BEIJING-firespider male 14:48:17
Ask qingrun: Does a use case correspond to an analysis class?
BEIJING-firespider male 14:49:28
My statement may have a problem: Is a use case corresponding to a boundary class, a control class, and an entity class?
Qingrun 14:50:47
Generally, a use case corresponds to a group of analysis classes, including a boundary class, a control class, and an entity class.
However, if this use case involves interaction with multiple use cases, the analysis model diagram of this use case should also contain the analysis classes of these interactive use cases.
In special cases, there may be several object analysis classes or several boundary analysis classes, but the control analysis class is generally one.
BEIJING-firespider male 14:51:44
Oh, Is reference or inclusion involved?
Qingrun 14:52:24
Include, extend, and communicate relationships are all possible.
It is required as long as there is data interaction or method interface call between the two.
BEIJING-firespider male 14:52:53
For example, the "Contract Management" Use Case in the book contains several "subuse cases": contract payment, addition of payment details, modification of payment details, and deletion of payment details. Can it be considered as a subuse case?
Qingrun 14:53:32
Generally, it is not a sub-case. This is a sub-stream and should be clearly written in the book.
A uc can have multiple substreams and branch streams.
BEIJING-firespider male 14:53:56
Well, it is described using substreams. But can it also be considered as a use case?
Qingrun 14:54:07
No.
A sub-stream is a sub-stream.
If a UC is large, each sub-stream can have its own corresponding analysis class.
BEIJING-firespider male 14:55:02
Oh
BEIJING-firespider male 15:19:22
If some use cases do not need to interact with the database, do you still need to control classes and entity classes? For example, upload a file to the FTP file server.
Qingrun 15:23:27
So do you not need to manage the files uploaded to FTP?
At least record the location and size and name of the uploaded file, right? Otherwise, what should I do if I get poisoned? What should I do if I am exploited?
Qingrun 15:24:37
All use cases must have data interaction, which is absolutely inevitable. Otherwise, it is controlled by the file database itself, which is also a database-which we often do in the early days.
BEIJING-firespider male 15:24:44
Each time a file list is read from the FTP server, the interface is used for user operations. The upload, download, delete, and rename operations are directly performed on the FTP server.
Qingrun (3291191) 15:25:07
These files must also be managed. Otherwise, there will be at least security risks.
BEIJING-firespider male 15:25:17
Oh
BEIJING-firespider male 15:26:21
That is to say, the corresponding records must be recorded in the database, right?
Qingrun 15:26:43
Yes.