IS 401 Use Case Flashcards

1
Q

use case

A

an activity the system performs, usually in response to a request by a user.
Two techniques are recommended for identifying use
cases: the user goal technique and the event decomposition technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One approach to identifying use cases, called the user goal technique, is to

A

ask users to describe their goals for using the new or updated system. The analyst first identifies all the users and then conducts a structured interview with
each user. By focusing on one type of user at a time, the analyst can systematically address the problem of identifying use cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

potential users of the CSMS.
The user goal technique for identifying use cases includes these steps:

Satzinger, John W.; Jackson, Robert B.; Burd, Stephen D. (2011-11-16). Systems Analysis and Design in a Changing World (Page 69). Cengage Textbook. Kindle Edition.

A
  1. Identify all the potential users for the new system.
  2. Classify the potential users in terms of their functional role (e.g., shipping,
    marketing, sales).
  3. Further classify potential users by organizational level (e.g., operational,
    management, executive).
  4. For each type of user, interview them to find a list of specific goals they will have when using the new system. Start with goals they currently have and then get them to imagine innovative functions they think would add value. Encourage them to state each goal in the imperative verb-noun form, such as Add customer, Update order, and Produce month end report.
  5. Create a list of preliminary use cases organized by type of user.
  6. Look for duplicates with similar use case names and resolve
    inconsistencies.
  7. Identify where different types of users need the same use cases.
  8. Review the completed list with each type of user and then with interested
    stakeholders.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The most comprehensive technique for identifying use cases is the event decomposition technique.

A

The event decomposition technique begins by identifying all the business events that will cause the information system to respond, and each event leads to a use case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The appropriate level of detail for identifying use cases is one that focuses on elementary business processes (EBPs).

A

An EBP is a task that is performed by one person in one place in response to a business event, adds measurable business value, and leaves the system and its data in a stable and consistent state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Note that each EBP (and thus each use case) occurs in response to a business event.

A

An event occurs at a specific time and place, can be described, and should be remembered by the system. Events drive or trigger all processing that a system does, so listing events and analyzing them makes sense when you need to define system requirements by identifying use cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An external event is an event that occurs outside the system—usually initiated by an external agent or actor.

A

An external agent (or actor) is a person or organizational unit that supplies or receives data from the system. To identify the key external events, the analyst first tries to identify all the external agents that might want something from the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A second type of event is a temporal event—an event that occurs as a result of reaching a point in time.

A

Many information systems produce outputs at defined
intervals, such as payroll systems that produce a paycheck every two weeks (or each month). Sometimes, the outputs are reports that management wants to
receive regularly, such as performance reports or exception reports. These events are different from external events in that the system should automatically produce the required output without being told to do so. In other words, no external agent or actor is making demands, but the system is supposed to generate
information or other outputs when they are needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A third type of event is a state event—an event that occurs when something happens inside the system that triggers the need for processing.

A

State events are also called internal events. For example, if the sale of a product results in an adjustment to an inventory record and the inventory in stock drops below a reorder point, it is necessary to reorder. The state event might be named“Reorder point reached.” Often, state events occur as a consequence of external events. Sometimes, they are similar to temporal events, except the point in time cannot be defined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

External events include

A

external agent wants something resulting in a transaction, external agent wants some info, data changed and needs to be updated, management wants info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

State events include

A

Internal outputs needed: management reports, operational reports, internal statements and documents

external outputs needed: statements, status reports, bills, reminders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

system controls

A

which are checks or safety

procedures put in place to protect the integrity of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The perfect technology

A

assumption states that events should be included during analysis only if the system would be required to respond
under perfect conditions (i.e., with equipment never breaking down, capacity for processing and storage being unlimited, and people operating the system being
completely honest and never making mistakes).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CRUD technique.

A

“CRUD”is an acronym for Create, Read or Report, Update, and Delete, and it is often introduced with respect to database management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The CRUD technique for validating and refining use cases includes these steps:

A
  1. Identify all the data entities or domain classes involved in the new system.
  2. For each type of data (data entity or domain class), verify that a use case has been identified that creates a new instance, updates existing instances, reads or reports values of instances, and deletes (archives) an instance.
  3. If a needed use case has been overlooked, add a new use case and then identify the stakeholders.
  4. With integrated applications, make sure it is clear which application is responsible for adding and maintaining the data and which system merely uses the data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly