Test Bank Systems Analysis and Design in a Changing World, 7th Edition Satzinger

October 30, 2017 | Author: SolutionsTest | Category: Use Case, Business Process, Information Technology, Information Technology Management, Systems Science
Share Embed Donate


Short Description

Download: https://goo.gl/MgppW8 systems analysis and design in a changing world, 7th edition test bank download system...

Description

Chapter 03: Identifying User Stories and Use Cases

Test Bank Systems Analysis And Design In A Changing World, 7th Edition Satzinger Completed download: https://testbankarea.com/download/systems-analysis-design-changing-world-7th-editiontest-bank-satzinger-jackson-burd/ Instructor manual Systems Analysis and Design in a Changing World 7th Edition Satzinger Jackson Burd Download link: https://testbankarea.com/download/systems-analysis-design-changingworld-7th-edition-solutions-manual-satzinger-jackson-burd/ 1. During the interviews in the user goal technique, the analyst should not try to influence the users in discussing their work methods. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p73 2. Before using the user goal technique the analyst must first identify and classify all the types of system users. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p73 3. One benefit of the event decomposition technique is that it helps to identify use cases at the right level of detail. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p74 4. The event decomposition technique begins by identifying use cases. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p75 5. The end product of the event decomposition technique is a list of use cases at the right level of analysis. a. True b. False Page 1

Chapter 03: Identifying User Stories and Use Cases ANSWER: True POINTS: 1 REFERENCES: p75-76 6. When describing an external event, there is no need to worry about the person or thing causing the event. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p76 7. Temporal events always occur on a fixed date or at a fixed time. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p77 8. A state event is a political or governmental activity. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p77 9. Another name for a state event is an internal event. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p77 10. When a customer buys an item of merchandise using his store credit account, a separate event is required to pay the store. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p78 11. During analysis the analyst should be sure to identify system control events such as the user logging in or out. a. True b. False ANSWER: False POINTS: 1 Page 2

Chapter 03: Identifying User Stories and Use Cases REFERENCES: p79 12. One way to determine whether an occurrence is an event or part of the interaction before or after an event is by asking if any long pauses or intervals occur. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p78 13. A state event is an event that occurs when something happens outside the system that triggers the need for processing. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p77-78 14. Real-time systems require the system to react immediately to things that are going on in the environment. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p76 15. The focus on external events is inappropriate when working with end users because discussing events tends to confuse the issues. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p76 16. The analyst begins identifying state events by asking about the specific deadlines that the system must accommodate. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p77 17. One technique used to help decide which events apply to controls is to assume that technology is perfect. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p79 Page 3

Chapter 03: Identifying User Stories and Use Cases 18. An actor is a person that plays a particular role within a business process. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p76 19. Each use case is used by only one actor. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p82-84 20. In a use case diagram, and actor must always be a person. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p81 21. Another name for the “includes” relationship is the “uses” relationship. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p87 22. Highly Agile methodologies favor detailed use case documentation over sketchy user stories. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p71 23. The beginning step in defining use cases is always to obtain a user story. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p71-73 24. The acceptance criteria can be used to generate test data. a. True b. False Page 4

Chapter 03: Identifying User Stories and Use Cases ANSWER: True POINTS: 1 REFERENCES: p72 25. The acceptance criteria for a user story can be considered a contract between the developers and users. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p72 26. A customer wants to buy a new shirt can be considered an external event. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p78 27. The end of an event or a user case is when the system is at rest in a consistent state. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p78 28. The automation boundary is the same thing as the system boundary. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p81 29. One technique to identify use cases is to ask users what they want to achieve with a particular business procedure. This technique is called the ______ technique. a. business procedure b. event decomposition c. workflow d. user goal ANSWER: d POINTS: 1 REFERENCES: p73 30. The even decomposition technique begins by identifying all of the _______. a. operational users b. system users Page 5

Chapter 03: Identifying User Stories and Use Cases c. business events d. internal events ANSWER: c POINTS: 1 REFERENCES: p74 31. Something that occurs at a specific time and place and should be remember by the system is called a(n) _______. a. use case b. elementary business process c. user goal d. event ANSWER: d POINTS: 1 REFERENCES: p74 32. The user goal technique normally begins by identifying, listing, and classifying _______ . a. the system users b. the business events c. the business processes d. the system stakeholders ANSWER: a POINTS: 1 REFERENCES: p73 33. The source of using the concept of events to define functional requirements was first emphasized with _______ systems. a. business b. operating c. real-time d. batch ANSWER: c POINTS: 1 REFERENCES: p75-76 34. The type of event that occurs outside of the system is called a(n) _______. a. outside event b. external event c. business event d. temporal event ANSWER: b POINTS: 1 REFERENCES: p76 35. An event that occurs by reaching a point in time is called a _______ event. a. internal Page 6

Chapter 03: Identifying User Stories and Use Cases b. external c. timed d. temporal ANSWER: d POINTS: 1 REFERENCES: p77 36. An occurrence at a specific time and place, which can be described and is worth remember, is called a(n) _______. a. business process b. event c. requirement d. business transaction ANSWER: b POINTS: 1 REFERENCES: p74 37. A(n) _______ event occurs when something happens inside the system that triggers the need for processing. a. logical b. state c. external d. temporal ANSWER: b POINTS: 1 REFERENCES: p77 38. Which of the following is an example of a state event? a. A customer places an order b. It is time to send a late notice c. Management checks order status d. Inventory reorder point is reached ANSWER: d POINTS: 1 REFERENCES: p77 39. Which of the following is an example of a temporal event? a. Month end billing is started b. User logs into the system c. Customer updates address d. Inventory reorder occurs ANSWER: a POINTS: 1 REFERENCES: p77 40. State events are also sometimes called _______ events. a. external Page 7

Chapter 03: Identifying User Stories and Use Cases b. trigger c. system d. internal ANSWER: d POINTS: 1 REFERENCES: p77 41. The way to determine whether an occurrence is an event or part of the interaction before or after the event is to ask the following question: _______? a. Is the user finished with the task? b. Is the system at rest? c. Is all the data input? d. Is all the printing completed? ANSWER: b POINTS: 1 REFERENCES: p78 42. “Customer decides to buy a shirt” is an example of what? a. An external event b. Activity prior to an event c. A temporal event d. Activity after an event. ANSWER: b POINTS: 1 REFERENCES: p78 43. Checks or safety procedures are put in place to protect the integrity of the system is referred to as _______. a. perfect technology assumption b. risk control assumption c. system controls d. technology protection ANSWER: c POINTS: 1 REFERENCES: p79 44. The _______ indicates that events should be included during analysis only if the system would be required to respond under ideal conditions. a. perfect technology assumption b. ideal technology assumptions c. perfect processing control d. ideal processing control ANSWER: a POINTS: 1 REFERENCES: p79 Page 8

Chapter 03: Identifying User Stories and Use Cases 45. In using the event decomposition technique, which of the following is NOT a type of event that is considered? a. Event initiated by an external agent b. Event initiated by a point in time c. Event initiated by a system change d. Event initiated by a user login ANSWER: d POINTS: 1 REFERENCES: p79 46. The system’s reaction to an event is called a(n) _______ . a. system process b. use case c. activity d. system requirement ANSWER: b POINTS: 1 REFERENCES: p73 p80 47. A one sentence description of a use case is called a(n) _______. a. brief use case description b. short use case description c. intermediate use case description d. use case description ANSWER: a POINTS: 1 REFERENCES: p81 48. The boundary between the automated portion of the system and the users of the system is called the _______. a. software boundary b. application boundary c. system boundary d. automation boundary ANSWER: d POINTS: 1 REFERENCES: p81 p84 49. In UML notation, the guillemets character is used to show what kind of notation? a. classes b. subordinates c. relationships d. stereotypes ANSWER: d POINTS: 1 Page 9

Chapter 03: Identifying User Stories and Use Cases REFERENCES: p87 50. The UML notation for the “includes” relationship is a(n) _______. a. a solid arrow b. a dashed arrow c. a straight line d. a dashed line ANSWER: b POINTS: 1 REFERENCES: p85 p86 51. In UML notation the includes relationship connects two use cases. The use case that is “included” use case is the one which _______ . a. is connected to the tail of an arrow b. is connected to the head of an arrow c. cannot be determined d. is not connected to an actor ANSWER: b POINTS: 1 REFERENCES: p85-86 52. The technique used to identify use cases based on external, temporal, and state events is the _______. a. user goals technique b. list of nouns technique c. event decomposition technique d. CRUD technique ANSWER: c POINTS: 1 REFERENCES: p77-78 53. The level of analysis to use when identifying user goals is the _______. a. external event level b. elementary business process level c. temporal event level d. elementary activity level ANSWER: b POINTS: 1 REFERENCES: p73 54. “As a student, I want to register for a class in order to fulfill education requirements” is an example of a(n) _________________. a. use case b. user story c. external event Page 10

Chapter 03: Identifying User Stories and Use Cases d. elementary business process ANSWER: b POINTS: 1 REFERENCES: p71 55. Acceptance criteria are usually associated with __________. a. system controls b. use cases c. user stories d. elementary business events ANSWER: c POINTS: 1 REFERENCES: p72 56. User stories are different than use cases in what way? a. Different users identify them b. Differ in identified functions required c. Different focus d. Differ in the amount of detail captured ANSWER: d POINTS: 1 REFERENCES: p71 57. Two primary techniques to identify use cases are _______ and _______. (Choose two) a. user goal technique b. CRUD technique c. system response technique d. event decomposition technique e. business function technique f. user procedure technique ANSWER: a, d POINTS: 1 REFERENCES: p73-74 58. An activity that the system performs in response to a user request is called a(n) _______. ANSWER: use case POINTS: 2 REFERENCES: p73 59. A(n) _______ is a task that is performed by one person in response to a business event, adds value, and leaves the system in a stable condition. ANSWER: elementary business process EBP POINTS: 2 REFERENCES: p74 Page 11

Chapter 03: Identifying User Stories and Use Cases 60. A(n) _______ is something that occurs at a specific time and place and can be precisely measured. ANSWER: event POINTS: 2 REFERENCES: p74 61. An external agent or person that interacts with the system by supplying data is called a(n) _______. ANSWER: actor POINTS: 2 REFERENCES: p76 62. An event that occurs simply by reaching a point in time is called a(n) _______ ______. ANSWER: temporal event POINTS: 2 REFERENCES: p77 63. The _______ states that events should be included during analysis only if the system would be required to respond under perfect technology conditions. ANSWER: perfect technology assumption POINTS: 2 REFERENCES: p79 64. Checks and safety procedures that are put in place to protect the integrity of the system are called _______ ______ . ANSWER: system controls POINTS: 2 REFERENCES: p79 65. A UML model that is used to show use cases and their relationships to actors is called a(n) _______. ANSWER: use case diagram POINTS: 2 REFERENCES: p81 66. The _______ is the dividing line between the computerized portion of the system and the users who operate the system. ANSWER: automation boundary POINTS: 2 REFERENCES: p81 67. The _______ technique is a technique to identify use cases by determining specific goals or objectives must be completed by a user. ANSWER: user goal user goal technique POINTS: 2 REFERENCES: p73 68. The _______ technique is a technique to identify use cases by determining the external business events to which the system must respond. ANSWER: event decomposition Page 12

Chapter 03: Identifying User Stories and Use Cases event decomposition technique POINTS: 2 REFERENCES: p74 69. An event that occurs outside the system is called a(n) _______. ANSWER: external event POINTS: 2 REFERENCES: p76 70. An event that occurs when something inside the system triggers the need for processing, but usually as a consequence of external activity is called a _______ event. ANSWER: state state event POINTS: 2 REFERENCES: p77 71. A short sentence used by an end user that states what he/she does as part of his/her work is called a _______ _________. ANSWER: user story POINTS: 2 REFERENCES: p71 72. Features of a particular user story that must be present in the final system are called _________. ANSWER: acceptance criteria POINTS: 2 REFERENCES: p72 73. The standard template for a user story is “As a I want to so that ”. Fill in the blank. ANSWER: role role played POINTS: 2 REFERENCES: p71 74. The final part of a user story is the ______ ______, which indicates the features that must be present. ANSWER: acceptance criteria POINTS: 2 REFERENCES: p72 75. Another name for a state event is a(n) ______ _____. ANSWER: internal event POINTS: 2 REFERENCES: p77 76. A diagram that illustrates actors and their relationships to the functions provided by the system is called a(n) ____ ____ _____. ANSWER: use case diagram use-case diagram Page 13

Chapter 03: Identifying User Stories and Use Cases POINTS: 2 REFERENCES: p81 77. A relationship between use cases in which one use case is used by another use case is called the _________ _______. ANSWER: includes relationship relationship POINTS: 2 REFERENCES: p87 78. List the steps for using the event decomposition technique. ANSWER: 1. Identify external events 2. Name a use case for each external event 3. Identify temporal events 4. Name a use case for each temporal event 5. Identify state events 6 Name a use case for each state event 7. Remove and perfect technology assumption events POINTS: 5 REFERENCES: p80 79. List the steps required to develop a Use Case Diagram. ANSWER: 1. Identify all the stakeholders who need to see a use case diagram. 2. Determine what is important for each stakeholder. 3. Organize the use cases for each communication need. Draw the use case diagrams. 4. Carefully name each diagram as it pertains to each stakeholder and user. POINTS: 5 REFERENCES: p87 80. List three types of events and provide descriptions for each. ANSWER: An external event is an event that occurs outside the system and is usually initiated by an external agent or actor. A second type of event is the temporal, which occurs as a result of reaching a point in time. A third type of even is a state event. This event occurs when something happens inside the system that triggers the need for processing. POINTS: 5 REFERENCES: p73-78 81. Describe two techniques for identifying use cases. Which is the most comprehensive approach? ANSWER: Two techniques for identifying use cases are the user goal technique and the event decomposition technique. The user goal technique involves identifying all actors or users of the system and asking, “What are their goals in using the system?” Goals are identified at the elementary business process (EBP) level of analysis. The event decomposition technique involves asking, “What events does the system need to respond to?” External events, temporal events, and state events are identified. The use case is what the system does to react to or respond to each event. The event table is used to catalog information about each event and the resulting use case. The event decomposition technique is the most comprehensive technique. Both techniques involve the idea of an elementary business process (EBS) being a system process in response to a business event. A third technique discussed in chapter 7 is the CRUD technique, where the analyst identifies for each domain class the create, read or report, update, and delete use cases required. In practice, multiple approaches should be used to cross check each other to assure all use cases are identified. Page 14

Chapter 03: Identifying User Stories and Use Cases POINTS: 5 REFERENCES: p69-74 82. List the eight steps to identify use cases using the user goal technique. ANSWER: 1. Identify users 2. Classify users by functional roles 3. Also classify by organizational level 4. Interview each type of user in each classification to identify goals 5. Build a preliminary list of use cases 6. Remove duplicates and inconsistencies 7. See where different users have the same needs (same use cases) 8. Review lists with each type of user POINTS: 5 REFERENCES: p73-74

More download links: systems analysis and design in a changing world, 7th edition test bank download systems analysis and design in a changing world 7th edition solution manual systems analysis and design in a changing world 7th edition pdf systems analysis and design in a changing world 7th edition ebook systems analysis and design in a changing world 7th edition answers systems analysis and design in a changing world 6th edition pdf download systems analysis and design in a changing world 6th edition solution manual systems analysis and design in a changing world 6th edition answers systems analysis and design in a changing world pdf

Page 15

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF