SlideShare a Scribd company logo
Lecture 06

 The UML allows us to extend and reuse already
defined use cases by defining the relationship among
them. Use cases can be reused and extended in two
different fashions: extends and uses.
Relationship among Use Cases

Reuse and Extension
An Example

Extended User
An Example

 An elaborated use case has the following components:
 Priority: the relative implementation priority of the use case.
 Actors: names of the actors that use this use case.
 Summary: a brief description of the use case.
 Precondition: the condition that must be met before the use case can be
invoked.
 Post-Condition: the state of the system after completion of the use case.
 Extend: the use case it extends, if any.
 Includes: the use case it uses, if any.
 Normal Course of Events: sequence of actions in the case of normal
use.
 Alternative Path: deviations from the normal course.
 Exception: course of action in the case of some exceptional condition.
 Assumption: all the assumptions that have been taken for this use
case.
Describing a Use Cases

 Use Case Name: Delete Information
 Priority: 3
 Actors: User
 Summary: Deleting information allows the user to permanently remove
information from the system. Deleting information is only possible when
the information has not been used in the system.
Use Case Example
Delete Information
 Preconditions: Information was previously saved to the system and a user needs to
permanently delete the information.
 Post-Conditions: The information is no longer available anywhere in the system.
 Includes: Record Transactions, Cancel Action
 Extends: None
 Normal Course of Events:
1. The use case starts when the user wants to delete an entire set of information such as
a user, commission plan, or group.
2. The user selects the set of information that he/she would like to delete and directs
the system to delete the information. Exception 1, 2
3. The system responds by asking the user to confirm deleting the information.
4. The user confirms deletion.
Alternative Path: Cancel Action
5. A system responds by deleting the information and notifying the user that the
information was deleted from the system.
6. Uses: Record Transaction
7. This use case ends.
Use Case Example
Delete Information

 Alternative Path - The user does not confirm Deletion
1. If the user does not confirm deletion, the information does not delete.
2. Uses: Cancel Action
 Exceptions:
1. The system will not allow a user to delete information that is being
used in the system.
2. The system will not allow a user to delete another user that has
subordinates.
 Assumptions:
1. Deleting information covers a permanent deletion of an entire set of
data such as a commission plan, user, group etc. Deleting a portion
of an entire set constitutes modifying the set of data.
2. Deleted information is not retained in the system.
3. A user can only delete information that has not been used in the
system.
Use Case Example
Delete Information

Activity Diagram

 Usability
 Color blind people should not have any difficulty in using the system – color
coding should take care of common forms of color blindness.
 Reliability
 The system needs to support 7 x 24 operation
 Performance
 Authorization should be completed within 1 minute 90% of the time.
 Average authorization confirmation time should not exceed 30 seconds.
 Portability
 The system should run on Windows 98 and above as well as Sun Solaris 7.0 and
above.
 Access
 System should be accessible over the internet – hidden requirement – security
 Because of this shortcoming, use cases must be augmented by additional
information.
Limitations of Use Cases

More Related Content

PPTX
Lecture 07
PPTX
Lecture 15
PPTX
Lecture 03
PPTX
Lecture 09
PPTX
Lecture 02
PPTX
Lecture 12
PPTX
Lecture 11
PPTX
Lecture 08
Lecture 07
Lecture 15
Lecture 03
Lecture 09
Lecture 02
Lecture 12
Lecture 11
Lecture 08

Viewers also liked (11)

PPTX
Lecture 05
PPTX
Lecture 01
PPTX
PPTX
Lecture 13
PPTX
Lecture 04
PPTX
Lecture 10
PPTX
Lecture 14
PPTX
Software Engineering - Lecture 02
PDF
Software engineering lecture notes
PPTX
CSC426 - Software Engineering Lecture Note
PDF
Software engineering lecture notes
Lecture 05
Lecture 01
Lecture 13
Lecture 04
Lecture 10
Lecture 14
Software Engineering - Lecture 02
Software engineering lecture notes
CSC426 - Software Engineering Lecture Note
Software engineering lecture notes
Ad

Similar to Lecture 06 (20)

PPT
PDF
Lecture7 use case modeling
PPT
06 RE_use case diagm1.ppt
PPT
chapter_5_5.ppt
PPT
Use case Diagram
PPTX
Lecture no 8 use case modeling and use case diagrams
PPTX
SAD06 - Use Case Diagrams
PPTX
USE case diagrams.ppt.pptx..............
PPTX
Lecture#04, use case diagram
PPT
Use Cases A Comprehensive Look
PPTX
StructureofUseCases.pptx
PDF
Lect_4_Requirement Modeling(Use Case_and_Static).pdf
PDF
SE_Lec 08_UML Use Cases
PDF
6-UseCfgfhgfhgfhgfhgfhfhhaseActivity.pdf
PPTX
conversion-gate02.pptx
PPTX
Use Case Analysis and Diagramming
PDF
Use case descriptions and system level scenarios(adela & ligia)
PPT
Use Case Diagram
PPT
Use Case Model
PPT
Use case modeling
Lecture7 use case modeling
06 RE_use case diagm1.ppt
chapter_5_5.ppt
Use case Diagram
Lecture no 8 use case modeling and use case diagrams
SAD06 - Use Case Diagrams
USE case diagrams.ppt.pptx..............
Lecture#04, use case diagram
Use Cases A Comprehensive Look
StructureofUseCases.pptx
Lect_4_Requirement Modeling(Use Case_and_Static).pdf
SE_Lec 08_UML Use Cases
6-UseCfgfhgfhgfhgfhgfhfhhaseActivity.pdf
conversion-gate02.pptx
Use Case Analysis and Diagramming
Use case descriptions and system level scenarios(adela & ligia)
Use Case Diagram
Use Case Model
Use case modeling
Ad

Lecture 06

  • 2.   The UML allows us to extend and reuse already defined use cases by defining the relationship among them. Use cases can be reused and extended in two different fashions: extends and uses. Relationship among Use Cases
  • 5.   An elaborated use case has the following components:  Priority: the relative implementation priority of the use case.  Actors: names of the actors that use this use case.  Summary: a brief description of the use case.  Precondition: the condition that must be met before the use case can be invoked.  Post-Condition: the state of the system after completion of the use case.  Extend: the use case it extends, if any.  Includes: the use case it uses, if any.  Normal Course of Events: sequence of actions in the case of normal use.  Alternative Path: deviations from the normal course.  Exception: course of action in the case of some exceptional condition.  Assumption: all the assumptions that have been taken for this use case. Describing a Use Cases
  • 6.   Use Case Name: Delete Information  Priority: 3  Actors: User  Summary: Deleting information allows the user to permanently remove information from the system. Deleting information is only possible when the information has not been used in the system. Use Case Example Delete Information
  • 7.  Preconditions: Information was previously saved to the system and a user needs to permanently delete the information.  Post-Conditions: The information is no longer available anywhere in the system.  Includes: Record Transactions, Cancel Action  Extends: None  Normal Course of Events: 1. The use case starts when the user wants to delete an entire set of information such as a user, commission plan, or group. 2. The user selects the set of information that he/she would like to delete and directs the system to delete the information. Exception 1, 2 3. The system responds by asking the user to confirm deleting the information. 4. The user confirms deletion. Alternative Path: Cancel Action 5. A system responds by deleting the information and notifying the user that the information was deleted from the system. 6. Uses: Record Transaction 7. This use case ends. Use Case Example Delete Information
  • 8.   Alternative Path - The user does not confirm Deletion 1. If the user does not confirm deletion, the information does not delete. 2. Uses: Cancel Action  Exceptions: 1. The system will not allow a user to delete information that is being used in the system. 2. The system will not allow a user to delete another user that has subordinates.  Assumptions: 1. Deleting information covers a permanent deletion of an entire set of data such as a commission plan, user, group etc. Deleting a portion of an entire set constitutes modifying the set of data. 2. Deleted information is not retained in the system. 3. A user can only delete information that has not been used in the system. Use Case Example Delete Information
  • 10.   Usability  Color blind people should not have any difficulty in using the system – color coding should take care of common forms of color blindness.  Reliability  The system needs to support 7 x 24 operation  Performance  Authorization should be completed within 1 minute 90% of the time.  Average authorization confirmation time should not exceed 30 seconds.  Portability  The system should run on Windows 98 and above as well as Sun Solaris 7.0 and above.  Access  System should be accessible over the internet – hidden requirement – security  Because of this shortcoming, use cases must be augmented by additional information. Limitations of Use Cases