Use cases, Software Engineering

Assignment Help:

1. Perform a requirements analysis for the Case Study. Express the results using the following artefacts:

    a. A use case diagram for the functional requirements of the entire system, accompanied by:
        i. Short use case descriptions for each use case
    b. A system-wide (non-functional) requirement document.
2. Select the two (2) most essential use cases in the system, and produce full use case descriptions for each one. For each of these two most essential use cases, also produce an activity diagram that expresses the workflows for that use case.

Use Case Realization

3. Develop a domain model for the Case Study. Express your model with a class diagram, showing any inheritance and compositional relationships.

4. For each of the two selected most essential use cases, develop use case realizations showing the sequence of messages involved. Express these use case realizations in separate communication diagrams.

5. For each of the two selected most essential use cases, translate the communication diagram produced for Task 4 into an equivalent sequence diagram.


Related Discussions:- Use cases

What is big-bang strategy, Explain Big-Bang Strategy? Ans) Big-Bang appr...

Explain Big-Bang Strategy? Ans) Big-Bang approach is very easy in its philosophy where basically all the modules or builds are constructed and tested independently of each other

What is function points, Q. What is Function points? Function points :...

Q. What is Function points? Function points : Function point calculates the functionality from the user opinion that is on the basis of what the user request and receives in r

Explain the brooks law, Define Brooks law. Software was delivered late...

Define Brooks law. Software was delivered late, was defective, cost several times the original estimates and often showed poor performance characteristics.

FTR., Formal technical review in railway reservation system

Formal technical review in railway reservation system

Preventive and protective strategies in Cyber Secur, After users are authe...

After users are authenticated, what measures can be employed in order to maintain security when users are away from their computers? 2. Discuss ways in which the use of strong au

What do you understand by the term integrity, Question: (a) What do yo...

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

How is cyclomatic complexity useful in program test, How is cyclomatic comp...

How is cyclomatic complexity useful in program test? Cyclomatic complexity calculates the amount of decision logic in a single software module. It is used for two related purpo

Discuss the various strategies of design, Discuss the various strategies of...

Discuss the various strategies of design.  The design strategies are:      Functional design:   The system is designed from a functional viewpoint, initialising from with a

What is parallel testing, Testing a new or an changed data processing syste...

Testing a new or an changed data processing system with the similar source data that is used in another system. The other system is taken as the standard of comparison.

What is a state transition diagram, What is a state transition diagram? ...

What is a state transition diagram? State transition diagram is mainly a collection of states and events. The events cause the system to change its state. It also shows what ac

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd