SlideShare a Scribd company logo
Use case 1: User Login:
Actor: Admin, Faculty, or Student
Basic Flow
1. User clicks the login link or enters the login URL into the
browser.
2. The system displays login page.
3. User clicks login (Submit) button after entering the
credentials and roles.
4. According to the role, the system retrieves a “User List”.
5. The system checks to see if the username exists in the “User
List”.
6. If the account exists, the system compares the password.
7. If the input password is valid, based on the role provided, the
system starts an authenticated session, retrieve Faculty List and
displays View Faculty page (landing page).
Alternate Flow
Invalid username or password: The system checks to see if the
username exists in the “Users”. If the username is not found, the
system displays a message “Invalid username. Click on “OK” to
try again.” The user clicks on the “OK” button. The system
redisplays login page. User clicks on the forgot username link.
The system asks user to enter his/her email address. User enters
the email address associated with his/her account. The system
displays a message ”Username was sent to your email.”
Use Case 2: Admin Adds Student
Normal Flow:
1. Admin selects the “Students” tab in the “Admin home page”,
2. System retrieves Student_list and displays “Student View”
page.
3. Admin clicks “New Student” button.
4. System displays “Add student” page.
5. Admin Provides student details by selecting the institute
name from dropdown box, enters student’s details
6. Admin clicks on “Save” button.
7. System validates the entered data;
8. System Save data to the database, if valid.
9. System displays successfully saved message on top of student
list, which includes the new added student.
Use case 3: Team Member Makes Comments on Assessment
Done by other Members:
Basic Course:
1. Student clicks “Make a Comment” button on the
“ViewPeerAssessment” Page.
2. The system checks the Session to make sure the student is
logged in and then displays a Write Comment page with a multi-
line Text box.
3. Student writes a comment on the comment box.
4. Student clicks on the “Save” button.
5. The system validates the comment (e.g. not too long, or too
short).
6. If the comment validation is ok, the system display a
confirmation page, and send the comment to Instructor for
approval.
States Machine for “comments on assessment”
Comments created by evaluate
Comments Approved by instructor
Comments displayed to students
Comments disapproved by instructor
Comments revised by evaluate
Alternate Course
Too long or short comment: The system displays a message
“Comment length is out side the allowable range. Click on
“OK” to try again.”
Robustness Analysis
OutlineWhat is robustness analysis?Key roles in robustness
analysisObject types found in discoveryDiagramming
rulesWhere are the diagram and objects placed in the
modelUpdates to the static modelRobustness Analysis
StepsExample robustness analysisDesign following robustness
What Is Robustness Analysis?
Bridge between analysis and design, helps define objects
participating in use cases
Key Roles in Robustness AnalysisRobustness AnalysisClass
Discovery - fine missing classes like <<control>>,
<<boundary>> and <<interface>> typesCompleteness Check –
walk through use case scenarios and make sure all alternative
paths are coveredSanity Check – does the use case specify
behavior that is reasonable and able to be implemented
Establishes Basis for Sequence Diagrams – quickly drawn and
can identify issues prior to building sequence diagrams
Object Types Found in Discovery
External facing
windows, screens,
dialogs, menus, in
our example web
pages.
Map to database
tables for
persistent objects
Application
logic and process
control
Reader
object
Accesses
database
Tables (author)
Diagramming Rules
Updates To The Static Domain Model
Robustness analysis steps:
Decompose narrative use case flow into “steps”.
Use objects from the domain model and link them together to
simulate these steps.
Add missing classes and associations in the domain model
during step (2).
Use terms from the domain model to disambiguate the use case
during step (2).
Complete other information in use case text that might be
missing during step (2).
Alternative flows in use case descriptions may be highlighted or
colored in the robustness diagram to distinct from the nominal
flow.
Robustness Example
TheEyesHaveIt.com
“Register a Seller”
Use Case Diagram
Register a Seller
Use Case “Register a Seller”Preconditions SELLER must not
exist in systemUse Case DescriptionPrimary Flow:The SELLER
is directed to a secure Web page.The SELLER must enter a user
name, password, address, telephone, and e-mail address.All data
is is validated when the SELLER submits request.The password
should be entered twice to verify typing errors. the submit
button. Alternate Flow:The SELLER can cancel the registration
process and return to the main page.Alternate Flow:Data entered
is not complete causing registration form to be redisplayed with
errors highlighted.Alternate Flow:The SELLER has previously
registered or a duplicate name exists causing the registration
form to be redisplayedPostconditionsAn entry for SELLER
information is created in the database.An new ACCOUNT is
created for the SELLER.
“Register a Seller” UI Prototype
Incomplete data or duplicate person
Robustness Analysis New ObjectsPotential design objects
include:Registration Page <<boundary>> web page for seller
registrationRegistration Controller <<controller>> controller
object for managing the registration process Submit Button
<<boundary>> part of the registration web pageCancel Button
<<boundary>> part of the registration web pageValidation
Controller <<controller>> controls the process of data
validation
Example Robustness Analysis
Object Discovery
New objects discovered during robustness analysis
Design
Classes
Object
Sequence
Youtube ResourceUML Tutorial 5.1 - Basics of UML Sequence
Diagrams for Robustness Analysis in Eclipse with
Papyrushttps://www.youtube.com/watch?v=aKNh08Vq_78
Assignment – Requirements
for Use Cases Revise Use case: two-paragraph description (main
flow and alternative flow)numbered listCreate activity diagram
for each use case based on:Main flow Domain modelScreen
mock-upsRobustness AnalysisRobustness Diagram
Use case example
Robustness Analysis
Use case description with domain model
*
Robustness Diagram
Revised usecase description, revised domain model and
robustness diagram
*
Quality Attributes of Robustness Diagrams
Use case description with domain model
*
Revised usecase description, revised domain model and
robustness diagram
*
Register a seller
Seller
(from Actors)
Register
<<communicate>>
Validation Controller
Registration Controller
process registration
Account
(from Business Domain Model)
create
SellerEntity
(from Business Domain Model)
1
1
1
1
create
Submit Button
registration info
Cancel Button
Registration Page
highlight bad entries
displays
displays
cancel
IN: new registration from
authentication page
OUT: processed registration to
authentication page
OUT: cancel to main menu
Seller
(from Actors)
Enter Info
submit
Cancel
`
Perform robustness analysis:
1. Decompose narrative use case flow into “steps”.
2. Use objects from the domain model and simulate these steps
with a swim lane Activity diagram.
3. Add missing classes and associations in the domain model
during step (2).
4. Use terms from the domain model to disambiguate the use
case during step (2).
5. Complete other information in use case text that might be
missing during step (2).
6. Following diagramming rules, develop a robustness diagram
for each use case using MVC architectural pattern. The general
objects layout in the robustness diagram: view objects are on
left side; entity objects are on the right side; the controllers are
in the middle. Alternative flows in use case descriptions may be
highlighted or colored in the robustness diagram to distinct
from the nominal flow.
Use case 1 User LoginActor Admin, Faculty, or StudentBa.docx

More Related Content

Similar to Use case 1 User LoginActor Admin, Faculty, or StudentBa.docx

IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COMIT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
albert0061
 
From Use case to User Story
From Use case to User StoryFrom Use case to User Story
From Use case to User Story
Kunta Hutabarat
 
Use Case UML Diagram
Use Case UML DiagramUse Case UML Diagram
Use Case UML Diagram
University of Texas at Dallas
 
chapter_5_5.ppt
chapter_5_5.pptchapter_5_5.ppt
chapter_5_5.ppt
MonirHossain707319
 
Sample usecase educationdetails
Sample usecase educationdetailsSample usecase educationdetails
Sample usecase educationdetails
Vivek Srivastava
 
types of testing with descriptions and examples
types of testing with descriptions and examplestypes of testing with descriptions and examples
types of testing with descriptions and examples
Mani Deepak Choudhry
 
Distributed Exam system
Distributed Exam systemDistributed Exam system
Distributed Exam system
GCWUF
 
Strayer cis 524 week 7 case study 3 security new
Strayer cis 524 week 7 case study 3 security newStrayer cis 524 week 7 case study 3 security new
Strayer cis 524 week 7 case study 3 security new
olivergeorg
 
conversion-gate02.pptx
conversion-gate02.pptxconversion-gate02.pptx
conversion-gate02.pptx
NouraBaccar1
 
Strayer cis 524 week 7 case study 3 security new
Strayer cis 524 week 7 case study 3 security newStrayer cis 524 week 7 case study 3 security new
Strayer cis 524 week 7 case study 3 security new
Haashimm
 
Assignment Grading Rubric Course IT286 Unit 4 Po.docx
Assignment Grading Rubric  Course IT286   Unit 4    Po.docxAssignment Grading Rubric  Course IT286   Unit 4    Po.docx
Assignment Grading Rubric Course IT286 Unit 4 Po.docx
ssuser562afc1
 
Devry cis 524 week 7 case study 3 security new
Devry cis 524 week 7 case study 3 security newDevry cis 524 week 7 case study 3 security new
Devry cis 524 week 7 case study 3 security new
matthewtaylorliam12
 
User stories through Five W's technique
User stories through Five W's  techniqueUser stories through Five W's  technique
User stories through Five W's technique
Eduardo Hernández Rangel, MCC, PMP, ITIL Cer, Scrum Master
 
B4 u solution_writing test cases from user stories and acceptance criteria
B4 u solution_writing test cases from user stories and acceptance criteriaB4 u solution_writing test cases from user stories and acceptance criteria
B4 u solution_writing test cases from user stories and acceptance criteria
b4usolution .
 
Requirements Are Optional, Right?
Requirements Are Optional, Right?Requirements Are Optional, Right?
Requirements Are Optional, Right?
thomstrat
 
Chapter 3 SOFTWARE TESTING PROCESS
Chapter 3 SOFTWARE TESTING PROCESSChapter 3 SOFTWARE TESTING PROCESS
Chapter 3 SOFTWARE TESTING PROCESS
st. michael
 
Design Document Sample
Design Document SampleDesign Document Sample
Design Document Sample
Steve Smith
 
Writing test cases from user stories and acceptance criteria
Writing test cases from user stories and acceptance criteria Writing test cases from user stories and acceptance criteria
Writing test cases from user stories and acceptance criteria
An Nguyen
 
Microsoft az-204 download free demo at dumps cafe
Microsoft az-204 download free demo at dumps cafeMicrosoft az-204 download free demo at dumps cafe
Microsoft az-204 download free demo at dumps cafe
JeannieHeldt
 
Student_result_management_system_project.doc
Student_result_management_system_project.docStudent_result_management_system_project.doc
Student_result_management_system_project.doc
AnshChhabra6
 

Similar to Use case 1 User LoginActor Admin, Faculty, or StudentBa.docx (20)

IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COMIT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
 
From Use case to User Story
From Use case to User StoryFrom Use case to User Story
From Use case to User Story
 
Use Case UML Diagram
Use Case UML DiagramUse Case UML Diagram
Use Case UML Diagram
 
chapter_5_5.ppt
chapter_5_5.pptchapter_5_5.ppt
chapter_5_5.ppt
 
Sample usecase educationdetails
Sample usecase educationdetailsSample usecase educationdetails
Sample usecase educationdetails
 
types of testing with descriptions and examples
types of testing with descriptions and examplestypes of testing with descriptions and examples
types of testing with descriptions and examples
 
Distributed Exam system
Distributed Exam systemDistributed Exam system
Distributed Exam system
 
Strayer cis 524 week 7 case study 3 security new
Strayer cis 524 week 7 case study 3 security newStrayer cis 524 week 7 case study 3 security new
Strayer cis 524 week 7 case study 3 security new
 
conversion-gate02.pptx
conversion-gate02.pptxconversion-gate02.pptx
conversion-gate02.pptx
 
Strayer cis 524 week 7 case study 3 security new
Strayer cis 524 week 7 case study 3 security newStrayer cis 524 week 7 case study 3 security new
Strayer cis 524 week 7 case study 3 security new
 
Assignment Grading Rubric Course IT286 Unit 4 Po.docx
Assignment Grading Rubric  Course IT286   Unit 4    Po.docxAssignment Grading Rubric  Course IT286   Unit 4    Po.docx
Assignment Grading Rubric Course IT286 Unit 4 Po.docx
 
Devry cis 524 week 7 case study 3 security new
Devry cis 524 week 7 case study 3 security newDevry cis 524 week 7 case study 3 security new
Devry cis 524 week 7 case study 3 security new
 
User stories through Five W's technique
User stories through Five W's  techniqueUser stories through Five W's  technique
User stories through Five W's technique
 
B4 u solution_writing test cases from user stories and acceptance criteria
B4 u solution_writing test cases from user stories and acceptance criteriaB4 u solution_writing test cases from user stories and acceptance criteria
B4 u solution_writing test cases from user stories and acceptance criteria
 
Requirements Are Optional, Right?
Requirements Are Optional, Right?Requirements Are Optional, Right?
Requirements Are Optional, Right?
 
Chapter 3 SOFTWARE TESTING PROCESS
Chapter 3 SOFTWARE TESTING PROCESSChapter 3 SOFTWARE TESTING PROCESS
Chapter 3 SOFTWARE TESTING PROCESS
 
Design Document Sample
Design Document SampleDesign Document Sample
Design Document Sample
 
Writing test cases from user stories and acceptance criteria
Writing test cases from user stories and acceptance criteria Writing test cases from user stories and acceptance criteria
Writing test cases from user stories and acceptance criteria
 
Microsoft az-204 download free demo at dumps cafe
Microsoft az-204 download free demo at dumps cafeMicrosoft az-204 download free demo at dumps cafe
Microsoft az-204 download free demo at dumps cafe
 
Student_result_management_system_project.doc
Student_result_management_system_project.docStudent_result_management_system_project.doc
Student_result_management_system_project.doc
 

More from jessiehampson

Milestones Navigating Late Childhood to AdolescenceFrom the m.docx
Milestones Navigating Late Childhood to AdolescenceFrom the m.docxMilestones Navigating Late Childhood to AdolescenceFrom the m.docx
Milestones Navigating Late Childhood to AdolescenceFrom the m.docx
jessiehampson
 
Migration and RefugeesMany immigrants in the region flee persecu.docx
Migration and RefugeesMany immigrants in the region flee persecu.docxMigration and RefugeesMany immigrants in the region flee persecu.docx
Migration and RefugeesMany immigrants in the region flee persecu.docx
jessiehampson
 
Min-2 pagesThe goal is to develop a professional document, take .docx
Min-2 pagesThe goal is to develop a professional document, take .docxMin-2 pagesThe goal is to develop a professional document, take .docx
Min-2 pagesThe goal is to develop a professional document, take .docx
jessiehampson
 
Mingzhi HuFirst Paper352020POLS 203Applicati.docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docxMingzhi HuFirst Paper352020POLS 203Applicati.docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docx
jessiehampson
 
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docxMiller, 1 Sarah Miller Professor Kristen Johnson C.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
jessiehampson
 
Migrating to the Cloud Please respond to the following1. .docx
Migrating to the Cloud Please respond to the following1. .docxMigrating to the Cloud Please respond to the following1. .docx
Migrating to the Cloud Please respond to the following1. .docx
jessiehampson
 
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docxMike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
jessiehampson
 
Michelle Wrote; There are several different reasons why an inter.docx
Michelle Wrote; There are several different reasons why an inter.docxMichelle Wrote; There are several different reasons why an inter.docx
Michelle Wrote; There are several different reasons why an inter.docx
jessiehampson
 
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
Midterm Lad Report     7Midterm Lab ReportIntroductionCell.docxMidterm Lad Report     7Midterm Lab ReportIntroductionCell.docx
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
jessiehampson
 
MicroEssay Identify a behavioral tendency that you believe.docx
MicroEssay Identify a behavioral tendency that you believe.docxMicroEssay Identify a behavioral tendency that you believe.docx
MicroEssay Identify a behavioral tendency that you believe.docx
jessiehampson
 
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docxMILNETVisionMILNETs vision is to leverage the diverse mili.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
jessiehampson
 
midtermAnswer all question with proper number atleast 1 and half.docx
midtermAnswer all question with proper number atleast 1 and half.docxmidtermAnswer all question with proper number atleast 1 and half.docx
midtermAnswer all question with proper number atleast 1 and half.docx
jessiehampson
 
Midterm QuestionIs the movement towards human security a true .docx
Midterm QuestionIs the movement towards human security a true .docxMidterm QuestionIs the movement towards human security a true .docx
Midterm QuestionIs the movement towards human security a true .docx
jessiehampson
 
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docxMGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
jessiehampson
 
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
Microsoft Word Editing  Version 1.0Software Requirement Speci.docxMicrosoft Word Editing  Version 1.0Software Requirement Speci.docx
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
jessiehampson
 
Microsoft Windows implements access controls by allowing organiz.docx
Microsoft Windows implements access controls by allowing organiz.docxMicrosoft Windows implements access controls by allowing organiz.docx
Microsoft Windows implements access controls by allowing organiz.docx
jessiehampson
 
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
MGT520  Critical Thinking Writing Rubric - Module 10   .docxMGT520  Critical Thinking Writing Rubric - Module 10   .docx
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
jessiehampson
 
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docxMidterm PaperThe Midterm Paper is worth 100 points. It will .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
jessiehampson
 
Miami Florida is considered ground zero for climate change, in parti.docx
Miami Florida is considered ground zero for climate change, in parti.docxMiami Florida is considered ground zero for climate change, in parti.docx
Miami Florida is considered ground zero for climate change, in parti.docx
jessiehampson
 
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docxMGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
jessiehampson
 

More from jessiehampson (20)

Milestones Navigating Late Childhood to AdolescenceFrom the m.docx
Milestones Navigating Late Childhood to AdolescenceFrom the m.docxMilestones Navigating Late Childhood to AdolescenceFrom the m.docx
Milestones Navigating Late Childhood to AdolescenceFrom the m.docx
 
Migration and RefugeesMany immigrants in the region flee persecu.docx
Migration and RefugeesMany immigrants in the region flee persecu.docxMigration and RefugeesMany immigrants in the region flee persecu.docx
Migration and RefugeesMany immigrants in the region flee persecu.docx
 
Min-2 pagesThe goal is to develop a professional document, take .docx
Min-2 pagesThe goal is to develop a professional document, take .docxMin-2 pagesThe goal is to develop a professional document, take .docx
Min-2 pagesThe goal is to develop a professional document, take .docx
 
Mingzhi HuFirst Paper352020POLS 203Applicati.docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docxMingzhi HuFirst Paper352020POLS 203Applicati.docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docx
 
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docxMiller, 1 Sarah Miller Professor Kristen Johnson C.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
 
Migrating to the Cloud Please respond to the following1. .docx
Migrating to the Cloud Please respond to the following1. .docxMigrating to the Cloud Please respond to the following1. .docx
Migrating to the Cloud Please respond to the following1. .docx
 
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docxMike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
 
Michelle Wrote; There are several different reasons why an inter.docx
Michelle Wrote; There are several different reasons why an inter.docxMichelle Wrote; There are several different reasons why an inter.docx
Michelle Wrote; There are several different reasons why an inter.docx
 
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
Midterm Lad Report     7Midterm Lab ReportIntroductionCell.docxMidterm Lad Report     7Midterm Lab ReportIntroductionCell.docx
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
 
MicroEssay Identify a behavioral tendency that you believe.docx
MicroEssay Identify a behavioral tendency that you believe.docxMicroEssay Identify a behavioral tendency that you believe.docx
MicroEssay Identify a behavioral tendency that you believe.docx
 
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docxMILNETVisionMILNETs vision is to leverage the diverse mili.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
 
midtermAnswer all question with proper number atleast 1 and half.docx
midtermAnswer all question with proper number atleast 1 and half.docxmidtermAnswer all question with proper number atleast 1 and half.docx
midtermAnswer all question with proper number atleast 1 and half.docx
 
Midterm QuestionIs the movement towards human security a true .docx
Midterm QuestionIs the movement towards human security a true .docxMidterm QuestionIs the movement towards human security a true .docx
Midterm QuestionIs the movement towards human security a true .docx
 
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docxMGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
 
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
Microsoft Word Editing  Version 1.0Software Requirement Speci.docxMicrosoft Word Editing  Version 1.0Software Requirement Speci.docx
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
 
Microsoft Windows implements access controls by allowing organiz.docx
Microsoft Windows implements access controls by allowing organiz.docxMicrosoft Windows implements access controls by allowing organiz.docx
Microsoft Windows implements access controls by allowing organiz.docx
 
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
MGT520  Critical Thinking Writing Rubric - Module 10   .docxMGT520  Critical Thinking Writing Rubric - Module 10   .docx
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
 
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docxMidterm PaperThe Midterm Paper is worth 100 points. It will .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
 
Miami Florida is considered ground zero for climate change, in parti.docx
Miami Florida is considered ground zero for climate change, in parti.docxMiami Florida is considered ground zero for climate change, in parti.docx
Miami Florida is considered ground zero for climate change, in parti.docx
 
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docxMGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
 

Recently uploaded

UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
spdendr
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 

Recently uploaded (20)

UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 

Use case 1 User LoginActor Admin, Faculty, or StudentBa.docx

  • 1. Use case 1: User Login: Actor: Admin, Faculty, or Student Basic Flow 1. User clicks the login link or enters the login URL into the browser. 2. The system displays login page. 3. User clicks login (Submit) button after entering the credentials and roles. 4. According to the role, the system retrieves a “User List”. 5. The system checks to see if the username exists in the “User List”. 6. If the account exists, the system compares the password. 7. If the input password is valid, based on the role provided, the system starts an authenticated session, retrieve Faculty List and displays View Faculty page (landing page). Alternate Flow Invalid username or password: The system checks to see if the username exists in the “Users”. If the username is not found, the system displays a message “Invalid username. Click on “OK” to try again.” The user clicks on the “OK” button. The system redisplays login page. User clicks on the forgot username link. The system asks user to enter his/her email address. User enters the email address associated with his/her account. The system displays a message ”Username was sent to your email.”
  • 2. Use Case 2: Admin Adds Student Normal Flow: 1. Admin selects the “Students” tab in the “Admin home page”, 2. System retrieves Student_list and displays “Student View” page. 3. Admin clicks “New Student” button. 4. System displays “Add student” page. 5. Admin Provides student details by selecting the institute name from dropdown box, enters student’s details 6. Admin clicks on “Save” button. 7. System validates the entered data; 8. System Save data to the database, if valid. 9. System displays successfully saved message on top of student list, which includes the new added student.
  • 3. Use case 3: Team Member Makes Comments on Assessment Done by other Members: Basic Course: 1. Student clicks “Make a Comment” button on the “ViewPeerAssessment” Page. 2. The system checks the Session to make sure the student is logged in and then displays a Write Comment page with a multi- line Text box. 3. Student writes a comment on the comment box. 4. Student clicks on the “Save” button. 5. The system validates the comment (e.g. not too long, or too short). 6. If the comment validation is ok, the system display a confirmation page, and send the comment to Instructor for approval. States Machine for “comments on assessment” Comments created by evaluate Comments Approved by instructor Comments displayed to students Comments disapproved by instructor Comments revised by evaluate Alternate Course Too long or short comment: The system displays a message
  • 4. “Comment length is out side the allowable range. Click on “OK” to try again.”
  • 6. OutlineWhat is robustness analysis?Key roles in robustness analysisObject types found in discoveryDiagramming rulesWhere are the diagram and objects placed in the modelUpdates to the static modelRobustness Analysis StepsExample robustness analysisDesign following robustness What Is Robustness Analysis? Bridge between analysis and design, helps define objects participating in use cases Key Roles in Robustness AnalysisRobustness AnalysisClass Discovery - fine missing classes like <<control>>, <<boundary>> and <<interface>> typesCompleteness Check – walk through use case scenarios and make sure all alternative paths are coveredSanity Check – does the use case specify behavior that is reasonable and able to be implemented Establishes Basis for Sequence Diagrams – quickly drawn and can identify issues prior to building sequence diagrams Object Types Found in Discovery External facing windows, screens, dialogs, menus, in our example web pages.
  • 7. Map to database tables for persistent objects Application logic and process control Reader object Accesses database Tables (author) Diagramming Rules Updates To The Static Domain Model Robustness analysis steps: Decompose narrative use case flow into “steps”. Use objects from the domain model and link them together to simulate these steps. Add missing classes and associations in the domain model during step (2). Use terms from the domain model to disambiguate the use case during step (2). Complete other information in use case text that might be
  • 8. missing during step (2). Alternative flows in use case descriptions may be highlighted or colored in the robustness diagram to distinct from the nominal flow. Robustness Example TheEyesHaveIt.com “Register a Seller” Use Case Diagram Register a Seller Use Case “Register a Seller”Preconditions SELLER must not exist in systemUse Case DescriptionPrimary Flow:The SELLER is directed to a secure Web page.The SELLER must enter a user name, password, address, telephone, and e-mail address.All data is is validated when the SELLER submits request.The password should be entered twice to verify typing errors. the submit button. Alternate Flow:The SELLER can cancel the registration process and return to the main page.Alternate Flow:Data entered is not complete causing registration form to be redisplayed with errors highlighted.Alternate Flow:The SELLER has previously registered or a duplicate name exists causing the registration form to be redisplayedPostconditionsAn entry for SELLER information is created in the database.An new ACCOUNT is created for the SELLER. “Register a Seller” UI Prototype
  • 9. Incomplete data or duplicate person Robustness Analysis New ObjectsPotential design objects include:Registration Page <<boundary>> web page for seller registrationRegistration Controller <<controller>> controller object for managing the registration process Submit Button <<boundary>> part of the registration web pageCancel Button <<boundary>> part of the registration web pageValidation Controller <<controller>> controls the process of data validation Example Robustness Analysis Object Discovery New objects discovered during robustness analysis Design Classes Object
  • 10. Sequence Youtube ResourceUML Tutorial 5.1 - Basics of UML Sequence Diagrams for Robustness Analysis in Eclipse with Papyrushttps://www.youtube.com/watch?v=aKNh08Vq_78 Assignment – Requirements for Use Cases Revise Use case: two-paragraph description (main flow and alternative flow)numbered listCreate activity diagram for each use case based on:Main flow Domain modelScreen mock-upsRobustness AnalysisRobustness Diagram Use case example Robustness Analysis Use case description with domain model * Robustness Diagram Revised usecase description, revised domain model and robustness diagram *
  • 11. Quality Attributes of Robustness Diagrams Use case description with domain model * Revised usecase description, revised domain model and robustness diagram * Register a seller Seller (from Actors) Register <<communicate>> Validation Controller Registration Controller process registration Account (from Business Domain Model) create SellerEntity (from Business Domain Model) 1 1 1 1 create Submit Button registration info Cancel Button Registration Page highlight bad entries displays displays cancel
  • 12. IN: new registration from authentication page OUT: processed registration to authentication page OUT: cancel to main menu Seller (from Actors) Enter Info submit Cancel ` Perform robustness analysis: 1. Decompose narrative use case flow into “steps”. 2. Use objects from the domain model and simulate these steps with a swim lane Activity diagram. 3. Add missing classes and associations in the domain model during step (2). 4. Use terms from the domain model to disambiguate the use case during step (2). 5. Complete other information in use case text that might be missing during step (2). 6. Following diagramming rules, develop a robustness diagram for each use case using MVC architectural pattern. The general objects layout in the robustness diagram: view objects are on left side; entity objects are on the right side; the controllers are in the middle. Alternative flows in use case descriptions may be highlighted or colored in the robustness diagram to distinct from the nominal flow.