IS 401 CH. 3 (Terms) Flashcards

1
Q

use case

A

A use case is an activity the system performs, usually in response to a request by a user.

Two techniques are recommended for identifying use cases: the user goal technique and the event decomposition technique. An additional technique, known as the CRUD technique, is often used to validate
and enhance the list of use cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

user goal technique

A

is to ask users to describe their goals for using the new or updated system. The analyst first identifies all the users and then conducts a structured interview with
each user. By focusing on one type of user at a time, the analyst can systematically address the problem of identifying use cases.
During the interview, the analyst guides the user to identify specific ways that a computer system can help the user perform his or her assigned tasks. The overarching objective is to identify how a system can improve the user’s performance and productivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The user goal technique for identifying use cases includes these steps:

A
  1. Identify all the potential users for the new system.
  2. Classify the potential users in terms of their functional role (e.g., shipping, marketing, sales).
  3. Further classify potential users by organizational level (e.g., operational, management, executive).
  4. For each type of user, interview them to find a list of specific goals they will have when using the new system. Start with goals they currently have and then get them to imagine innovative functions they think would add value. Encourage them to state each goal in the imperative verb-noun form, such as Add customer, Update order, and Produce month end report.
  5. Create a list of preliminary use cases organized by type of user.
  6. Look for duplicates with similar use case names and resolve inconsistencies.
  7. Identify where different types of users need the same use cases.
  8. Review the completed list with each type of user and then with interested stakeholders.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

event decomposition technique

A

The most comprehensive technique for identifying use cases is the event decomposition technique. The event decomposition technique begins by identifying all the business events that will cause the information system to
respond, and each event leads to a use case.

Starting with business events helps the analyst define each use case at the right level of detail. For example,
one analyst might identify a use case as typing in a customer name on a form. A second analyst might identify a use case as the entire process of adding a new customer. A third analyst might even define a use case as working with customers all day, which could include adding new customers, updating customer records, deleting customers, following up on late-paying customers, or contacting former customers. The first example is too narrow to be useful. The second example defines a complete user goal, which is the right level of
analysis for a use case. Working with customers all day—the third example—is too broad to be useful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

elementary business processes (EBPs)

A

The appropriate level of detail for identifying use cases is one that focuses on elementary business processes (EBPs). An EBP is a task that is performed by one person in one place in response to a business event, adds measurable business value, and leaves the system and its data in a stable and consistent state.
In Figure 3-1, the RMO CSMS customer goals that will become use cases are Search for item, Fill shopping cart, View product ratings and comments, and so forth. These use cases are good examples of elementary business processes. To fill a shopping cart is in response to the business event “Customer wants to shop.” There is one person filling the cart, and there is measurable value for the customer as items are added to the cart. When the customer stops adding items and moves to another task, the system remembers the current cart and is ready to
switch to the new task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

event

A

Note that each EBP (and thus each use case) occurs in response to a business event.
An event occurs at a specific time and place, can be described, and should be remembered by the system. Events drive or trigger all processing that a system does, so listing events and analyzing them makes sense when you need to define system requirements by identifying use cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

external event

A

is an event that occurs outside the system—usually initiated by an external agent or actor. An external agent (or ACTOR) is a person or organizational unit that supplies or receives data from the system.

EX: external agents wants something resulting in a transaction, external agent wants some information, data changed and needs to be updated, management wants some information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

temporal event

A

an event that occurs as a result of reaching a point in time. Many information systems produce outputs at defined intervals, such as payroll systems that produce a paycheck every two weeks (or each month) or reports that management wants to receive regularly, such as performance reports or exception reports. These events are different from external events in that the system should automatically produce the required output without being told to do so. In other words, no external agent or actor is making demands, but the system is supposed to generate information or other outputs when they are needed.
Temporal events do not have to occur on a fixed date. They can occur after a defined period of time has elapsed. For example, a bill might be given to a customer when a sale has occurred. If the bill has not been paid within 15 days, the system might send a late notice. The temporal event “Time to send late notice” might be defined as a point 15 days after the billing date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Temporal events to look for:

A

Internal outputs needed

  • management reports (summary or exceptions)
  • operational reports (detailed transactions)
  • internal statements and documents (including payroll)

External outputs needed
-statements, status reports, bills, reminders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

state event

A

an event that occurs when something happens inside the system that triggers the need for processing. State events are also called internal events. For example, if the sale of a product results in an adjustment to an inventory record and the inventory in stock drops below a reorder point, it is necessary to reorder. The state event might be named “Reorder point reached.” Often, state events occur as a consequence of external events. Sometimes, they are similar to temporal events, except the point in time cannot be defined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

system controls

A

are checks or safety procedures put in place to protect the integrity of the system. These controls are important to the system, and they will certainly be added to the system during design. But spending time on these controls during analysis only adds details to the requirements model that users are not typically very
concerned about; they trust the system developers to take care of such details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

perfect technology assumption

A

The assumption that a system runs under perfect operating and technological conditions
States that events should be included during analysis only if the system would be required to respond under perfect conditions (i.e., with equipment never breaking down, capacity for processing and storage being unlimited, and people operating the system being completely honest and never making mistakes). By pretending that technology is perfect, analysts can eliminate events like “Time to back up the database” because they can assume that the disk will never crash. Again, during design, the project team adds these controls because technology is obviously not perfect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Using the Event Decomposition Technique

A

To summarize, the event decomposition technique for identifying use cases includes these steps:

  1. Consider the external events in the system environment that require a response from the system by using the checklist.
  2. For each external event, identify and name the use case that the system requires.
  3. Consider the temporal events that require a response from the system by using the checklist
  4. For each temporal event, identify and name the use case that the system requires and then establish the point of time that will trigger the use case.
  5. Consider the state events that the system might respond to, particularly if it is a real-time system in which devices or internal state changes trigger use cases.
  6. For each state event, identify and name the use case that the system requires and then define the state change.
  7. When events and use cases are defined, check to see if they are required by using the perfect technology assumption. Do not include events that involve such system controls as login, logout, change password, and backup or restore the database, as these are put in as system controls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CRUD

A

Another important technique used to validate and refine use cases is the CRUD technique.“CRUD”is an acronym for Create, Read or Report, Update, and Delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

use case diagram

A

is the UML model used to graphically show the use cases and their relationship to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

automation boundary

A

defines the border between the computerized portion of the application and the people operating the application, is shown as a rectangle containing the use case. The actor’s communication with the use case crosses the automation boundary.

17
Q

includes relationship

A

a relationship between use cases in which one use case is stereotypically included within the other use case

18
Q

Developing a Use Case Diagram

A
  1. Identify all the stakeholders and users who would benefit by having a use case diagram.
  2. Determine what each stakeholder or user needs to review in a use case diagram. Typically, a use case diagram might be produced for each subsystem, for each type of user, for use cases with the includes relationship,
    and for use cases that are of interest to specific stakeholders.
  3. For each potential communication need, select the use cases and actors to show and draw the use case diagram. There are many software packages that can be used to draw use case diagrams.
  4. Carefully name each use case diagram and then note how and when the diagram should be used to review use cases with stakeholders and users.