当前位置:网站首页>Use case diagram
Use case diagram
2022-07-07 14:14:00 【sinat_ thirty-six million seven hundred and eighty-nine thousan】
One 、 participants : The trigger of the use case , The trigger may be the user , It may be the agent of the event . The so-called time agent is the operation of the timing function set automatically for the system , When it reaches a certain time , The system will automatically perform the corresponding functions

Two 、 Use cases : A use case is a series of actions performed in a system , These actions will generate value results visible to specific performers . A use case defines a set of use case instances .
Identify use case pithy : The performer uses the system to use cases
3、 ... and 、 Relationship : It describes the relationship between the performer and the use case . The relationships involved in use case diagrams are : relation 、 generalization 、 contain 、 Expand .
The relationship between the performer and the use case
In the use case diagram , The performer interacts with the use case , The relationship between them is represented by a straight line , It is called Correlation (Association) Or communication relationship (Communication)
The generalized relationship between executors
There can be generalization between executors (Generalization) Relationship ( Also known as “ Inherit ” Relationship )

Between use cases Inclusion relation
Describe common behaviors that exist in multiple use cases , By use case A Point to use case B, Represents a use case A Use cases are used in B The act or function of , Containment is achieved by applying <<include>> Structural type ( stereotype ) To represent the

Between use cases Extended relationship
a, Extended use cases can add new behaviors on top of the base use cases , But the base use case must declare something specific “ The extension point ”, And extension use cases can only extend new behaviors on these extension points .
b, Expanding (extend) In relationship , Basic use cases (Base) There are one or more named extension points defined in , Extending a relationship means extending a use case (Extension) The event flow of is inserted into the basic use case according to the corresponding extension point under certain conditions (Base) in .
c, Extended relationships are achieved by applying <<extend>> Structural type ( stereotype ) To represent the .

Between use cases Generalization relation
a, When multiple use cases share a similar structure and behavior , Their commonalities can be abstracted as parent use cases , Other use cases as sub use cases in generalization relationship .
b, In the generalization of use cases , A child use case is a special form of a parent use case , The child use case inherits all the structure of the parent use case 、 Behavior and relationships .
c, Generalized relationships are rarely used .

边栏推荐
- Is it safe to open an account online now? Which securities company should I choose to open an account online?
- 通过 iValueConverter 给datagrid 的背景颜色 动态赋值
- call undefined function openssl_ cipher_ iv_ length
- Best practice | using Tencent cloud AI willingness to audit as the escort of telephone compliance
- Mysql怎样控制replace替换的次数?
- Transferring files between VMware and host
- 请问指南针股票软件可靠吗?交易股票安全吗?
- 2022-7-6 Leetcode27. Remove the element - I haven't done the problem for a long time. It's such an embarrassing day for double pointers
- Excerpt from "misogyny: female disgust in Japan"
- 内存溢出和内存泄漏的区别
猜你喜欢

The delivery efficiency is increased by 52 times, and the operation efficiency is increased by 10 times. See the compilation of practical cases of financial cloud native technology (with download)

Codes de non - retour à zéro inversés, codes Manchester et codes Manchester différentiels couramment utilisés pour le codage des signaux numériques
![[fortress machine] what is the difference between cloud fortress machine and ordinary fortress machine?](/img/fb/17e029b1d955965d7e2e0f58701d91.png)
[fortress machine] what is the difference between cloud fortress machine and ordinary fortress machine?

UML sequence diagram (sequence diagram)

Vmware 与主机之间传输文件

js 获取当前时间 年月日,uniapp定位 小程序打开地图选择地点
![SSRF vulnerability file pseudo protocol [netding Cup 2018] fakebook1](/img/10/6de1ee8467b18ae03894a8d5ba95ff.png)
SSRF vulnerability file pseudo protocol [netding Cup 2018] fakebook1

Horizontal of libsgm_ path_ Interpretation of aggregation program

AI人才培育新思路,这场直播有你关心的

Redis 核心数据结构 & Redis 6 新特性详
随机推荐
Reverse non return to zero code, Manchester code and differential Manchester code of common digital signal coding
Take you to master the three-tier architecture (recommended Collection)
FC连接数据库,一定要使用自定义域名才能在外面访问吗?
Excuse me, why is it that there are no consumption messages in redis and they are all piled up in redis? Cerely is used.
数据流图,数据字典
call undefined function openssl_ cipher_ iv_ length
手把手教会:XML建模
648. Word replacement: the classic application of dictionary tree
Common response status codes
Parsing of XML files
The longest ascending subsequence model acwing 482 Chorus formation
搜索引擎接口
Cesium knows the longitude and latitude of one point and the distance to find the longitude and latitude of another point
bashrc与profile
[fortress machine] what is the difference between cloud fortress machine and ordinary fortress machine?
内存溢出和内存泄漏的区别
通过 iValueConverter 给datagrid 的背景颜色 动态赋值
2022-7-6 beginner redis (I) download, install and run redis under Linux
Es log error appreciation -limit of total fields
SSRF vulnerability file pseudo protocol [netding Cup 2018] fakebook1