Using UML Diagrams for Extraordinary Situations

  • Thread starter Thread starter anonim
  • Start date Start date
  • Tags Tags
    diagram
AI Thread Summary
The discussion centers on the use of UML (Unified Modeling Language) and specifically the representation of use case diagrams. A user expresses concern about stating that a function will only be used in extraordinary situations within their use case diagram. The response critiques this approach, suggesting that it is not an appropriate way to represent functionality, as it introduces conditional logic that complicates the diagram. It is also noted that the role of the Branch Manager may not qualify as an actor in this context, as merely informing an actor does not constitute an interaction with the system. The conversation emphasizes the importance of clarity and proper representation in UML diagrams.
anonim
Messages
39
Reaction score
2
TL;DR Summary
draw use case diagram
this user will only use this function when something extraordinary situation, and that's how I stated it in the use case diagram. Is it a bad method of stating this way?
1616275456415.png
 
Technology news on Phys.org
anonim said:
Summary:: draw use case diagram

this user will only use this function when something extraordinary situation, and that's how I stated it in the use case diagram. Is it a bad method of stating this way?
View attachment 280037
I do not think that is the right way to represent it.

An "if" == a branch.

1616279912460.png

I think you can leave off the right branch, since/if nothing happens.

Also, I'm not sure if Branch Manager is an Actor here (i.e. a stick figure). Actors interact with the system. Simply informing an actor is not an interaction.
 
Last edited:
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...

Similar threads

Replies
2
Views
3K
Replies
48
Views
10K
Replies
7
Views
3K
Replies
5
Views
2K
Replies
6
Views
1K
Replies
12
Views
768
Back
Top