CH3 (test bank) Flashcards

(67 cards)

1
Q

T/F: The CRUD technique is often used to validate and enhance the list of use cases.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F: During the interviews in the user goal technique, the analyst should not try to influence the users in discussing their work methods.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: Before using the user goal technique the analyst must first identify and classify all the types of system users.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F: One benefit of the event decomposition technique is that it helps to identify use cases at the right level of detail.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F: The event decomposition technique begins by identifying use cases.

A

F, begins by identifying events that occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F: The end product of the event decomposition technique is a list of use cases at the right level of analysis.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F: When describing an external event, there is no need to worry about the person or thing causing the event.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T/F: Temporal events always occur on a fixed date or at a fixed time.

A

F, it occurs as a result of reaching a point in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F: A state event is a political or governmental activity.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F: Another name for a state event is an internal event

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F: When a customer buys an item of merchandise using his store credit account, a separate event is required to pay the store.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F: Another name for the “includes” relationship is the “uses” relationship.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T/F: During analysis the analyst should be sure to identify system control events such as the user logging in or out.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T/F: CRUD stands for create, reply, update, delete.

A

F, it is read not reply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F: The CRUD technique is most useful as a cross-check along with other techniques.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T/F: When using the CRUD technique, data ownership by foreign systems is an important consideration.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

T/F: One way to determine whether an occurrence is an event or part of the interaction before or after an event is by asking if any long pauses or intervals occur.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

T/F: A state event is an event that occurs when something happens outside the system that triggers the need for processing.

A

F, External not state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

T/F: Real-time systems require the system to react immediately to things that are going on in the environment.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

T/F: The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

T/F: The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

T/F: One technique used to help decide which events apply to controls is to assume that technology is perfect.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

T/F: An actor is a person that plays a particular role within a business process.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

T/F: An actor is a person that plays a particular role within a business process.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
T/F: In a use case diagram an actor must always be a person.
F
26
One technique to identify use cases is to ask users what they want to achieve with a particular business procedure. This technique is called the ______ technique.
user goal
27
The event decomposition technique begins by identifying all of the _______.
business events
28
Something that occurs at a specific time and place and should be remember by the system is called a(n) _______. a. use case c. user goal b. elementary business process d. event
d. event
29
The user goal technique normally begins by identifying, listing, and classifying _______ . a. the system users c. the business processes b. the business events d. the system stakeholders
a. the system users
30
The source of using the concept of events to define functional requirements was first emphasized with _______ systems. a. business c. real-time b. operating d. batch
c. real-time
31
The type of event that occurs outside of the system is called a(n) _______.
external event
32
An event that occurs by reaching a point in time is called a _______ event.
temporal
33
An occurrence at a specific time and place, which can be described and is worth remember, is called a(n) _______.
event
34
A(n) _______ event occurs when something happens inside the system that triggers the need for processing.
state
35
Which of the following is an example of a state event? a. A customer places an order c. Management checks order status b. It is time to send a late notice d. Inventory reorder point is reached
d. Inventory reorder point is reached
36
Which of the following is an example of a temporal event? a. Month end billing is started c. Customer updates address b. User logs into the system d. Inventory reorder occurs
a. Month end billing is started
37
State events are also sometimes called _______ events. a. external c. system b. trigger d. internal
d. internal
38
Checks or safety procedures are put in place to protect the integrity of the system is referred to as _______.
system controls
39
The _______ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions.
a. perfect technology assumption
40
In using the event decomposition technique, which of the following is NOT a type of event that is considered? a. Event initiated by an external agent c. Event initiated by a system change b. Event initiated by a point in time d. Event initiated by a user login
d. Event initiated by a user login
41
An important step in using the CRUD technique is to _______. a. identify the system controls c. identify the business events b. identify the external agents d. identify the data entities
d. identify the data entities
42
The system’s reaction to an event is called a(n) _______ .
use case
43
A one sentence description of a use case is called a(n) _______. a. brief use case description c. intermediate use case description b. short use case description d. use case description
a. brief use case description
44
The boundary between the automated portion of the system and the users of the system is called the _______.
automation boundary
45
In UML notation, the guillemets character is used to show what kind of notation?
stereotypes
46
The UML notation for the “includes” relationship is a(n) _______. a. a solid arrow c. a straight line b. a dashed arrow d. a dashed line
b. a dashed arrow
47
In UML notation the includes relationship connects two use cases. The use case that is “included” use case is the one which _______ . a. is connected to the tail of an arrow c. cannot be determined b. is connected to the head of an arrow d. is not connected to an actor
b. is connected to the head of an arrow
48
The technique used to identify use cases based on external, temporal, and state events is the _______.
event decomposition technique
49
The level of analysis to use when identifying user goals is the _______. a. external event level c. temporal event level b. elementary business process level d. elementary activity level
b. elementary business process level d. elementary activity level
49
50
An activity that the system performs in response to a user request is called a(n) _______.
use case
51
A technique that is best used to validate the list of existing use cases is called the _______ technique.
CRUD
52
A(n) _______ is a task that is performed by one person in response to a business event, adds value, and leaves the system in a stable condition.
elementary business process
53
A(n) _______ is something that occurs at a specific time and place and can be precisely measured.
event
54
An external agent or person that interacts with the system by supplying data is called a(n) _______.
actor
55
An event that occurs simply by reaching a point in time is called a(n) _______ event.
temporal
56
The _______ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions.
perfect technology assumption
57
Checks and safety procedures that are put in place to protect the integrity of the system are called _______ .
system controls
58
59
A UML model that is used to show use cases and their relationships to actors is called a(n) _______.
use case diagram
60
The _______ is the dividing line between the computerized portion of the system and the users who operate the system.
automation boundary
60
61
The _______ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.
user goal
62
An event that occurs when something inside the system triggers the need for processing, but usually as a consequence of external activity is called a _______ event.
state
63
An event that occurs outside the system is called a(n) _______.
external event
64
The _______ technique is a technique to identify use cases by determining the external business events to which the system must respond.
event decomposition
65
List three types of events and provide descriptions for each.
An external event is an event that occurs outside the system and is usually initiated by an external agent or actor. A second type of event is the temporal, which occurs as a result of reaching a point in time. A third type of even is a state event. This event occurs when something happens inside the system that triggers the need for processing.