Deck 3: Identifying User Stories and Use Cases

ملء الشاشة (f)
exit full mode
سؤال
Real-time systems require the system to react immediately to things that are going on in the environment.​
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
During analysis the analyst should be sure to identify system control events such as the user logging in or out.​
سؤال
During the interviews in the user goal technique,the analyst should not try to influence the users in discussing their work methods.​
سؤال
Another name for a state event is an internal event.​
سؤال
The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.​
سؤال
One benefit of the event decomposition technique is that it helps to identify use cases at the right level of detail.​
سؤال
Each use case is used by only one actor.​
سؤال
One technique used to help decide which events apply to controls is to assume that technology is perfect.​
سؤال
Temporal events always occur on a fixed date or at a fixed time.​
سؤال
The event decomposition technique begins by identifying use cases.​
سؤال
The end product of the event decomposition technique is a list of use cases at the right level of analysis.​
سؤال
One way to determine whether an occurrence is an event or part of the interaction before or after an event is by asking if any long pauses or intervals occur.​
سؤال
The analyst begins identifying state events by asking about the specific deadlines that the system must accommodate.​
سؤال
Before using the user goal technique the analyst must first identify and classify all the types of system users.​
سؤال
In a use case diagram,and actor must always be a person.​
سؤال
A state event is an event that occurs when something happens outside the system that triggers the need for processing.​
سؤال
A state event is a political or governmental activity.​
سؤال
An actor is a person that plays a particular role within a business process.​
سؤال
When describing an external event,there is no need to worry about the person or thing causing the event.​
سؤال
When a customer buys an item of merchandise using his store credit account,a separate event is required to pay the store.​
سؤال
The acceptance criteria can be used to generate test data.​
سؤال
One technique to identify use cases is to ask users what they want to achieve with a particular business procedure. This technique is called the ______ technique.​

A)business procedure
B)event decomposition
C)​workflow
D)​user goal
سؤال
Which of the following is an example of a temporal event?​

A)Month end billing is started
B)​User logs into the system
C)Customer updates address
D)​Inventory reorder occurs
سؤال
Another name for the "includes" relationship is the "uses" relationship.​
سؤال
The acceptance criteria for a user story can be considered a contract between the developers and users.​
سؤال
A customer wants to buy a new shirt can be considered an external event.​
سؤال
The end of an event or a user case is when the system is at rest in a consistent state.​
سؤال
The even decomposition technique begins by identifying all of the _______.​

A)operational users
B)​system users
C)business events
D)​internal events
سؤال
The source of using the concept of events to define functional requirements was first emphasized with _______ systems.​

A)business
B)​operating
C)real-time
D)​batch
سؤال
The automation boundary is the same thing as the system boundary.​
سؤال
The beginning step in defining use cases is always to obtain a user story.​
سؤال
The type of event that occurs outside of the system is called a(n)_______.​

A)outside event
B)​external event
C)​business event
D)​temporal event
سؤال
Highly Agile methodologies favor detailed use case documentation over sketchy user stories.​
سؤال
An occurrence at a specific time and place,which can be described and is worth remember,is called a(n)_______.​

A)business process
B)event
C)requirement
D)business transaction
سؤال
Something that occurs at a specific time and place and should be remember by the system is called a(n)_______.​

A)use case
B)elementary business process
C)user goal
D)event
سؤال
The user goal technique normally begins by identifying,listing,and classifying _______ .​

A)the system users
B)the business events
C)the business processes
D)​the system stakeholders
سؤال
Which of the following is an example of a state event?​

A)A customer places an order
B)​It is time to send a late notice
C)​Management checks order status
D)Inventory reorder point is reached
سؤال
A(n)_______ event occurs when something happens inside the system that triggers the need for processing.​

A)logical
B)​state
C)external
D)temporal
سؤال
State events are also sometimes called _______ events.​

A)external
B)trigger
C)​system
D)​internal
سؤال
An event that occurs by reaching a point in time is called a _______ event.​

A)internal
B)external
C)​timed
D)temporal
سؤال
In UML notation the includes relationship connects two use cases. The use case that is "included" use case is the one which _______ .​

A)is connected to the tail of an arrow
B)​is connected to the head of an arrow
C)​cannot be determined
D)is not connected to an actor
سؤال
An activity that the system performs in response to a user request is called a(n)_______.
سؤال
​"Customer decides to buy a shirt" is an example of what?

A)An external event
B)​Activity prior to an event
C)​A temporal event
D)​Activity after an event.
سؤال
User stories are different than use cases in what way?

A)Different users identify them
B)​Differ in identified functions required
C)​Different focus
D)​Differ in the amount of detail captured
سؤال
The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question: _______?​

A)Is the user finished with the task?
B)​Is the system at rest?
C)Is all the data input?
D)​Is all the printing completed?
سؤال
A(n)_______  is something that occurs at a specific time and place and can be precisely measured.​
سؤال
"As a student,I want to register for a class in order to fulfill education requirements" is an example of a(n)_________________.

A)use case
B)​user story
C)​external event
D)​elementary business process
سؤال
The _______ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions.​

A)perfect technology assumption
B)​ideal technology assumptions
C)​perfect processing control
D)ideal processing control
سؤال
The level of analysis to use when identifying user goals is the _______.​

A)external event level
B)​elementary business process level
C)​temporal event level
D)elementary activity level
سؤال
Checks or safety procedures are put in place to protect the integrity of the system is referred to as _______.​

A)perfect technology assumption
B)risk control assumption
C)​system controls
D)technology protection
سؤال
Two primary techniques to identify use cases are _______ and _______.(Choose two)

A)user goal technique
B)CRUD technique
C)​system response technique
D)​event decomposition technique
E)business function technique​
F)user procedure technique
سؤال
The technique used to identify use cases based on external,temporal,and state events is the _______.​

A)user goals technique
B)list of nouns technique
C)event decomposition technique
D)CRUD technique
سؤال
In UML notation,the guillemets character is used to show what kind of notation?​

A)classes
B)​subordinates
C)​relationships
D)​stereotypes
سؤال
The system's reaction to an event is called a(n)_______ .​

A)system process
B)​use case
C)​activity
D)​system requirement
سؤال
A(n)_______ is a task that is performed by one person in response to a business event,adds value,and leaves the system in a stable condition.
سؤال
In using the event decomposition technique,which of the following is NOT a type of event that is considered?​

A)Event initiated by an external agent
B)​Event initiated by a point in time
C)Event initiated by a system change​
D)​Event initiated by a user login
سؤال
Acceptance criteria are usually associated with __________.

A)system controls
B)use cases
C)​user stories
D)elementary business events
سؤال
The UML notation for the "includes" relationship is a(n)_______.​

A)a solid arrow
B)​a dashed arrow
C)​a straight line
D)​a dashed line
سؤال
The boundary between the automated portion of the system and the users of the system is called the _______.​

A)software boundary
B)application boundary
C)system boundary
D)​automation boundary
سؤال
A one sentence description of a use case is called a(n)_______.​

A)brief use case description
B)​short use case description
C)​intermediate use case description
D)​use case description
سؤال
An external agent or person that interacts with the system by supplying data is called a(n)_______.​
سؤال
An event that occurs simply by reaching a point in time is called a(n)_______ ______.​
سؤال
The standard template for a user story is "As a <______ _____> I want to so that ". Fill in the blank.​
سؤال
List three types of events and provide descriptions for each.​
سؤال
A diagram that illustrates actors and their relationships to the functions provided by the system is called a(n)  ____ ____ _____.​
سؤال
List the steps for using the event decomposition technique.​
سؤال
A short sentence used by an end user that states what he/she does as part of his/her work is called a _______ _________.​
سؤال
Another name for a state event is a(n)  ______ _____.​
سؤال
An event that occurs when something inside the system triggers the need for processing,but usually as a consequence of external activity is called a _______ event.​
سؤال
The _______ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions.​
سؤال
The final part of a user story is the ______ ______,which indicates the features that must be present.​
سؤال
A relationship between use cases in which one use case is used by another use case is called the _________ _______.​
سؤال
An event that occurs outside the system is called a(n)_______.
سؤال
The _______ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.​
سؤال
The _______ technique is a technique to identify use cases by determining the external business events to which the system must respond.
سؤال
The _______ is the dividing line between the computerized portion of the system and the users who operate the system.​
سؤال
Checks and safety procedures that are put in place to protect the integrity of the system are called _______ ______ .​
سؤال
List the steps required to develop a Use Case Diagram.​
سؤال
A UML model that is used to show use cases and their relationships to actors is called a(n)_______.​
سؤال
Features of a particular user story that must be present in the final system are called _________.​
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/82
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Identifying User Stories and Use Cases
1
Real-time systems require the system to react immediately to things that are going on in the environment.​
True
2
During analysis the analyst should be sure to identify system control events such as the user logging in or out.​
False
3
During the interviews in the user goal technique,the analyst should not try to influence the users in discussing their work methods.​
False
4
Another name for a state event is an internal event.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
5
The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
6
One benefit of the event decomposition technique is that it helps to identify use cases at the right level of detail.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
7
Each use case is used by only one actor.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
8
One technique used to help decide which events apply to controls is to assume that technology is perfect.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
9
Temporal events always occur on a fixed date or at a fixed time.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
10
The event decomposition technique begins by identifying use cases.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
11
The end product of the event decomposition technique is a list of use cases at the right level of analysis.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
12
One way to determine whether an occurrence is an event or part of the interaction before or after an event is by asking if any long pauses or intervals occur.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
13
The analyst begins identifying state events by asking about the specific deadlines that the system must accommodate.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
14
Before using the user goal technique the analyst must first identify and classify all the types of system users.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
15
In a use case diagram,and actor must always be a person.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
16
A state event is an event that occurs when something happens outside the system that triggers the need for processing.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
17
A state event is a political or governmental activity.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
18
An actor is a person that plays a particular role within a business process.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
19
When describing an external event,there is no need to worry about the person or thing causing the event.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
20
When a customer buys an item of merchandise using his store credit account,a separate event is required to pay the store.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
21
The acceptance criteria can be used to generate test data.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
22
One technique to identify use cases is to ask users what they want to achieve with a particular business procedure. This technique is called the ______ technique.​

A)business procedure
B)event decomposition
C)​workflow
D)​user goal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following is an example of a temporal event?​

A)Month end billing is started
B)​User logs into the system
C)Customer updates address
D)​Inventory reorder occurs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
24
Another name for the "includes" relationship is the "uses" relationship.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
25
The acceptance criteria for a user story can be considered a contract between the developers and users.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
26
A customer wants to buy a new shirt can be considered an external event.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
27
The end of an event or a user case is when the system is at rest in a consistent state.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
28
The even decomposition technique begins by identifying all of the _______.​

A)operational users
B)​system users
C)business events
D)​internal events
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
29
The source of using the concept of events to define functional requirements was first emphasized with _______ systems.​

A)business
B)​operating
C)real-time
D)​batch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
30
The automation boundary is the same thing as the system boundary.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
31
The beginning step in defining use cases is always to obtain a user story.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
32
The type of event that occurs outside of the system is called a(n)_______.​

A)outside event
B)​external event
C)​business event
D)​temporal event
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
33
Highly Agile methodologies favor detailed use case documentation over sketchy user stories.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
34
An occurrence at a specific time and place,which can be described and is worth remember,is called a(n)_______.​

A)business process
B)event
C)requirement
D)business transaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
35
Something that occurs at a specific time and place and should be remember by the system is called a(n)_______.​

A)use case
B)elementary business process
C)user goal
D)event
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
36
The user goal technique normally begins by identifying,listing,and classifying _______ .​

A)the system users
B)the business events
C)the business processes
D)​the system stakeholders
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following is an example of a state event?​

A)A customer places an order
B)​It is time to send a late notice
C)​Management checks order status
D)Inventory reorder point is reached
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
38
A(n)_______ event occurs when something happens inside the system that triggers the need for processing.​

A)logical
B)​state
C)external
D)temporal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
39
State events are also sometimes called _______ events.​

A)external
B)trigger
C)​system
D)​internal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
40
An event that occurs by reaching a point in time is called a _______ event.​

A)internal
B)external
C)​timed
D)temporal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
41
In UML notation the includes relationship connects two use cases. The use case that is "included" use case is the one which _______ .​

A)is connected to the tail of an arrow
B)​is connected to the head of an arrow
C)​cannot be determined
D)is not connected to an actor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
42
An activity that the system performs in response to a user request is called a(n)_______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
43
​"Customer decides to buy a shirt" is an example of what?

A)An external event
B)​Activity prior to an event
C)​A temporal event
D)​Activity after an event.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
44
User stories are different than use cases in what way?

A)Different users identify them
B)​Differ in identified functions required
C)​Different focus
D)​Differ in the amount of detail captured
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
45
The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question: _______?​

A)Is the user finished with the task?
B)​Is the system at rest?
C)Is all the data input?
D)​Is all the printing completed?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
46
A(n)_______  is something that occurs at a specific time and place and can be precisely measured.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
47
"As a student,I want to register for a class in order to fulfill education requirements" is an example of a(n)_________________.

A)use case
B)​user story
C)​external event
D)​elementary business process
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
48
The _______ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions.​

A)perfect technology assumption
B)​ideal technology assumptions
C)​perfect processing control
D)ideal processing control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
49
The level of analysis to use when identifying user goals is the _______.​

A)external event level
B)​elementary business process level
C)​temporal event level
D)elementary activity level
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
50
Checks or safety procedures are put in place to protect the integrity of the system is referred to as _______.​

A)perfect technology assumption
B)risk control assumption
C)​system controls
D)technology protection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
51
Two primary techniques to identify use cases are _______ and _______.(Choose two)

A)user goal technique
B)CRUD technique
C)​system response technique
D)​event decomposition technique
E)business function technique​
F)user procedure technique
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
52
The technique used to identify use cases based on external,temporal,and state events is the _______.​

A)user goals technique
B)list of nouns technique
C)event decomposition technique
D)CRUD technique
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
53
In UML notation,the guillemets character is used to show what kind of notation?​

A)classes
B)​subordinates
C)​relationships
D)​stereotypes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
54
The system's reaction to an event is called a(n)_______ .​

A)system process
B)​use case
C)​activity
D)​system requirement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
55
A(n)_______ is a task that is performed by one person in response to a business event,adds value,and leaves the system in a stable condition.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
56
In using the event decomposition technique,which of the following is NOT a type of event that is considered?​

A)Event initiated by an external agent
B)​Event initiated by a point in time
C)Event initiated by a system change​
D)​Event initiated by a user login
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
57
Acceptance criteria are usually associated with __________.

A)system controls
B)use cases
C)​user stories
D)elementary business events
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
58
The UML notation for the "includes" relationship is a(n)_______.​

A)a solid arrow
B)​a dashed arrow
C)​a straight line
D)​a dashed line
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
59
The boundary between the automated portion of the system and the users of the system is called the _______.​

A)software boundary
B)application boundary
C)system boundary
D)​automation boundary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
60
A one sentence description of a use case is called a(n)_______.​

A)brief use case description
B)​short use case description
C)​intermediate use case description
D)​use case description
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
61
An external agent or person that interacts with the system by supplying data is called a(n)_______.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
62
An event that occurs simply by reaching a point in time is called a(n)_______ ______.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
63
The standard template for a user story is "As a <______ _____> I want to so that ". Fill in the blank.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
64
List three types of events and provide descriptions for each.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
65
A diagram that illustrates actors and their relationships to the functions provided by the system is called a(n)  ____ ____ _____.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
66
List the steps for using the event decomposition technique.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
67
A short sentence used by an end user that states what he/she does as part of his/her work is called a _______ _________.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
68
Another name for a state event is a(n)  ______ _____.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
69
An event that occurs when something inside the system triggers the need for processing,but usually as a consequence of external activity is called a _______ event.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
70
The _______ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
71
The final part of a user story is the ______ ______,which indicates the features that must be present.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
72
A relationship between use cases in which one use case is used by another use case is called the _________ _______.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
73
An event that occurs outside the system is called a(n)_______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
74
The _______ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
75
The _______ technique is a technique to identify use cases by determining the external business events to which the system must respond.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
76
The _______ is the dividing line between the computerized portion of the system and the users who operate the system.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
77
Checks and safety procedures that are put in place to protect the integrity of the system are called _______ ______ .​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
78
List the steps required to develop a Use Case Diagram.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
79
A UML model that is used to show use cases and their relationships to actors is called a(n)_______.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
80
Features of a particular user story that must be present in the final system are called _________.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 82 في هذه المجموعة.