CH03 TB
CH03 TB
TRUE/FALSE
1. The CRUD technique is often used to validate and enhance the list of use cases.
ANS: T PTS: 1
2. During the interviews in the user goal technique, the analyst should not try to influence the users in
discussing their work methods.
ANS: F PTS: 1
3. Before using the user goal technique the analyst must first identify and classify all the types of system
users.
ANS: T PTS: 1
4. One benefit of the event decomposition technique is that it helps to identify use cases at the right level
of detail.
ANS: T PTS: 1
ANS: F PTS: 1
6. The end product of the event decomposition technique is a list of use cases at the right level of analy-
sis.
ANS: T PTS: 1
7. When describing an external event, there is no need to worry about the person or thing causing the
event.
ANS: F PTS: 1
ANS: F PTS: 1
ANS: F PTS: 1
ANS: T PTS: 1
11. When a customer buys an item of merchandise using his store credit account, a separate event is re-
quired to pay the store.
ANS: T PTS: 1
12. During analysis the analyst should be sure to identify system control events such as the user logging in
or out.
ANS: F PTS: 1
ANS: F PTS: 1
14. The CRUD technique is most useful as a cross-check along with other techniques.
ANS: T PTS: 1
15. When using the CRUD technique, data ownership by foreign systems is an important consideration.
ANS: T PTS: 1
16. One way to determine whether an occurrence is an event or part of the interaction before or after an
event is by asking if any long pauses or intervals occur.
ANS: T PTS: 1
17. A state event is an event that occurs when something happens outside the system that triggers the need
for processing.
ANS: F PTS: 1
18. Real-time systems require the system to react immediately to things that are going on in the environ-
ment.
ANS: T PTS: 1
19. The focus on external events is inappropriate when working with end users because discussing events
tends to confuse the issues.
ANS: F PTS: 1
20. The analyst begins identifying state events by asking about the specific deadlines that the system
must accommodate.
ANS: F PTS: 1
21. One technique used to help decide which events apply to controls is to assume that technology is per-
fect.
ANS: T PTS: 1
22. An actor is a person that plays a particular role within a business process.
ANS: F PTS: 1
ANS: F PTS: 1
24. In a use case diagram an actor must always be a person.
ANS: F PTS: 1
25. Another name for the “includes” relationship is the “uses” relationship.
ANS: T PTS: 1
MULTIPLE CHOICE
1. One technique to identify use cases is to ask users what they want to achieve with a particular business
procedure. This technique is called the ______ technique.
a. business procedure c. workflow
b. event decomposition d. user goal
ANS: D PTS: 1
3. Something that occurs at a specific time and place and should be remember by the system is called
a(n) _______.
a. use case c. user goal
b. elementary business d. event
process
ANS: D PTS: 1
4. The user goal technique normally begins by identifying, listing, and classifying _______ .
a. the system users c. the business pro-
cesses
b. the business events d. the system stakehold-
ers
ANS: A PTS: 1
5. The source of using the concept of events to define functional requirements was first emphasized with
_______ systems.
a. business c. real-time
b. operating d. batch
ANS: C PTS: 1
6. The type of event that occurs outside of the system is called a(n) _______.
a. outside event c. business event
b. external event d. temporal event
ANS: B PTS: 1
8. An occurrence at a specific time and place, which can be described and is worth remember, is called
a(n) _______.
a. business process c. requirement
b. event d. business transaction
ANS: B PTS: 1
9. A(n) _______ event occurs when something happens inside the system that triggers the need for pro-
cessing.
a. logical c. external
b. state d. temporal
ANS: B PTS: 1
13. The way to determine whether an occurrence is an event or part of the interaction before or after the
event is to ask the following question: _______?
a. Is the user finished c. Is all the data input?
with the task?
b. Is the system at rest? d. Is all the printing
completed?
ANS: B PTS: 1
15. Checks or safety procedures are put in place to protect the integrity of the system is referred to as
_______.
a. perfect technology c. system controls
assumption
b. risk control assump- d. technology protection
tion
ANS: C PTS: 1
16. The _______ indicates that events should be included during analysis only if the system would be re-
quired to respond under ideal conditions.
a. perfect technology c. perfect processing
assumption control
b. ideal technology as- d. ideal processing con-
sumptions trol
ANS: A PTS: 1
17. In using the event decomposition technique, which of the following is NOT a type of event that is con-
sidered?
a. Event initiated by an c. Event initiated by a
external agent system change
b. Event initiated by a d. Event initiated by a
point in time user login
ANS: D PTS: 1
21. The boundary between the automated portion of the system and the users of the system is called the
_______.
a. software boundary c. system boundary
b. application boundary d. automation boundary
ANS: D PTS: 1
22. In UML notation, the guillemets character is used to show what kind of notation?
a. classes c. relationships
b. subordinates d. stereotypes
ANS: D PTS: 1
23. The UML notation for the “includes” relationship is a(n) _______.
a. a solid arrow c. a straight line
b. a dashed arrow d. a dashed line
ANS: B PTS: 1
24. In UML notation the includes relationship connects two use cases. The use case that is “included”
use case is the one which _______ .
a. is connected to the c. cannot be determined
tail of an arrow
b. is connected to the d. is not connected to an
head of an arrow actor
ANS: B PTS: 1
25. The technique used to identify use cases based on external, temporal, and state events is the _______.
a. user goals technique c. event decomposition
technique
b. list of nouns tech- d. CRUD technique
nique
ANS: C PTS: 1
26. The level of analysis to use when identifying user goals is the _______.
a. external event level c. temporal event level
b. elementary business d. elementary activity
process level level
ANS: B PTS: 1
MULTIPLE RESPONSE
1. Two primary techniques to identify use cases are _______ and _______. (Choose two)
a. user goal technique d. event decomposition
technique
b. CRUD technique e. business function
technique
c. system response tech- f. user procedure tech-
nique nique
ANS: A, D PTS: 1
COMPLETION
1. An activity that the system performs in response to a user request is called a(n) _______.
PTS: 2
2. A technique that is best used to validate the list of existing use cases is called the _______ technique.
ANS: CRUD
PTS: 2
3. A(n) _______ is a task that is performed by one person in response to a business event, adds value, and
leaves the system in a stable condition.
ANS:
elementary business process
EBP
PTS: 2
4. A(n) _______ is something that occurs at a specific time and place and can be precisely measured.
ANS: event
PTS: 2
5. An external agent or person that interacts with the system by supplying data is called a(n) _______.
ANS: actor
PTS: 2
6. An event that occurs simply by reaching a point in time is called a(n) _______ event.
ANS: temporal
PTS: 2
7. The _______ states that events should be included during analysis only if the system would be re-
quired to respond under perfect technology conditions.
PTS: 2
8. Checks and safety procedures that are put in place to protect the integrity of the system are called
_______ .
PTS: 2
9. An acronym for updating, deleting, reporting and creating of data is called _______.
ANS: CRUD
PTS: 2
10. A UML model that is used to show use cases and their relationships to actors is called a(n) _______.
PTS: 2
11. The _______ is the dividing line between the computerized portion of the system and the users who
operate the system.
PTS: 2
12. The _______ technique is a technique to identify use cases by determining specific goals or objectives
must be completed by a user.
ANS:
user goal
user goal technique
PTS: 2
13. The _______ technique is a technique to identify use cases by determining the external business events
to which the system must respond.
ANS:
event decomposition
event decomposition technique
PTS: 2
14. An event that occurs outside the system is called a(n) _______.
PTS: 2
15. An event that occurs when something inside the system triggers the need for processing, but usually as
a consequence of external activity is called a _______ event.
ANS:
state
state event
PTS: 2
ESSAY
ANS:
1. Identify external events
2. Name a use case for each external event
3. Identify temporal events
4. Name a use case for each temporal event
5. Identify state events
6 Name a use case for each state event
7. Remove and perfect technology assumption events
PTS: 5
ANS:
1. Identify all the data entities
2. For each data entity ensure that there are use cases to CRUD
3. Add any new required use cases
4. For integrated applications, do not add use cases that are covered in other applications
PTS: 5
ANS:
1. Identify all the stakeholders who need to see a use case diagram.
2. Determine what is important for each stakeholder.
3. Organize the use cases for each communication need. Draw the use case diagrams.
4. Carefully name each diagram as it pertains to each stakeholder and user.
PTS: 5
ANS:
An external event is an event that occurs outside the system and is usually initiated by an external
agent or actor. A second type of event is the temporal, which occurs as a result of reaching a point in
time. A third type of even is a state event. This event occurs when something happens inside the sys-
tem that triggers the need for processing.
PTS: 5
5. Describe two techniques for identifying use cases. Which is the most comprehensive approach?
ANS:
Two techniques for identifying use cases are the user goal technique and the event decomposition tech-
nique. The user goal technique involves identifying all actors or users of the system and asking, “What
are their goals in using the system?” Goals are identified at the elementary business process (EBP)
level of analysis. The event decomposition technique involves asking, “What events does the system
need to respond to?” External events, temporal events, and state events are identified. The use case is
what the system does to react to or respond to each event. The event table is used to catalog informa-
tion about each event and the resulting use case. The event decomposition technique is the most com-
prehensive technique. Both techniques involve the idea of an elementary business process (EBS) being
a system process in response to a business event. A third technique discussed in chapter 7 is the CRUD
technique, where the analyst identifies for each domain class the create, read or report, update, and
delete use cases required. In practice, multiple approaches should be used to cross check each other to
assure all use cases are identified.
PTS: 5