Presentation is loading. Please wait.

Presentation is loading. Please wait.

Software Engineering Lecture #5.

Similar presentations


Presentation on theme: "Software Engineering Lecture #5."— Presentation transcript:

1 Software Engineering Lecture #5

2

3 Reuse and Extension An Example
Notes of the animations (highlight all the points) 1. Cellular Network 2. User 3. Place Phone call 4. Receive phone call 5. Use scheduler 5. Place conference call 6. Receive additional call 7. extend -- written at the top 8. extend -- written at the bottom

4 Extended User An Example
Notes of the animations Show all the slide and then scroll to the customer and individual customer and corporate customer Zoom to these objects. (highlight text and arrow color) 1. Customer 2. Individual customer – with its arrow going towards the customer 2. Corporate Customer -- with its arrow going towards the customer

5

6

7 Components Of A Use Case
Priority Actor Summary Precondition Post- Condition Extend Normal Course of Events Alternative Path Exception Assumption

8 Use Case Example Delete Information

9 Use Case Example Delete Information

10 Use Case Example Delete Information

11 Use Case Example Delete Information

12

13

14 Activity Diagram Animation sequence is on the slide.
Use arrow for animation If it does not fit on one slide then u can use the scrolling feature. Take care show at least three levels at a time (not less in any case and then use the highlight feature.)

15 Activity Diagram

16 Activity Diagram

17 Activity Diagram

18 Limitation of Use Cases
Usability: Color blind people should not have any difficulty in using the system – color coding should take care of common forms of color blindness. Reliability: The system needs to support 7 x 24 operation Performance: Authorization should be completed within 1 minute 90% of the time. Average authorization confirmation time should not exceed 30 seconds. Portability: The system should run on Windows 98 and above as well as Sun Solaris 7.0 and above. Access: System should be accessible over the internet – hidden requirement – security.


Download ppt "Software Engineering Lecture #5."

Similar presentations


Ads by Google