Chapter 4 Is
Chapter 4 Is
6. Which of the following is probably NOT a step for writing a use case?
a) Identify the use case
b) Identify the major steps within each use case
c) Identify elements within steps
d) Identify the analyst
e) Confirm the use case
8. Omar is an analyst building a use case. Which of the following project roles might be the most
important in terms of getting information about building the use case?
a) Users
b) Programmers
c) Other analysts
d) Project Sponsor
e) Equipment vendors
10. Austin is a systems analyst. Which of the follow people might be the most valuable to him in
developing a use case for an accounts payable system upgrade?
a) Beth, a software vendor for Peachtree Accounting Software
b) Amy, a team manager in the accounts payable department
c) Lisa, the project manager for the project
d) Casey, a fellow analyst who is more experienced in making use cases
e) Bill, a Java programmer in the applications development area.
11. Barb is an analyst developing a use case. Which of the following will probably NOT be on her
use case?
a) Importance level
b) Short Description
c) Information for steps
d) Destination for the major inputs
e) Type of trigger
12. Barton is an analyst developing a use case. Which of the following will probably NOT be on his
use case?
a) Description of data flows
b) Use case name
c) A use case number
d) Source for the major inputs
e) Type of trigger
13. Destination would be described on a use case in which of the following areas?:
a) Trigger
b) Major inputs
c) Major outputs
d) Primary actor
e) Importance level
15. Ralph wants to illustrate how a system interacts with the environment. The best solution for
him would be to use a ________:
a) Requirements flow chart
b) Storyboard
c) HIPO chart (hierarchy, input, process, output)
d) Use case
e) Gantt chart
16. Marta has asked the users of a system to picture themselves performing the processes and to
write down those processes in a sequential order. She should get a good idea of ________.
a) The major steps for each use case
b) The use case
c) The elements within steps
d) The temporal triggers
e) The external actors
17. You might have to go back and adjust the steps in a use case, if ____________
a) There are more than three major inputs to a step
b) The steps are of varying size
c) The trigger is an external one
d) The importance level is ‘high’
e) The primary actor is an external customer
18. Special cases (like customer cancels an appointment or returns an item) are: ____________
a) Frequently overlooked by users
b) Described on special ‘exception’ use cases
c) Not of importance at this stage
d) Written as exceptions at the bottom of the relevant use case
e) Given use case ID’s of “SC” (for special case) and a number
19. Role-playing the use case with actual users is a good way to:
a) Identify the use case
b) Identify the major steps within each use case
c) Identify elements within steps
d) Confirm the use case
e) Identify the primary actor
20. Use cases generally have three parts: _____.
a) Basic information, details, and event-driven modeling
b) Inputs and outputs, and events
c) Details, event-driven modeling, basic information
d) Technical feasibility, economic feasibility and organizational feasibility
e) Basic information, inputs and outputs, and details
22. After working with Chris (who is a staff member in the registrar’s office) on major steps in the
registration process, Maureen (a systems analyst) will:
a) Discuss these steps with Thomas, the project manager
b) Create data-entity maps
c) Create use cases
d) Create user interface screens
e) Create narrative storyboards
23. As a last step in building a use case for the study-abroad registration system, Brianna will:
a) Ask Patrick in the study abroad office to confirm the use case
b) Ask Wendy in the registrar’s office to confirm the use case
c) Ask Jonathan, a student who just completed a study-abroad experience, to confirm the use case
d) Ask Drew in the students affairs office to confirm the use case
e) Ask Taylor, another systems analyst to confirm the use case
24. The Major Inputs section on a use case will give the _____________
a) Sources of that input
b) Destinations of that input
c) Creator of that input
d) User of that input
e) What triggers the input to occur
25. The Major Outputs section on a use case will give the _________
a) Sources of that input
b) Destinations of that input
c) Creator of that input
d) User of that input
e) What triggers the input to occur
26. The Major Steps Performed section on a use case will give the _________
a) Name of the user for each step
b) What triggers each step
c) Where the processes will run (such as manual processes, client-server processes, etc.)
d) The telecommunications infrastructure requirements for that step
e) Information for each step
27. When developing the Major Inputs and Major Outputs for a use case, the analyst and users
should consider:
a) Only the common inputs and outputs
b) Developing separate use cases for every possible input and every possible output
c) All possible inputs and outputs (even with rare occurrences)
d) What triggers these inputs and outputs
e) Using activity elimination to see if these inputs and outputs are really needed
28. Arianna is an analyst studying credit card fraud. She is working on developing a use case for
when a stolen credit card is used. The trigger would be:
a) Customer starts to buy gas
b) Alarm is activated for stolen credit card use
c) Gas attendant asks for customer’s driver’s license
d) When the card-holder reports the card as stolen
e) When car pulls into gas station
29. The second principal part of use cases is ‘input and output’. Another name might be:
a) Origin and ending
b) Data normalization
c) Data flows
d) Parallelism
e) Program specifications
32. A Use Case is a formal way of representing how a business system interacts with its environment.
35. Use cases illustrate the activities that are performed by the users of the system.
36. Use cases are always internal and rarely shared or discussed with business users.
37. A use case depicts a set of activities performed to produce some output result.
38. Use cases are diagrams with three components: selection, process, iteration.
41. Each use case contains a fairly complete description of all the activities that occur in response to
a trigger event.
Each use case has the same name (like “Customer Relationship Management System”)
followed by an identifying letter (“A”, “B”, etc.).
43. Use cases are always numbered sequentially from start to finish.
44. The ‘primary actor’ is the external user that triggers the event to which the system responds.
45. The ‘primary actor’ is the internal action that occurs based on a SQL query (like: sort, select).
46. A trigger is based on cost/benefit analysis, like an employee labor report, a sale of an item, or
the purchase of new hardware.
47. External triggers might be something like a customer calling a doctor for an appointment or a
student registering for a class.
48. A temporal trigger might be related to time, such as 30 days have passed and a late fee needs to
be assessed.
50. The most common ways to gather information for use cases is with questionnaires of the
affected users.
51. Use cases generally have up to 20 major steps spelled out in great detail.
52. Dr. O’Brien’s dental office calls a patient three days before an appointment. This could be an
example of a temporal trigger.
53. Tina is a systems analysis and is describing how a system should react to an event. She is
creating a use case.
54. Liang has identified the payroll authorization office as the primary actor in a use case. This
would be incorrect as primary actors need to be singular like a customer or a patient or a
student.
55. Project managers, business analysts and systems analysts create all use cases without user
input.
56. The final step in Building Use Cases is to use a CASE analysis tool to verify that the inputs and
outputs are discrete items triggered by external events.