StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Software Development with Use Cases - Research Paper Example

Cite this document
Summary
The author of the "Software Development  with Use Cases" paper describes a use case, complete with typical and alternate courses, which documents the event of a bank customer withdrawing money from an ATM and a use case dependency for making an account deposit…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Software Development with Use Cases
Read Text Preview

Extract of sample "Software Development with Use Cases"

Use Cases Insert Insert Thoroughly describe (in a one to two 2) page narrative) a use case, complete with typical and alternate courses, which documents the event of a bank customer withdrawing money from an ATM. A use case refers to those steps that illustrate how a role is going to interact with an actor so as to complete an objective. It is majorly applied in software development where an actor would refer to a system or a user (Jacobson & Ng, 2005). The diagrams in use case map how a system’s client interacts with its use cases. The case in hand seeks to illustrate how a use case diagrams models the process of a client withdrawing money from a bank through the ATM. They demonstrate interactions are happening in the system and the users but do not provide the details. The diagrams also have attachments of informal text giving extra details similar to that which exists in the requirements document. Their level of use is normally during the analysis phase of the software. Through it, as designers the goal of meeting the demands of the system remains in scope. Figure 1: Use Case diagram for Withdrawal in an ATM System In figure 1 above, the stick figure shows an actor playing the role of an entity external to the system and its interactions. In this case, the actor is either another system or a person. The user in the ATM system can withdraw cash (Zhang & Yang, 2012). In other cases, the user is not always the real person, but it may consist of the duties played by a real person when in interaction with the ATM system. Other actors present in an ATM system include administrator who fills the cash in the dispenser before work commences. Figure 2: Shows a use diagram for withdrawal in bank Conditions for withdrawing from the ATM The client has to possess an ATM card from the respective bank The system has to have cash The network connection in the banking system has to be active There has to be an option to withdraw the cash from the ATM Events that occur until you withdraw from the ATM The client inserts their card into the slot in the ATM that reads the card. The bank then has to perform synchronization between the ATM and the bank through providing an identifier for the session. The system then deciphers the information in the ATM card before authenticating the customer to perform their transaction at the ATM. The client will then select the option to withdraw which will provide them with the options of how much to withdraw. The system will compare the users wishful amount with what it possess before allowing them to withdraw. Otherwise, if the amount is more than what they can withdraw, they will be requested to enter a smaller value. The ATM system will then eject the card from the bank. Dispense of cash takes place thus allowing the system to record a log of transaction for the withdrawal of that money. The latter marks the ends of the process. Thoroughly describe (in a one to two (1-2) page narrative) a use case dependency for making an account deposit. Illustrate this use case with Visio or a similar product. Figure 3: use case for account deposit The transaction on depositing cash through the ATM is mapped by a request to the client to select the type of the account for which to deposit to from available options. The customer then enters the amount they wish to deposit through the ATM (Salerno, 2014). The transaction will then initiate a session with the bank to ascertain if the user can deposit through the ATM. After verification, the user is then allowed to deposit cash into the account by dropping the envelope containing the money on the deposit slot. After receipt of the envelope, the ATM system then sends a message to the bank for purposes of ascertaining that the bank is in the position of adding the deposited amount to the client’s account. There is a manual verification process of the amount in the envelope is done by an operator. The latter has to be done after completion of the entire process. The client is issued with a receipt from the Automated Teller Machine then the whole process is recorded in a log in the ATM. The client also has the power to stop the transaction from taking place through the use of the cancel option available to them. However, this has to be done by depositing the cash in the slot. In addition, the Automated Teller Machine system is in the position of canceling a transaction from taking place after a particular period of waiting for the envelope. Thoroughly describe (in a one to two (1-2) page narrative) a use case dependency for making an account transfer. Illustrate this use case with Visio or a similar product. Figure 4: Use case for money transfer between accounts The initial step in the transfer of accounts is the client selecting the option to transfer funds. The client has to possess different accounts. From the menu of options, they have to choose the account to transfer the amount from and the account to transfer to. They are then presented with a keyboard to allow them enter the amount they wish to move. If the bank makes an approval, then the transaction will proceed. The latter will make the decision based on the information send to it which includes the card number of the customer, the pin, the account selected and the amount of cash they wish to transfer. A receipt is issued by the ATM system for approval by the bank. In case of a failure in delivering the correct pin, the transaction is not approved and instead, the user is presented with an extension to execute. Additional disapprovals will be sending to the session belonging to the client. As a result, that will start the extension for a failure in the transaction. Only approved transactions will be logged in as completed. Thoroughly identify and explain at least one (1) ethical issue that the use case exposes in connection with the development or use of the ATM system. Ethics is a concept illustrating what is wrong and what is right. It helps in determination of behavior that is acceptable (Kizza, 2013). The use of use cases in Automatic Teller Machines has simplified understanding of events that take place in an ATM. It makes it easier to comprehend when and the conditions that lead to a particular kind of behavior. The vital issue here is on the ability of the use cases to make it easier for non-tech stakeholders to understand the functionality of the system. However, misuse of the use cases in representing the ATM system can lead to adverse problems. In regard to that, the entire use patterns of the ATM are totally out to the entire population. The exposure of the kind of technology use may be a threat when people with ill intentions use it. The latter may be detrimental to the bank in question if it causes damage or harm to the machines, the users or the staff. Users, in this case, are quite aware of the detailed functionality of the ATM and how long their actions will span. Thus, it has the advantage of building confidence in the use of the system that may be its downfall. Conclusion Use cases are vital UML components for modeling the how actors interact with the system through the use of various actions. In our case, the use case has been useful in bringing to the limelight the functionality of the ATM in regard to how the users withdraw cash, make deposits and transfer money between various accounts. The later advantage makes stakeholders quickly understand the functionality of the system so as to make decisions without the understanding of the technicalities of it. However, this transparency if used wrongly by persons with ill intentions, it could destroy the system completely. References Jacobson, I., & Ng, P. (2005). Aspect-oriented software development with use cases. Upper Saddle River, NJ: Addison-Wesley. Kizza, J. (2013). Ethical and social issues in the information age. London: Springer London. Salerno, C. (2014). ATM. Georgetown, KY: Georgetown Review Press. Zhang, J., & Yang, Y. (2012). Anti Trailing of ATM System Design. AMR, 468-471, 439-442. doi:10.4028/www.scientific.net/amr.468-471.439 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Use Cases Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1693075-use-cases
(Use Cases Research Paper Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/information-technology/1693075-use-cases.
“Use Cases Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1693075-use-cases.
  • Cited: 0 times

CHECK THESE SAMPLES OF Software Development with Use Cases

EISA: Software Components

However, in many cases, these components cannot work well without programmed instructions.... However, in many cases, these components cannot work well without programmed instructions.... Web technology in many cases has progressed tremendously from the time when only Hypertext mark-Up Language (HTML) web pages were norm, many years ago.... Because of the new technology that has come in with more advanced computers that have rapidly developed in this era, it is true that the use of software in different firms has led to high productivity in the business....
3 Pages (750 words) Essay

Open Source Software

In a vast majority of cases, the vendor of this software develops a product's version that exists in a community edition and can be downloaded free of cost.... In most of the cases, the software is developed by a group of people in the community, that can be joined by anyone.... In the OSS, the source code, as well as rights that are commonly meant only for the copyright holders, can be acquired under the open-source license which allows the users to read, use, change, modify, and even distribute the software....
5 Pages (1250 words) Research Paper

Secure Software Development Approaches

Generally, the paper "Secure software development Approaches" has presented a detailed discussion on secure software development.... This paper has outlined a wide variety of aspects regarding the implementation of the best practices for better management and development of a secure software development process.... software development firms use a mixture of a wide variety of tools, techniques.... The majority of software development firms, as well as individuals, believe that implementing security-related features of software or software development entirely is a post-development activity and it has nothing to do with the software development lifecycle....
12 Pages (3000 words) Coursework

Software Engineering

However, program errors that may be discovered after the release date may be fixed as part of the Software Maintenance Phase of the software development Life Cycle.... oftware testing consists of the dynamic verification of the behavior of a program on a finite set of test cases, suitably selected from the usually infinite executions domain, against the expected behavior.... Testing must be seen, then, primarily as a means for checking not only whether the prevention has been effective, but also for identifying faults in those cases where, for some reason, it has not been effective....
2 Pages (500 words) Essay

The Marketing Game and Business

Also, it highlights the requirement for integrative development on the basis of both qualitative as well as the quantitative study of the marketplace atmosphere.... The current industry is a software company and the company adopts the computer-based simulation The Marketing Game to enhance knowledge.... Market analysis is an important part in the arrangement of the marketing game in a software company.... Customers, competitors, costs, trends etc are some of the factors that are considered while performing the market analysis of the software industry....
11 Pages (2750 words) Research Paper

Software Piracy Problem in the IT Industry

Also, copying licensed software for friends to use is illegal.... Documented evidence shows that software was the first IT development to be duplicated on large-scale.... This coursework "software Piracy Problem in the IT Industry" focuses on software piracy that is the illegal copying, downloading, sharing and installation of software that is copyrighted.... The problem of software piracy is a global issue and thus is very difficult to measure....
9 Pages (2250 words) Coursework

How Serious Is Software Piracy

For example in Net jargon, they use the term wares to refer to the pirated product.... It has fueled economic development in countries like China and India.... From the paper "How Serious Is software Piracy " it is clear that the study on piracy covers a period between 2011 and 2013.... In 2011 software piracy was 42 percent and it jumps to 43 percent in 2013, the finding underscores the need to adopt a better way of managing software piracy....
5 Pages (1250 words) Essay

Methods and Tools for Software Quality Management

software development is one of the areas that have undergone tremendous growth and revolutions, as many businesses and individuals turn to using software tools to solve their problems.... This paper is a literature review, which discusses the methods and tools for ensuring that quality is achieved in software development.... It focuses on the methods and tools that are important, and always followed in the process of quality software development and management....
18 Pages (4500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us