Chapter 3 Revision
Chapter 3 Revision
Chapter 3 Revision
User story: one short sentence in the everyday language of the end user
that states what a user does as part of his or her work
Acceptance criteria: features that must be present in the final system
for the user to be satisfied
Use case: An activity that the system performs in response to a request
by a user.
User goal technique: A technique to identify use cases by determining
what specific goals or objectives must be completed by the system for the
user
Event decomposition technique: A technique to identify use cases by
determining the business events to which the system must respond.
Actor: an external agent; a person, group or external system that
interacts with the system by supplying or receiving data.
System controls: Checks or safety procedures to protect the integrity of
the system and data.
Perfect technology assumption: The assumption that a system runs
under perfect operating and technological conditions.
Use case diagram: The UML model used to illustrate use cases and their
relationship with actors.
QUESTION: HOW MANY TYPES OF USERS CAN HAVE THE SAME USER
GOALS FOR USING THE SYSTEM?
There is no limit. Users from different departments can access the same use
cases and they can have the same user goals.
2. For each external event, identify the use case that the system requires
3. Consider temporal events that require a response from the system
4. For each temporal event, identify and name the use case that the system
requires and establish the point of time that will trigger the use case.
5. Consider the state events that the system might respond to. Particularly if
it’s a real-time system in which devices or internal state changers trigger
use cases
6. For each state event, identify and name the use case that the system
requires and then define the state change
7. When events and use cases are defined, check to see if they are required
as part of analysis by using the perfect technology assumption. Do not
include events that involve system controls such as login, logout, change
password, and backup or restore the database, as these are put in as
system controls.