CH3 (test bank) Flashcards
T/F: The CRUD technique is often used to validate and enhance the list of use cases.
T
T/F: During the interviews in the user goal technique, the analyst should not try to influence the users in discussing their work methods.
F
T/F: Before using the user goal technique the analyst must first identify and classify all the types of system users.
T
T/F: One benefit of the event decomposition technique is that it helps to identify use cases at the right level of detail.
T
T/F: The event decomposition technique begins by identifying use cases.
F, begins by identifying events that occur.
T/F: The end product of the event decomposition technique is a list of use cases at the right level of analysis.
T
T/F: When describing an external event, there is no need to worry about the person or thing causing the event.
F
T/F: Temporal events always occur on a fixed date or at a fixed time.
F, it occurs as a result of reaching a point in time.
T/F: A state event is a political or governmental activity.
F
T/F: Another name for a state event is an internal event
T
T/F: When a customer buys an item of merchandise using his store credit account, a separate event is required to pay the store.
T
T/F: Another name for the “includes” relationship is the “uses” relationship.
T
T/F: During analysis the analyst should be sure to identify system control events such as the user logging in or out.
F
T/F: CRUD stands for create, reply, update, delete.
F, it is read not reply.
T/F: The CRUD technique is most useful as a cross-check along with other techniques.
T
T/F: When using the CRUD technique, data ownership by foreign systems is an important consideration.
T
T/F: One way to determine whether an occurrence is an event or part of the interaction before or after an event is by asking if any long pauses or intervals occur.
T
T/F: A state event is an event that occurs when something happens outside the system that triggers the need for processing.
F, External not state.
T/F: Real-time systems require the system to react immediately to things that are going on in the environment.
T
T/F: The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.
F
T/F: The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.
F
T/F: One technique used to help decide which events apply to controls is to assume that technology is perfect.
T
T/F: An actor is a person that plays a particular role within a business process.
F
T/F: An actor is a person that plays a particular role within a business process.
F
T/F: In a use case diagram an actor must always be a person.
F
One technique to identify use cases is to ask users what they want to achieve with a particular business procedure. This technique is called the ______ technique.
user goal
The event decomposition technique begins by identifying all of the _______.
business events
Something that occurs at a specific time and place and should be remember by the system is called a(n) _______.
a. use case
c. user goal
b. elementary business process
d. event
d. event
The user goal technique normally begins by identifying, listing, and classifying _______ .
a. the system users
c. the business processes
b. the business events
d. the system stakeholders
a. the system users
The source of using the concept of events to define functional requirements was first emphasized with _______ systems.
a. business c. real-time
b. operating d. batch
c. real-time
The type of event that occurs outside of the system is called a(n) _______.
external event
An event that occurs by reaching a point in time is called a _______ event.
temporal
An occurrence at a specific time and place, which can be described and is worth remember, is called a(n) _______.
event
A(n) _______ event occurs when something happens inside the system that triggers the need for processing.
state
Which of the following is an example of a state event?
a. A customer places an order
c. Management checks order status
b. It is time to send a late notice
d. Inventory reorder point is reached
d. Inventory reorder point is reached
Which of the following is an example of a temporal event?
a. Month end billing is started
c. Customer updates address
b. User logs into the system
d. Inventory reorder occurs
a. Month end billing is started
State events are also sometimes called _______ events.
a. external c. system
b. trigger d. internal
d. internal
Checks or safety procedures are put in place to protect the integrity of the system is referred to as _______.
system controls
The _______ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions.
a. perfect technology assumption
In using the event decomposition technique, which of the following is NOT a type of event that is considered?
a. Event initiated by an external agent
c. Event initiated by a system change
b. Event initiated by a point in time
d. Event initiated by a user login
d. Event initiated by a user login
An important step in using the CRUD technique is to _______.
a. identify the system controls
c. identify the business events
b. identify the external agents
d. identify the data entities
d. identify the data entities
The system’s reaction to an event is called a(n) _______ .
use case
A one sentence description of a use case is called a(n) _______.
a. brief use case description
c. intermediate use case description
b. short use case description
d. use case description
a. brief use case description
The boundary between the automated portion of the system and the users of the system is called the _______.
automation boundary
In UML notation, the guillemets character is used to show what kind of notation?
stereotypes
The UML notation for the “includes” relationship is a(n) _______.
a. a solid arrow c. a straight line
b. a dashed arrow d. a dashed line
b. a dashed arrow
In UML notation the includes relationship connects two use cases. The use case that is “included” use case is the one which _______ .
a. is connected to the tail of an arrow c. cannot be determined
b. is connected to the head of an arrow d. is not connected to an actor
b. is connected to the head of an arrow
The technique used to identify use cases based on external, temporal, and state events is the _______.
event decomposition technique
The level of analysis to use when identifying user goals is the _______.
a. external event level
c. temporal event level
b. elementary business process level
d. elementary activity level
b. elementary business process level d. elementary activity level
An activity that the system performs in response to a user request is called a(n) _______.
use case
A technique that is best used to validate the list of existing use cases is called the _______ technique.
CRUD
A(n) _______ is a task that is performed by one person in response to a business event, adds value, and leaves the system in a stable condition.
elementary business process
A(n) _______ is something that occurs at a specific time and place and can be precisely measured.
event
An external agent or person that interacts with the system by supplying data is called a(n) _______.
actor
An event that occurs simply by reaching a point in time is called a(n) _______ event.
temporal
The _______ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions.
perfect technology assumption
Checks and safety procedures that are put in place to protect the integrity of the system are called _______ .
system controls
A UML model that is used to show use cases and their relationships to actors is called a(n) _______.
use case diagram
The _______ is the dividing line between the computerized portion of the system and the users who operate the system.
automation boundary
The _______ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.
user goal
An event that occurs when something inside the system triggers the need for processing, but usually as a consequence of external activity is called a _______ event.
state
An event that occurs outside the system is called a(n) _______.
external event
The _______ technique is a technique to identify use cases by determining the external business events to which the system must respond.
event decomposition
List three types of events and provide descriptions for each.
An external event is an event that occurs outside the system and is usually initiated by an external agent or actor. A second type of event is the temporal, which occurs as a result of reaching a point in time. A third type of even is a state event. This event occurs when something happens inside the system that triggers the need for processing.