Professional Documents
Culture Documents
9495694adnan - Use Case Specifications
9495694adnan - Use Case Specifications
D. Preconditions
● The bank Customer must possess a bank card.
● The network connection to the Bank System must be active.
● The system must have at least some cash that can be dispensed.
● The cash withdrawal service option must be available.
E. Events Flow
a. Insert Card
The use case begins when the actor Customer inserts their bank card into the card reader
on the ATM.
The system allocates an ATM session identifier to enable errors to be tracked and
synchronized between the ATM and the Bank System.
b. Read Card
The system reads the bank card information from the card.
c. Authenticate Customer
Perform Subflow Authenticate Customer to authenticate the use of the bank card
by the individual using the machine.
d. Select Withdrawal
The system displays the service options that are currently available on the
machine.
The Customer selects to withdraw cash.
e. Select Amount
The system prompts for the amount to be withdrawn by displaying the list of
standard withdrawal amounts.
The Customer selects an amount to be withdrawn.
f. Confirm Withdrawal
Perform Subflow Assess Funds on Hand
Perform Subflow Conduct Withdrawal
g. Eject Card
The system ejects the Customer’s bank card.
The Customer takes the bank card from the machine.
h. Dispense Cash
The system dispenses the requested amount of cash to the Customer.
The system records a transaction log entry for the withdrawal.
i. Use Case Ends
The use case ends.
F. Alternative Flows
Customer Authentication
a. Handle No Communications with the Bank System
i. At the Validate Card Information step of Subflow Authenticate
Customer if the Bank System cannot be
ii. contacted or does not reply within the set communication time out
period,
iii. 1 If the communications link has failed more times than the
communication retry number, then
iv. The authentication attempt is abandoned and Basic Flow is
resumed at Use Case Ends.
v. The system will attempt to contact the Bank System until it has
completed the number of retry
vi. attempts indicated by the communication retry number.
vii. 3 If communications are re-established the Basic Flow is resumed
at Authenticate Customer.
viii. 4 If there is still no response from the Bank System the system
creates an event log entry to record
ix. the failure of the communications link to the Bank System. The
event log entry includes the type of failure.
x. The system sends the event log to the Service Administrator to
inform them that communications with the Bank System has been
lost.
xi. Resume the Basic Flow at Use Case Ends.
b. Handle No Communications with the Customer’s Bank
i. At the Validate Card Information step of Subflow Authenticate
Customer if the Bank System report that the Customer’s Bank
cannot be contacted,
ii. The system creates an event log entry to record the fact that the
Customer’s Bank was unavailable. The event log entry includes the
bank card information (excluding the PIN).
iii. The system informs the Customer that communications with their
Bank is not possible and that the Customer should try again later.
iv. Resume the Basic Flow at Use Case Ends.
c. Handle Inactive Card or Account
i. At the Validate Card Information step of Subflow Authenticate
Customer if the Customer’s Bank reports that the card, or its
associated account, are inactive.
ii. The system creates an event log entry to record the fact that the
Customer’s account was inactive.
iii. The event log entry includes the bank card information (excluding
the PIN).
iv. The system informs the Customer that the account associated with
the card is not active and that
v. the Customer should contact their Bank for more information.
vi. Resume the Basic Flow at Use Case Ends.
d. Handle Stolen Bank Card
i. At the Validate Card Information step of Subflow Authenticate
Customer if the Bank System reports that the card has been stolen:
ii. The system Confiscates the card.
iii. Captures a 10-second video image of the Customer.
iv. Creates an event log entry to record the fact that a stolen card has
been used. The event log entry includes the video image and the
current bank card information (excluding the PIN).
v. Sends the event log entry to the Security Administrator, the Bank
System and the Service Administrator to inform them that a stolen
card is being used
vi.
G. Postconditions
a. The ATM has returned the card and dispensed the cash to the Customer
and the withdrawal is registered on the Customer’s account.
b. The ATM has returned the card to the Customer and no withdrawal is
registered on the Customer’s account.
c. The ATM has returned the card but has not supplied the amount of cash
registered as withdrawn from the Customer’s account. The discrepancy is
registered in the ATM’s log.
d. The ATM has kept the card, no withdrawal has registered on the
Customer’s account and the Customer has been notified where to contact
for more information.
2- Online Shopping - Use Case Specification
A. Use Case Name
Hotel Room Booking
B. Description
This Use Case States how a user can book a hotel room from a hotel website.
C. Actor
User, Receptionist, Manager, Owner
D. Use Case Diagram
E. Flow of Events
Use case Name Make Reservation
Triggers
Extensions
Post condition
Triggers
Main flow Step Action
Post condition
Triggers
4 Update database
Extensions
Post condition
Triggers
Extensions
Post condition
Triggers
6 Update database
Extensions
Post condition
Triggers
7 Update database
Secondary Actors
Post condition
Extensions
Post condition
Triggers
Main flow Step Action
7 Update database
Extensions
Post condition
Triggers
6 Validate details
7 Update database
Extensions
Post condition
Triggers
6 Update database
Extensions
Post condition
2 Enter dates
Extensions
7 Update database
Extensions
4.1 If invalid details entered Display
“not found” message and redirect
to main interface
7 Update database
9 Database updated
Extensions
5 Create backup
successful, display
“Unsuccessful” message.
Scenario:
1. Members login to the system.
2. System checks for the username and password.
3. Members check for the available time of the doctor.
4. Members reserve the time that they want.
5. System creates a reservation and record in schedule then updates the system.
6. Receptionist records the information and prepares the patient’s file for the doctor.
Alternative Flow: -
1. If the username and password are incorrect, the system will prompt for reconnect.
2. If there is no available time. The system will prompt that there is no available time and
inform nurses to rearrange new available information.
Goal in context: Create the doctors ‘available time for members to be able to make an
appointment.
Precondition: Doctor or Nurse must have an account before noting available time.
Trigger: When the doctor or nurse wants notes or updates available time.
Scenario:
1. Doctor or nurse login to the system.
2. System checks for the username and password for the staff’s type.
3. Doctor or nurse notes or updates the time.
4. System updates the schedule.
Alternative Flow:
1. If the username and password are incorrect, the system will prompt for reconnect.
2. If the system failed to update the available time, the system must prompt the doctor or
nurse for re-update again.
Precondition: Member has appointment with doctor or doctor assign patient to admit in the
hospital.
Trigger: When the member wants to reserve the room for admitting.
Scenario:
1. Member login to the system
2. System checks for the username and password
3. Members check for the available room.
4. Members reserve the room.
5. System creates a reserve, records in schedule and updates the available room.
6. Receptionist records the information.
Exception: -
1. If the username and password are incorrect, the system will prompt for reconnect.
2. If there is no available room, the system will prompt there is no available room and
inform the receptionist to reserve another room which is not included in the system part.