0% found this document useful (0 votes)
61 views

CH03 TB

The document discusses techniques for identifying use cases, including the CRUD technique, user goal technique, and event decomposition technique. It provides true/false and multiple choice questions about these techniques. The user goal technique involves interviewing users to understand their goals, while the event decomposition technique starts with identifying business events. State events are internal events that trigger processing within the system.

Uploaded by

san marco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views

CH03 TB

The document discusses techniques for identifying use cases, including the CRUD technique, user goal technique, and event decomposition technique. It provides true/false and multiple choice questions about these techniques. The user goal technique involves interviewing users to understand their goals, while the event decomposition technique starts with identifying business events. State events are internal events that trigger processing within the system.

Uploaded by

san marco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 11

6ed-Chapter 3: Use Cases

TRUE/FALSE

1. The CRUD technique is often used to validate and enhance the list of use cases.

ANS: T PTS: 1

2. During the interviews in the user goal technique, the analyst should not try to influence the users in
discussing their work methods.

ANS: F PTS: 1

3. Before using the user goal technique the analyst must first identify and classify all the types of system
users.

ANS: T PTS: 1

4. One benefit of the event decomposition technique is that it helps to identify use cases at the right level
of detail.

ANS: T PTS: 1

5. The event decomposition technique begins by identifying use cases.

ANS: F PTS: 1

6. The end product of the event decomposition technique is a list of use cases at the right level of analy-
sis.

ANS: T PTS: 1

7. When describing an external event, there is no need to worry about the person or thing causing the
event.

ANS: F PTS: 1

8. Temporal events always occur on a fixed date or at a fixed time.

ANS: F PTS: 1

9. A state event is a political or governmental activity.

ANS: F PTS: 1

10. Another name for a state event is an internal event.

ANS: T PTS: 1

11. When a customer buys an item of merchandise using his store credit account, a separate event is re-
quired to pay the store.

ANS: T PTS: 1
12. During analysis the analyst should be sure to identify system control events such as the user logging in
or out.

ANS: F PTS: 1

13. CRUD stands for create, reply, update, delete.

ANS: F PTS: 1

14. The CRUD technique is most useful as a cross-check along with other techniques.

ANS: T PTS: 1

15. When using the CRUD technique, data ownership by foreign systems is an important consideration.

ANS: T PTS: 1

16. One way to determine whether an occurrence is an event or part of the interaction before or after an
event is by asking if any long pauses or intervals occur.

ANS: T PTS: 1

17. A state event is an event that occurs when something happens outside the system that triggers the need
for processing.

ANS: F PTS: 1

18. Real-time systems require the system to react immediately to things that are going on in the environ-
ment.

ANS: T PTS: 1

19. The focus on external events is inappropriate when working with end users because discussing events
tends to confuse the issues.

ANS: F PTS: 1

20. The analyst begins identifying state events by asking    about the specific deadlines that the system
must accommodate.

ANS: F PTS: 1

21. One technique used to help decide which events apply to controls is to assume that technology is per-
fect.

ANS: T PTS: 1

22. An actor is a person that plays a particular role within a business process.

ANS: F PTS: 1

23. Each use case is used by only one actor.

ANS: F PTS: 1
24. In a use case diagram an actor must always be a person.

ANS: F PTS: 1

25. Another name for the “includes” relationship is the “uses” relationship.

ANS: T PTS: 1

MULTIPLE CHOICE

1. One technique to identify use cases is to ask users what they want to achieve with a particular business
procedure.    This technique is called the ______ technique.
a. business procedure c. workflow
b. event decomposition d. user goal
ANS: D PTS: 1

2. The even decomposition technique begins by identifying all of the _______.


a. operational users c. business events
b. system users d. internal events
ANS: C PTS: 1

3. Something that occurs at a specific time and place and should be remember by the system is called
a(n) _______.
a. use case c. user goal
b. elementary business d. event
process
ANS: D PTS: 1

4. The user goal technique normally begins by identifying, listing, and classifying _______ .
a. the system users c. the business pro-
cesses
b. the business events d. the system stakehold-
ers
ANS: A PTS: 1

5. The source of using the concept of events to define functional requirements was first emphasized with
_______ systems.
a. business c. real-time
b. operating d. batch
ANS: C PTS: 1

6. The type of event that occurs outside of the system is called a(n) _______.
a. outside event c. business event
b. external event d. temporal event
ANS: B PTS: 1

7. An event that occurs by reaching a point in time is called a _______ event.


a. internal c. timed
b. external d. temporal
ANS: D PTS: 1

8. An occurrence at a specific time and place, which can be described and is worth remember, is called
a(n) _______.
a. business process c. requirement
b. event d. business transaction
ANS: B PTS: 1

9. A(n) _______ event occurs when something happens inside the system that triggers the need for pro-
cessing.
a. logical c. external
b. state d. temporal
ANS: B PTS: 1

10. Which of the following is an example of a state event?


a. A customer places an c. Management checks
order order status
b. It is time to send a d. Inventory reorder
late notice point is reached
ANS: D PTS: 1

11. Which of the following is an example of a temporal event?


a. Month end billing is c. Customer updates ad-
started dress
b. User logs into the d. Inventory reorder oc-
system curs
ANS: A PTS: 1

12. State events are also sometimes called _______ events.


a. external c. system
b. trigger d. internal
ANS: D PTS: 1

13. The way to determine whether an occurrence is an event or part of the interaction before or after the
event is to ask the following question: _______?
a. Is the user finished c. Is all the data input?
with the task?
b. Is the system at rest? d. Is all the printing
completed?
ANS: B PTS: 1

14. “Customer decides to buy a shirt” is an example of what?


a. An external event c. A temporal event
b. Activity prior to an d. Activity after an
event event.
ANS: B PTS: 1

15. Checks or safety procedures are put in place to protect the integrity of the system is referred to as
_______.
a. perfect technology c. system controls
assumption
b. risk control assump- d. technology protection
tion
ANS: C PTS: 1

16. The _______ indicates that events should be included during analysis only if the system would be re-
quired to respond under ideal conditions.
a. perfect technology c. perfect processing
assumption control
b. ideal technology as- d. ideal processing con-
sumptions trol
ANS: A PTS: 1

17. In using the event decomposition technique, which of the following is NOT a type of event that is con-
sidered?
a. Event initiated by an c. Event initiated by a
external agent system change
b. Event initiated by a d. Event initiated by a
point in time user login
ANS: D PTS: 1

18. An important step in using the CRUD technique is to _______.


a. identify the system c. identify the business
controls events
b. identify the external d. identify the data enti-
agents ties
ANS: D PTS: 1

19. The system’s reaction to an event is called a(n) _______ .


a. system process c. activity
b. use case d. system requirement
ANS: B PTS: 1

20. A one sentence description of a use case is called a(n) _______.


a. brief use case de- c. intermediate use case
scription description
b. short use case de- d. use case description
scription
ANS: A PTS: 1

21. The boundary between the automated portion of the system and the users of the system is called the
_______.
a. software boundary c. system boundary
b. application boundary d. automation boundary
ANS: D PTS: 1

22. In UML notation, the guillemets character is used to show what kind of notation?
a. classes c. relationships
b. subordinates d. stereotypes
ANS: D PTS: 1

23. The UML notation for the “includes” relationship is a(n) _______.
a. a solid arrow c. a straight line
b. a dashed arrow d. a dashed line
ANS: B PTS: 1

24. In UML notation the includes relationship connects two use cases.    The use case that is “included”
use case is the one which _______ .
a. is connected to the c. cannot be determined
tail of an arrow
b. is connected to the d. is not connected to an
head of an arrow actor
ANS: B PTS: 1

25. The technique used to identify use cases based on external, temporal, and state events is the _______.
a. user goals technique c. event decomposition
technique
b. list of nouns tech- d. CRUD technique
nique
ANS: C PTS: 1

26. The level of analysis to use when identifying user goals is the _______.
a. external event level c. temporal event level
b. elementary business d. elementary activity
process level level
ANS: B PTS: 1

MULTIPLE RESPONSE

1. Two primary techniques to identify use cases are _______ and _______. (Choose two)
a. user goal technique d. event decomposition
technique
b. CRUD technique e. business function
technique
c. system response tech- f. user procedure tech-
nique nique
ANS: A, D PTS: 1

COMPLETION

1. An activity that the system performs in response to a user request is called a(n) _______.

ANS: use case

PTS: 2

2. A technique that is best used to validate the list of existing use cases is called the _______ technique.

ANS: CRUD

PTS: 2
3. A(n) _______ is a task that is performed by one person in response to a business event, adds value, and
leaves the system in a stable condition.

ANS:
elementary business process
EBP

PTS: 2

4. A(n) _______    is something that occurs at a specific time and place and can be precisely measured.

ANS: event

PTS: 2

5. An external agent or person that interacts with the system by supplying data is called a(n) _______.

ANS: actor

PTS: 2

6. An event that occurs simply by reaching a point in time is called a(n) _______ event.

ANS: temporal

PTS: 2

7. The _______ states that events should be included during analysis only if the system would be re-
quired to respond under perfect technology conditions.

ANS: perfect technology assumption

PTS: 2

8. Checks and safety procedures that are put in place to protect the integrity of the system are called
_______ .

ANS: system controls

PTS: 2

9. An acronym for updating, deleting, reporting and creating of data is called _______.

ANS: CRUD

PTS: 2

10. A UML model that is used to show use cases and their relationships to actors is called a(n) _______.

ANS: use case diagram

PTS: 2

11. The _______ is the dividing line between the computerized portion of the system and the users who
operate the system.

ANS: automation boundary

PTS: 2

12. The _______ technique is a technique to identify use cases by determining specific goals or objectives
must be completed by a user.

ANS:
user goal
user goal technique

PTS: 2

13. The _______ technique is a technique to identify use cases by determining the external business events
to which the system must respond.

ANS:
event decomposition
event decomposition technique

PTS: 2

14. An event that occurs outside the system is called a(n) _______.

ANS: external event

PTS: 2

15. An event that occurs when something inside the system triggers the need for processing, but usually as
a consequence of external activity is called a _______ event.

ANS:
state
state event

PTS: 2
ESSAY

1. List the steps for using the event decomposition technique.

ANS:
1. Identify external events
2. Name a use case for each external event
3. Identify temporal events
4. Name a use case for each temporal event
5. Identify state events
6 Name a use case for each state event
7. Remove and perfect technology assumption events

PTS: 5

2. List the four steps for using the CRUD technique.

ANS:
1. Identify all the data entities
2. For each data entity ensure that there are use cases to CRUD
3. Add any new required use cases
4. For integrated applications, do not add use cases that are covered in other applications

PTS: 5

3. List the steps required to develop a Use Case Diagram.

ANS:
1. Identify all the stakeholders who need to see a use case diagram.
2. Determine what is important for each stakeholder.
3. Organize the use cases for each communication need. Draw the use case diagrams.
4. Carefully name each diagram as it pertains to each stakeholder and user.

PTS: 5

4. List three types of events and provide descriptions for each.

ANS:
An external event is an event that occurs outside the system and is usually initiated by an external
agent or actor. A second type of event is the temporal, which occurs as a result of reaching a point in
time. A third type of even is a state event. This event occurs when something happens inside the sys-
tem that triggers the need for processing.

PTS: 5
5. Describe two techniques for identifying use cases. Which is the most comprehensive approach?

ANS:
Two techniques for identifying use cases are the user goal technique and the event decomposition tech-
nique. The user goal technique involves identifying all actors or users of the system and asking, “What
are their goals in using the system?” Goals are identified at the elementary business process (EBP)
level of analysis. The event decomposition technique involves asking, “What events does the system
need to respond to?” External events, temporal events, and state events are identified. The use case is
what the system does to react to or respond to each event. The event table is used to catalog informa-
tion about each event and the resulting use case. The event decomposition technique is the most com-
prehensive technique. Both techniques involve the idea of an elementary business process (EBS) being
a system process in response to a business event. A third technique discussed in chapter 7 is the CRUD
technique, where the analyst identifies for each domain class the create, read or report, update, and
delete use cases required. In practice, multiple approaches should be used to cross check each other to
assure all use cases are identified.

PTS: 5

You might also like