used to identify use cases based on external,temporal,and state events is the _______.

A)user goals technique"
B)list of nouns technique"
C)event decomposition technique"
D)CRUD technique"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
44
In UML notation the includes relationship connects two use cases.The use case that is "included" use case is the one which _______ .

A)is connected to the tail of an arrow"
B)is connected to the head of an arrow"
C)cannot be determined"
D)is not connected to an actor"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
45
Two primary techniques to identify use cases are _______ and _______. (Choose two)

A)user goal technique"
B)CRUD technique"
C)system response technique"
D)event decomposition technique"
E)business function technique"
F)user procedure technique
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
46
An important step in using the CRUD technique is to _______.

A)identify the system controls"
B)identify the external agents"
C)identify the business events"
D)identify the data entities"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
47
An external agent or person that interacts with the system by supplying data is called a(n)_______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
48
The _______ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions.

A)perfect technology assumption"
B)ideal technology assumptions"
C)perfect processing control"
D)ideal processing control"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
49
A technique that is best used to validate the list of existing use cases is called the _______ technique.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
50
A one sentence description of a use case is called a(n)_______.

A)brief use case description"
B)short use case description"
C)intermediate use case description"
D)use case description"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
51
The _______ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
52
An activity that the system performs in response to a user request is called a(n)_______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
53
The UML notation for the "includes" relationship is a(n)_______.

A)a solid arrow"
B)a dashed arrow"
C)a straight line"
D)a dashed line"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
54
A(n)_______ is a task that is performed by one person in response to a business event,adds value,and leaves the system in a stable condition.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
55
A(n)_______ is something that occurs at a specific time and place and can be precisely measured.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
56
An event that occurs simply by reaching a point in time is called a(n)_______ event.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
57
In using the event decomposition technique,which of the following is NOT a type of event that is considered?

A)Event initiated by an external agent"
B)Event initiated by a point in time"
C)Event initiated by a system change"
D)Event initiated by a user login"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
58
The boundary between the automated portion of the system and the users of the system is called the _______.

A)software boundary"
B)application boundary"
C)system boundary"
D)automation boundary"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
59
The level of analysis to use when identifying user goals is the _______.

A)external event level"
B)elementary business process level"
C)temporal event level"
D)elementary activity level"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
60
The system's reaction to an event is called a(n)_______ .

A)system process"
B)use case"
C)activity"
D)system requirement"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
61
The _______ is the dividing line between the computerized portion of the system and the users who operate the system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
62
An acronym for updating,deleting,reporting and creating of data is called _______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
63
List the steps required to develop a Use Case Diagram.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
64
The _______ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
65
List the four steps for using the CRUD technique.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
66
An event that occurs outside the system is called a(n)_______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
67
List three types of events and provide descriptions for each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
68
Describe two techniques for identifying use cases.Which is the most comprehensive approach?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
69
The _______ technique is a technique to identify use cases by determining the external business events to which the system must respond.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
70
List the steps for using the event decomposition technique.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
71
A UML model that is used to show use cases and their relationships to actors is called a(n)_______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
72
An event that occurs when something inside the system triggers the need for processing,but usually as a consequence of external activity is called a _______ event.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.