Deck 3: Use Cases
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/72
Play
Full screen (f)
Deck 3: Use Cases
1
One benefit of the event decomposition technique is that it helps to identify use cases at the right level of detail.
True
2
The analyst begins identifying state events by asking about the specific deadlines that the system must accommodate.
False
3
Another name for a state event is an internal event.
True
4
When a customer buys an item of merchandise using his store credit account,a separate event is required to pay the store.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
5
The event decomposition technique begins by identifying use cases.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
6
The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
7
A state event is an event that occurs when something happens outside the system that triggers the need for processing.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
8
When using the CRUD technique,data ownership by foreign systems is an important consideration.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
9
A state event is a political or governmental activity.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
10
Before using the user goal technique the analyst must first identify and classify all the types of system users.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
11
Real-time systems require the system to react immediately to things that are going on in the environment.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
12
During analysis the analyst should be sure to identify system control events such as the user logging in or out.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
13
CRUD stands for create,reply,update,delete.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
14
One way to determine whether an occurrence is an event or part of the interaction before or after an event is by asking if any long pauses or intervals occur.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
15
The CRUD technique is often used to validate and enhance the list of use cases.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
16
During the interviews in the user goal technique,the analyst should not try to influence the users in discussing their work methods.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
17
The end product of the event decomposition technique is a list of use cases at the right level of analysis.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
18
The CRUD technique is most useful as a cross-check along with other techniques.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
19
When describing an external event,there is no need to worry about the person or thing causing the event.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
20
Temporal events always occur on a fixed date or at a fixed time.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
21
One technique to identify use cases is to ask users what they want to achieve with a particular business procedure.This technique is called the ______ technique.
A)business procedure"
B)event decomposition"
C)workflow"
D)user goal"
A)business procedure"
B)event decomposition"
C)workflow"
D)user goal"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
22
Something that occurs at a specific time and place and should be remember by the system is called a(n)_______.
A)use case"
B)elementary business process"
C)user goal"
D)event"
A)use case"
B)elementary business process"
C)user goal"
D)event"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
23
An event that occurs by reaching a point in time is called a _______ event.
A)internal"
B)external"
C)timed"
D)temporal"
A)internal"
B)external"
C)timed"
D)temporal"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
24
An actor is a person that plays a particular role within a business process.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
25
The even decomposition technique begins by identifying all of the _______.
A)operational users"
B)system users"
C)business events"
D)internal events"
A)operational users"
B)system users"
C)business events"
D)internal events"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
26
Checks or safety procedures are put in place to protect the integrity of the system is referred to as _______.
A)perfect technology assumption"
B)risk control assumption"
C)system controls"
D)technology protection"
A)perfect technology assumption"
B)risk control assumption"
C)system controls"
D)technology protection"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
27
"Customer decides to buy a shirt" is an example of what?
A)An external event"
B)Activity prior to an event"
C)A temporal event"
D)Activity after an event."
A)An external event"
B)Activity prior to an event"
C)A temporal event"
D)Activity after an event."
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
28
State events are also sometimes called _______ events.
A)external"
B)trigger"
C)system"
D)internal"
A)external"
B)trigger"
C)system"
D)internal"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
29
The user goal technique normally begins by identifying,listing,and classifying _______ .
A)the system users"
B)the business events"
C)the business processes"
D)the system stakeholders"
A)the system users"
B)the business events"
C)the business processes"
D)the system stakeholders"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
30
The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question: _______?
A)Is the user finished with the task?"
B)Is the system at rest?"
C)Is all the data input?"
D)Is all the printing completed?"
A)Is the user finished with the task?"
B)Is the system at rest?"
C)Is all the data input?"
D)Is all the printing completed?"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
31
A(n)_______ event occurs when something happens inside the system that triggers the need for processing.
A)logical"
B)state"
C)external"
D)temporal"
A)logical"
B)state"
C)external"
D)temporal"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
32
The source of using the concept of events to define functional requirements was first emphasized with _______ systems.
A)business"
B)operating"
C)real-time"
D)batch"
A)business"
B)operating"
C)real-time"
D)batch"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
33
The type of event that occurs outside of the system is called a(n)_______.
A)outside event"
B)external event"
C)business event"
D)temporal event"
A)outside event"
B)external event"
C)business event"
D)temporal event"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
34
An occurrence at a specific time and place,which can be described and is worth remember,is called a(n)_______.
A)business process"
B)event"
C)requirement"
D)business transaction"
A)business process"
B)event"
C)requirement"
D)business transaction"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
35
One technique used to help decide which events apply to controls is to assume that technology is perfect.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
36
In a use case diagram,and actor must always be a person.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is an example of a temporal event?
A)Month end billing is started"
B)User logs into the system"
C)Customer updates address"
D)Inventory reorder occurs"
A)Month end billing is started"
B)User logs into the system"
C)Customer updates address"
D)Inventory reorder occurs"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is an example of a state event?
A)A customer places an order"
B)It is time to send a late notice"
C)Management checks order status"
D)Inventory reorder point is reached"
A)A customer places an order"
B)It is time to send a late notice"
C)Management checks order status"
D)Inventory reorder point is reached"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
39
Another name for the "includes" relationship is the "uses" relationship.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
40
Each use case is used by only one actor.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
41
In UML notation,the guillemets character is used to show what kind of notation?
A)classes"
B)subordinates"
C)relationships"
D)stereotypes"
A)classes"
B)subordinates"
C)relationships"
D)stereotypes"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
42
Checks and safety procedures that are put in place to protect the integrity of the system are called _______ .
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
43
The technique used to identify use cases based on external,temporal,and state events is the _______.
A)user goals technique"
B)list of nouns technique"
C)event decomposition technique"
D)CRUD technique"
A)user goals technique"
B)list of nouns technique"
C)event decomposition technique"
D)CRUD technique"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
44
In UML notation the includes relationship connects two use cases.The use case that is "included" use case is the one which _______ .
A)is connected to the tail of an arrow"
B)is connected to the head of an arrow"
C)cannot be determined"
D)is not connected to an actor"
A)is connected to the tail of an arrow"
B)is connected to the head of an arrow"
C)cannot be determined"
D)is not connected to an actor"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
45
Two primary techniques to identify use cases are _______ and _______. (Choose two)
A)user goal technique"
B)CRUD technique"
C)system response technique"
D)event decomposition technique"
E)business function technique"
F)user procedure technique
A)user goal technique"
B)CRUD technique"
C)system response technique"
D)event decomposition technique"
E)business function technique"
F)user procedure technique
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
46
An important step in using the CRUD technique is to _______.
A)identify the system controls"
B)identify the external agents"
C)identify the business events"
D)identify the data entities"
A)identify the system controls"
B)identify the external agents"
C)identify the business events"
D)identify the data entities"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
47
An external agent or person that interacts with the system by supplying data is called a(n)_______.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
48
The _______ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions.
A)perfect technology assumption"
B)ideal technology assumptions"
C)perfect processing control"
D)ideal processing control"
A)perfect technology assumption"
B)ideal technology assumptions"
C)perfect processing control"
D)ideal processing control"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
49
A technique that is best used to validate the list of existing use cases is called the _______ technique.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
50
A one sentence description of a use case is called a(n)_______.
A)brief use case description"
B)short use case description"
C)intermediate use case description"
D)use case description"
A)brief use case description"
B)short use case description"
C)intermediate use case description"
D)use case description"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
51
The _______ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
52
An activity that the system performs in response to a user request is called a(n)_______.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
53
The UML notation for the "includes" relationship is a(n)_______.
A)a solid arrow"
B)a dashed arrow"
C)a straight line"
D)a dashed line"
A)a solid arrow"
B)a dashed arrow"
C)a straight line"
D)a dashed line"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
54
A(n)_______ is a task that is performed by one person in response to a business event,adds value,and leaves the system in a stable condition.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
55
A(n)_______ is something that occurs at a specific time and place and can be precisely measured.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
56
An event that occurs simply by reaching a point in time is called a(n)_______ event.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
57
In using the event decomposition technique,which of the following is NOT a type of event that is considered?
A)Event initiated by an external agent"
B)Event initiated by a point in time"
C)Event initiated by a system change"
D)Event initiated by a user login"
A)Event initiated by an external agent"
B)Event initiated by a point in time"
C)Event initiated by a system change"
D)Event initiated by a user login"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
58
The boundary between the automated portion of the system and the users of the system is called the _______.
A)software boundary"
B)application boundary"
C)system boundary"
D)automation boundary"
A)software boundary"
B)application boundary"
C)system boundary"
D)automation boundary"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
59
The level of analysis to use when identifying user goals is the _______.
A)external event level"
B)elementary business process level"
C)temporal event level"
D)elementary activity level"
A)external event level"
B)elementary business process level"
C)temporal event level"
D)elementary activity level"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
60
The system's reaction to an event is called a(n)_______ .
A)system process"
B)use case"
C)activity"
D)system requirement"
A)system process"
B)use case"
C)activity"
D)system requirement"
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
61
The _______ is the dividing line between the computerized portion of the system and the users who operate the system.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
62
An acronym for updating,deleting,reporting and creating of data is called _______.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
63
List the steps required to develop a Use Case Diagram.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
64
The _______ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
65
List the four steps for using the CRUD technique.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
66
An event that occurs outside the system is called a(n)_______.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
67
List three types of events and provide descriptions for each.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
68
Describe two techniques for identifying use cases.Which is the most comprehensive approach?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
69
The _______ technique is a technique to identify use cases by determining the external business events to which the system must respond.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
70
List the steps for using the event decomposition technique.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
71
A UML model that is used to show use cases and their relationships to actors is called a(n)_______.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
72
An event that occurs when something inside the system triggers the need for processing,but usually as a consequence of external activity is called a _______ event.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck