Deck 3: Identifying User Stories and Use Cases
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/82
Play
Full screen (f)
Deck 3: Identifying User Stories and Use Cases
1
Real-time systems require the system to react immediately to things that are going on in the environment.
True
2
During analysis the analyst should be sure to identify system control events such as the user logging in or out.
False
3
During the interviews in the user goal technique,the analyst should not try to influence the users in discussing their work methods.
False
4
Another name for a state event is an internal event.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
5
The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
6
One benefit of the event decomposition technique is that it helps to identify use cases at the right level of detail.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
7
Each use case is used by only one actor.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
8
One technique used to help decide which events apply to controls is to assume that technology is perfect.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
9
Temporal events always occur on a fixed date or at a fixed time.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
10
The event decomposition technique begins by identifying use cases.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
11
The end product of the event decomposition technique is a list of use cases at the right level of analysis.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
12
One way to determine whether an occurrence is an event or part of the interaction before or after an event is by asking if any long pauses or intervals occur.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
13
The analyst begins identifying state events by asking about the specific deadlines that the system must accommodate.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
14
Before using the user goal technique the analyst must first identify and classify all the types of system users.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
15
In a use case diagram,and actor must always be a person.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
16
A state event is an event that occurs when something happens outside the system that triggers the need for processing.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
17
A state event is a political or governmental activity.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
18
An actor is a person that plays a particular role within a business process.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
19
When describing an external event,there is no need to worry about the person or thing causing the event.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
20
When a customer buys an item of merchandise using his store credit account,a separate event is required to pay the store.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
21
The acceptance criteria can be used to generate test data.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
22
One technique to identify use cases is to ask users what they want to achieve with a particular business procedure. This technique is called the ______ technique.
A)business procedure
B)event decomposition
C)workflow
D)user goal
A)business procedure
B)event decomposition
C)workflow
D)user goal
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is an example of a temporal event?
A)Month end billing is started
B)User logs into the system
C)Customer updates address
D)Inventory reorder occurs
A)Month end billing is started
B)User logs into the system
C)Customer updates address
D)Inventory reorder occurs
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
24
Another name for the "includes" relationship is the "uses" relationship.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
25
The acceptance criteria for a user story can be considered a contract between the developers and users.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
26
A customer wants to buy a new shirt can be considered an external event.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
27
The end of an event or a user case is when the system is at rest in a consistent state.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
28
The even decomposition technique begins by identifying all of the _______.
A)operational users
B)system users
C)business events
D)internal events
A)operational users
B)system users
C)business events
D)internal events
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
29
The source of using the concept of events to define functional requirements was first emphasized with _______ systems.
A)business
B)operating
C)real-time
D)batch
A)business
B)operating
C)real-time
D)batch
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
30
The automation boundary is the same thing as the system boundary.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
31
The beginning step in defining use cases is always to obtain a user story.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
32
The type of event that occurs outside of the system is called a(n)_______.
A)outside event
B)external event
C)business event
D)temporal event
A)outside event
B)external event
C)business event
D)temporal event
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
33
Highly Agile methodologies favor detailed use case documentation over sketchy user stories.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
34
An occurrence at a specific time and place,which can be described and is worth remember,is called a(n)_______.
A)business process
B)event
C)requirement
D)business transaction
A)business process
B)event
C)requirement
D)business transaction
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
35
Something that occurs at a specific time and place and should be remember by the system is called a(n)_______.
A)use case
B)elementary business process
C)user goal
D)event
A)use case
B)elementary business process
C)user goal
D)event
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
36
The user goal technique normally begins by identifying,listing,and classifying _______ .
A)the system users
B)the business events
C)the business processes
D)the system stakeholders
A)the system users
B)the business events
C)the business processes
D)the system stakeholders
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is an example of a state event?
A)A customer places an order
B)It is time to send a late notice
C)Management checks order status
D)Inventory reorder point is reached
A)A customer places an order
B)It is time to send a late notice
C)Management checks order status
D)Inventory reorder point is reached
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
38
A(n)_______ event occurs when something happens inside the system that triggers the need for processing.
A)logical
B)state
C)external
D)temporal
A)logical
B)state
C)external
D)temporal
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
39
State events are also sometimes called _______ events.
A)external
B)trigger
C)system
D)internal
A)external
B)trigger
C)system
D)internal
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
40
An event that occurs by reaching a point in time is called a _______ event.
A)internal
B)external
C)timed
D)temporal
A)internal
B)external
C)timed
D)temporal
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
41
In UML notation the includes relationship connects two use cases. The use case that is "included" use case is the one which _______ .
A)is connected to the tail of an arrow
B)is connected to the head of an arrow
C)cannot be determined
D)is not connected to an actor
A)is connected to the tail of an arrow
B)is connected to the head of an arrow
C)cannot be determined
D)is not connected to an actor
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
42
An activity that the system performs in response to a user request is called a(n)_______.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
43
"Customer decides to buy a shirt" is an example of what?
A)An external event
B)Activity prior to an event
C)A temporal event
D)Activity after an event.
A)An external event
B)Activity prior to an event
C)A temporal event
D)Activity after an event.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
44
User stories are different than use cases in what way?
A)Different users identify them
B)Differ in identified functions required
C)Different focus
D)Differ in the amount of detail captured
A)Different users identify them
B)Differ in identified functions required
C)Different focus
D)Differ in the amount of detail captured
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
45
The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question: _______?
A)Is the user finished with the task?
B)Is the system at rest?
C)Is all the data input?
D)Is all the printing completed?
A)Is the user finished with the task?
B)Is the system at rest?
C)Is all the data input?
D)Is all the printing completed?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
46
A(n)_______ is something that occurs at a specific time and place and can be precisely measured.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
47
"As a student,I want to register for a class in order to fulfill education requirements" is an example of a(n)_________________.
A)use case
B)user story
C)external event
D)elementary business process
A)use case
B)user story
C)external event
D)elementary business process
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
48
The _______ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions.
A)perfect technology assumption
B)ideal technology assumptions
C)perfect processing control
D)ideal processing control
A)perfect technology assumption
B)ideal technology assumptions
C)perfect processing control
D)ideal processing control
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
49
The level of analysis to use when identifying user goals is the _______.
A)external event level
B)elementary business process level
C)temporal event level
D)elementary activity level
A)external event level
B)elementary business process level
C)temporal event level
D)elementary activity level
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
50
Checks or safety procedures are put in place to protect the integrity of the system is referred to as _______.
A)perfect technology assumption
B)risk control assumption
C)system controls
D)technology protection
A)perfect technology assumption
B)risk control assumption
C)system controls
D)technology protection
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
51
Two primary techniques to identify use cases are _______ and _______.(Choose two)
A)user goal technique
B)CRUD technique
C)system response technique
D)event decomposition technique
E)business function technique
F)user procedure technique
A)user goal technique
B)CRUD technique
C)system response technique
D)event decomposition technique
E)business function technique
F)user procedure technique
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
52
The technique used to identify use cases based on external,temporal,and state events is the _______.
A)user goals technique
B)list of nouns technique
C)event decomposition technique
D)CRUD technique
A)user goals technique
B)list of nouns technique
C)event decomposition technique
D)CRUD technique
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
53
In UML notation,the guillemets character is used to show what kind of notation?
A)classes
B)subordinates
C)relationships
D)stereotypes
A)classes
B)subordinates
C)relationships
D)stereotypes
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
54
The system's reaction to an event is called a(n)_______ .
A)system process
B)use case
C)activity
D)system requirement
A)system process
B)use case
C)activity
D)system requirement
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
55
A(n)_______ is a task that is performed by one person in response to a business event,adds value,and leaves the system in a stable condition.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
56
In using the event decomposition technique,which of the following is NOT a type of event that is considered?
A)Event initiated by an external agent
B)Event initiated by a point in time
C)Event initiated by a system change
D)Event initiated by a user login
A)Event initiated by an external agent
B)Event initiated by a point in time
C)Event initiated by a system change
D)Event initiated by a user login
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
57
Acceptance criteria are usually associated with __________.
A)system controls
B)use cases
C)user stories
D)elementary business events
A)system controls
B)use cases
C)user stories
D)elementary business events
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
58
The UML notation for the "includes" relationship is a(n)_______.
A)a solid arrow
B)a dashed arrow
C)a straight line
D)a dashed line
A)a solid arrow
B)a dashed arrow
C)a straight line
D)a dashed line
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
59
The boundary between the automated portion of the system and the users of the system is called the _______.
A)software boundary
B)application boundary
C)system boundary
D)automation boundary
A)software boundary
B)application boundary
C)system boundary
D)automation boundary
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
60
A one sentence description of a use case is called a(n)_______.
A)brief use case description
B)short use case description
C)intermediate use case description
D)use case description
A)brief use case description
B)short use case description
C)intermediate use case description
D)use case description
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
61
An external agent or person that interacts with the system by supplying data is called a(n)_______.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
62
An event that occurs simply by reaching a point in time is called a(n)_______ ______.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
63
The standard template for a user story is "As a <______ _____> I want to so that ". Fill in the blank.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
64
List three types of events and provide descriptions for each.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
65
A diagram that illustrates actors and their relationships to the functions provided by the system is called a(n) ____ ____ _____.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
66
List the steps for using the event decomposition technique.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
67
A short sentence used by an end user that states what he/she does as part of his/her work is called a _______ _________.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
68
Another name for a state event is a(n) ______ _____.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
69
An event that occurs when something inside the system triggers the need for processing,but usually as a consequence of external activity is called a _______ event.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
70
The _______ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
71
The final part of a user story is the ______ ______,which indicates the features that must be present.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
72
A relationship between use cases in which one use case is used by another use case is called the _________ _______.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
73
An event that occurs outside the system is called a(n)_______.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
74
The _______ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
75
The _______ technique is a technique to identify use cases by determining the external business events to which the system must respond.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
76
The _______ is the dividing line between the computerized portion of the system and the users who operate the system.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
77
Checks and safety procedures that are put in place to protect the integrity of the system are called _______ ______ .
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
78
List the steps required to develop a Use Case Diagram.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
79
A UML model that is used to show use cases and their relationships to actors is called a(n)_______.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
80
Features of a particular user story that must be present in the final system are called _________.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck