Deck 3: Identifying User Stories and Use Cases

Full screen (f)
exit full mode
Question
Real-time systems require the system to react immediately to things that are going on in the environment.​
Use Space or
up arrow
down arrow
to flip the card.
Question
During analysis the analyst should be sure to identify system control events such as the user logging in or out.​
Question
During the interviews in the user goal technique,the analyst should not try to influence the users in discussing their work methods.​
Question
Another name for a state event is an internal event.​
Question
The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.​
Question
One benefit of the event decomposition technique is that it helps to identify use cases at the right level of detail.​
Question
Each use case is used by only one actor.​
Question
One technique used to help decide which events apply to controls is to assume that technology is perfect.​
Question
Temporal events always occur on a fixed date or at a fixed time.​
Question
The event decomposition technique begins by identifying use cases.​
Question
The end product of the event decomposition technique is a list of use cases at the right level of analysis.​
Question
One way to determine whether an occurrence is an event or part of the interaction before or after an event is by asking if any long pauses or intervals occur.​
Question
The analyst begins identifying state events by asking about the specific deadlines that the system must accommodate.​
Question
Before using the user goal technique the analyst must first identify and classify all the types of system users.​
Question
In a use case diagram,and actor must always be a person.​
Question
A state event is an event that occurs when something happens outside the system that triggers the need for processing.​
Question
A state event is a political or governmental activity.​
Question
An actor is a person that plays a particular role within a business process.​
Question
When describing an external event,there is no need to worry about the person or thing causing the event.​
Question
When a customer buys an item of merchandise using his store credit account,a separate event is required to pay the store.​
Question
The acceptance criteria can be used to generate test data.​
Question
One technique to identify use cases is to ask users what they want to achieve with a particular business procedure. This technique is called the ______ technique.​

A)business procedure
B)event decomposition
C)​workflow
D)​user goal
Question
Which of the following is an example of a temporal event?​

A)Month end billing is started
B)​User logs into the system
C)Customer updates address
D)​Inventory reorder occurs
Question
Another name for the "includes" relationship is the "uses" relationship.​
Question
The acceptance criteria for a user story can be considered a contract between the developers and users.​
Question
A customer wants to buy a new shirt can be considered an external event.​
Question
The end of an event or a user case is when the system is at rest in a consistent state.​
Question
The even decomposition technique begins by identifying all of the _______.​

A)operational users
B)​system users
C)business events
D)​internal events
Question
The source of using the concept of events to define functional requirements was first emphasized with _______ systems.​

A)business
B)​operating
C)real-time
D)​batch
Question
The automation boundary is the same thing as the system boundary.​
Question
The beginning step in defining use cases is always to obtain a user story.​
Question
The type of event that occurs outside of the system is called a(n)_______.​

A)outside event
B)​external event
C)​business event
D)​temporal event
Question
Highly Agile methodologies favor detailed use case documentation over sketchy user stories.​
Question
An occurrence at a specific time and place,which can be described and is worth remember,is called a(n)_______.​

A)business process
B)event
C)requirement
D)business transaction
Question
Something that occurs at a specific time and place and should be remember by the system is called a(n)_______.​

A)use case
B)elementary business process
C)user goal
D)event
Question
The user goal technique normally begins by identifying,listing,and classifying _______ .​

A)the system users
B)the business events
C)the business processes
D)​the system stakeholders
Question
Which of the following is an example of a state event?​

A)A customer places an order
B)​It is time to send a late notice
C)​Management checks order status
D)Inventory reorder point is reached
Question
A(n)_______ event occurs when something happens inside the system that triggers the need for processing.​

A)logical
B)​state
C)external
D)temporal
Question
State events are also sometimes called _______ events.​

A)external
B)trigger
C)​system
D)​internal
Question
An event that occurs by reaching a point in time is called a _______ event.​

A)internal
B)external
C)​timed
D)temporal
Question
In UML notation the includes relationship connects two use cases. The use case that is "included" use case is the one which _______ .​

A)is connected to the tail of an arrow
B)​is connected to the head of an arrow
C)​cannot be determined
D)is not connected to an actor
Question
An activity that the system performs in response to a user request is called a(n)_______.
Question
​"Customer decides to buy a shirt" is an example of what?

A)An external event
B)​Activity prior to an event
C)​A temporal event
D)​Activity after an event.
Question
User stories are different than use cases in what way?

A)Different users identify them
B)​Differ in identified functions required
C)​Different focus
D)​Differ in the amount of detail captured
Question
The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question: _______?​

A)Is the user finished with the task?
B)​Is the system at rest?
C)Is all the data input?
D)​Is all the printing completed?
Question
A(n)_______  is something that occurs at a specific time and place and can be precisely measured.​
Question
"As a student,I want to register for a class in order to fulfill education requirements" is an example of a(n)_________________.

A)use case
B)​user story
C)​external event
D)​elementary business process
Question
The _______ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions.​

A)perfect technology assumption
B)​ideal technology assumptions
C)​perfect processing control
D)ideal processing control
Question
The level of analysis to use when identifying user goals is the _______.​

A)external event level
B)​elementary business process level
C)​temporal event level
D)elementary activity level
Question
Checks or safety procedures are put in place to protect the integrity of the system is referred to as _______.​

A)perfect technology assumption
B)risk control assumption
C)​system controls
D)technology protection
Question
Two primary techniques to identify use cases are _______ and _______.(Choose two)

A)user goal technique
B)CRUD technique
C)​system response technique
D)​event decomposition technique
E)business function technique​
F)user procedure technique
Question
The technique used to identify use cases based on external,temporal,and state events is the _______.​

A)user goals technique
B)list of nouns technique
C)event decomposition technique
D)CRUD technique
Question
In UML notation,the guillemets character is used to show what kind of notation?​

A)classes
B)​subordinates
C)​relationships
D)​stereotypes
Question
The system's reaction to an event is called a(n)_______ .​

A)system process
B)​use case
C)​activity
D)​system requirement
Question
A(n)_______ is a task that is performed by one person in response to a business event,adds value,and leaves the system in a stable condition.
Question
In using the event decomposition technique,which of the following is NOT a type of event that is considered?​

A)Event initiated by an external agent
B)​Event initiated by a point in time
C)Event initiated by a system change​
D)​Event initiated by a user login
Question
Acceptance criteria are usually associated with __________.

A)system controls
B)use cases
C)​user stories
D)elementary business events
Question
The UML notation for the "includes" relationship is a(n)_______.​

A)a solid arrow
B)​a dashed arrow
C)​a straight line
D)​a dashed line
Question
The boundary between the automated portion of the system and the users of the system is called the _______.​

A)software boundary
B)application boundary
C)system boundary
D)​automation boundary
Question
A one sentence description of a use case is called a(n)_______.​

A)brief use case description
B)​short use case description
C)​intermediate use case description
D)​use case description
Question
An external agent or person that interacts with the system by supplying data is called a(n)_______.​
Question
An event that occurs simply by reaching a point in time is called a(n)_______ ______.​
Question
The standard template for a user story is "As a <______ _____> I want to so that ". Fill in the blank.​
Question
List three types of events and provide descriptions for each.​
Question
A diagram that illustrates actors and their relationships to the functions provided by the system is called a(n)  ____ ____ _____.​
Question
List the steps for using the event decomposition technique.​
Question
A short sentence used by an end user that states what he/she does as part of his/her work is called a _______ _________.​
Question
Another name for a state event is a(n)  ______ _____.​
Question
An event that occurs when something inside the system triggers the need for processing,but usually as a consequence of external activity is called a _______ event.​
Question
The _______ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions.​
Question
The final part of a user story is the ______ ______,which indicates the features that must be present.​
Question
A relationship between use cases in which one use case is used by another use case is called the _________ _______.​
Question
An event that occurs outside the system is called a(n)_______.
Question
The _______ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.​
Question
The _______ technique is a technique to identify use cases by determining the external business events to which the system must respond.
Question
The _______ is the dividing line between the computerized portion of the system and the users who operate the system.​
Question
Checks and safety procedures that are put in place to protect the integrity of the system are called _______ ______ .​
Question
List the steps required to develop a Use Case Diagram.​
Question
A UML model that is used to show use cases and their relationships to actors is called a(n)_______.​
Question
Features of a particular user story that must be present in the final system are called _________.​
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/82
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Identifying User Stories and Use Cases
1
Real-time systems require the system to react immediately to things that are going on in the environment.​
True
2
During analysis the analyst should be sure to identify system control events such as the user logging in or out.​
False
3
During the interviews in the user goal technique,the analyst should not try to influence the users in discussing their work methods.​
False
4
Another name for a state event is an internal event.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
5
The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
6
One benefit of the event decomposition technique is that it helps to identify use cases at the right level of detail.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
7
Each use case is used by only one actor.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
8
One technique used to help decide which events apply to controls is to assume that technology is perfect.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
9
Temporal events always occur on a fixed date or at a fixed time.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
10
The event decomposition technique begins by identifying use cases.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
11
The end product of the event decomposition technique is a list of use cases at the right level of analysis.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
12
One way to determine whether an occurrence is an event or part of the interaction before or after an event is by asking if any long pauses or intervals occur.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
13
The analyst begins identifying state events by asking about the specific deadlines that the system must accommodate.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
14
Before using the user goal technique the analyst must first identify and classify all the types of system users.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
15
In a use case diagram,and actor must always be a person.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
16
A state event is an event that occurs when something happens outside the system that triggers the need for processing.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
17
A state event is a political or governmental activity.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
18
An actor is a person that plays a particular role within a business process.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
19
When describing an external event,there is no need to worry about the person or thing causing the event.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
20
When a customer buys an item of merchandise using his store credit account,a separate event is required to pay the store.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
21
The acceptance criteria can be used to generate test data.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
22
One technique to identify use cases is to ask users what they want to achieve with a particular business procedure. This technique is called the ______ technique.​

A)business procedure
B)event decomposition
C)​workflow
D)​user goal
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is an example of a temporal event?​

A)Month end billing is started
B)​User logs into the system
C)Customer updates address
D)​Inventory reorder occurs
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
24
Another name for the "includes" relationship is the "uses" relationship.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
25
The acceptance criteria for a user story can be considered a contract between the developers and users.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
26
A customer wants to buy a new shirt can be considered an external event.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
27
The end of an event or a user case is when the system is at rest in a consistent state.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
28
The even decomposition technique begins by identifying all of the _______.​

A)operational users
B)​system users
C)business events
D)​internal events
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
29
The source of using the concept of events to define functional requirements was first emphasized with _______ systems.​

A)business
B)​operating
C)real-time
D)​batch
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
30
The automation boundary is the same thing as the system boundary.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
31
The beginning step in defining use cases is always to obtain a user story.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
32
The type of event that occurs outside of the system is called a(n)_______.​

A)outside event
B)​external event
C)​business event
D)​temporal event
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
33
Highly Agile methodologies favor detailed use case documentation over sketchy user stories.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
34
An occurrence at a specific time and place,which can be described and is worth remember,is called a(n)_______.​

A)business process
B)event
C)requirement
D)business transaction
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
35
Something that occurs at a specific time and place and should be remember by the system is called a(n)_______.​

A)use case
B)elementary business process
C)user goal
D)event
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
36
The user goal technique normally begins by identifying,listing,and classifying _______ .​

A)the system users
B)the business events
C)the business processes
D)​the system stakeholders
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is an example of a state event?​

A)A customer places an order
B)​It is time to send a late notice
C)​Management checks order status
D)Inventory reorder point is reached
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
38
A(n)_______ event occurs when something happens inside the system that triggers the need for processing.​

A)logical
B)​state
C)external
D)temporal
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
39
State events are also sometimes called _______ events.​

A)external
B)trigger
C)​system
D)​internal
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
40
An event that occurs by reaching a point in time is called a _______ event.​

A)internal
B)external
C)​timed
D)temporal
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
41
In UML notation the includes relationship connects two use cases. The use case that is "included" use case is the one which _______ .​

A)is connected to the tail of an arrow
B)​is connected to the head of an arrow
C)​cannot be determined
D)is not connected to an actor
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
42
An activity that the system performs in response to a user request is called a(n)_______.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
43
​"Customer decides to buy a shirt" is an example of what?

A)An external event
B)​Activity prior to an event
C)​A temporal event
D)​Activity after an event.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
44
User stories are different than use cases in what way?

A)Different users identify them
B)​Differ in identified functions required
C)​Different focus
D)​Differ in the amount of detail captured
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
45
The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question: _______?​

A)Is the user finished with the task?
B)​Is the system at rest?
C)Is all the data input?
D)​Is all the printing completed?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
46
A(n)_______  is something that occurs at a specific time and place and can be precisely measured.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
47
"As a student,I want to register for a class in order to fulfill education requirements" is an example of a(n)_________________.

A)use case
B)​user story
C)​external event
D)​elementary business process
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
48
The _______ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions.​

A)perfect technology assumption
B)​ideal technology assumptions
C)​perfect processing control
D)ideal processing control
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
49
The level of analysis to use when identifying user goals is the _______.​

A)external event level
B)​elementary business process level
C)​temporal event level
D)elementary activity level
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
50
Checks or safety procedures are put in place to protect the integrity of the system is referred to as _______.​

A)perfect technology assumption
B)risk control assumption
C)​system controls
D)technology protection
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
51
Two primary techniques to identify use cases are _______ and _______.(Choose two)

A)user goal technique
B)CRUD technique
C)​system response technique
D)​event decomposition technique
E)business function technique​
F)user procedure technique
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
52
The technique used to identify use cases based on external,temporal,and state events is the _______.​

A)user goals technique
B)list of nouns technique
C)event decomposition technique
D)CRUD technique
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
53
In UML notation,the guillemets character is used to show what kind of notation?​

A)classes
B)​subordinates
C)​relationships
D)​stereotypes
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
54
The system's reaction to an event is called a(n)_______ .​

A)system process
B)​use case
C)​activity
D)​system requirement
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
55
A(n)_______ is a task that is performed by one person in response to a business event,adds value,and leaves the system in a stable condition.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
56
In using the event decomposition technique,which of the following is NOT a type of event that is considered?​

A)Event initiated by an external agent
B)​Event initiated by a point in time
C)Event initiated by a system change​
D)​Event initiated by a user login
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
57
Acceptance criteria are usually associated with __________.

A)system controls
B)use cases
C)​user stories
D)elementary business events
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
58
The UML notation for the "includes" relationship is a(n)_______.​

A)a solid arrow
B)​a dashed arrow
C)​a straight line
D)​a dashed line
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
59
The boundary between the automated portion of the system and the users of the system is called the _______.​

A)software boundary
B)application boundary
C)system boundary
D)​automation boundary
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
60
A one sentence description of a use case is called a(n)_______.​

A)brief use case description
B)​short use case description
C)​intermediate use case description
D)​use case description
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
61
An external agent or person that interacts with the system by supplying data is called a(n)_______.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
62
An event that occurs simply by reaching a point in time is called a(n)_______ ______.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
63
The standard template for a user story is "As a <______ _____> I want to so that ". Fill in the blank.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
64
List three types of events and provide descriptions for each.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
65
A diagram that illustrates actors and their relationships to the functions provided by the system is called a(n)  ____ ____ _____.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
66
List the steps for using the event decomposition technique.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
67
A short sentence used by an end user that states what he/she does as part of his/her work is called a _______ _________.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
68
Another name for a state event is a(n)  ______ _____.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
69
An event that occurs when something inside the system triggers the need for processing,but usually as a consequence of external activity is called a _______ event.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
70
The _______ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
71
The final part of a user story is the ______ ______,which indicates the features that must be present.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
72
A relationship between use cases in which one use case is used by another use case is called the _________ _______.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
73
An event that occurs outside the system is called a(n)_______.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
74
The _______ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
75
The _______ technique is a technique to identify use cases by determining the external business events to which the system must respond.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
76
The _______ is the dividing line between the computerized portion of the system and the users who operate the system.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
77
Checks and safety procedures that are put in place to protect the integrity of the system are called _______ ______ .​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
78
List the steps required to develop a Use Case Diagram.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
79
A UML model that is used to show use cases and their relationships to actors is called a(n)_______.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
80
Features of a particular user story that must be present in the final system are called _________.​
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 82 flashcards in this deck.