HW1‐PartB: Usecase Model - UTDClassroomOrg/RushilPatel-Individual-HW1 GitHub Wiki
Abstract and High-Level Use Cases
UC1. Player places a cybersecurity tower
UC1: Player places a cybersecurity tower |
---|
TUCBW: The player selects a cybersecurity defense tower (e.g., Firewall, IDS, Antivirus) and chooses a location on the game grid. |
TUCEW: The tower is successfully placed on the grid, and it begins defending against incoming cyber threats. |
UC2. Player upgrades a tower using cybersecurity knowledge
UC2: Player upgrades a tower using cybersecurity knowledge |
---|
TUCBW: The player selects a tower and is prompted to answer a cybersecurity-related question (e.g., binary to decimal conversion, phishing detection). |
TUCEW: If the player answers correctly, the tower is upgraded to a more powerful version. If incorrect, the upgrade is denied, and feedback is given. |
Use Case Text (Expanded) using the Two-Column Format
UC1: Player places a cybersecurity tower |
---|
Preconditions: The game is ongoing. The player has enough in-game currency to place a tower. |
Actor: Player | System: Cyber Defense Game |
---|---|
1- TUCBW: The player selects a cybersecurity defense tower from the available options and chooses a placement location on the game grid. | 2- The game verifies if the selected location is valid.2a. If the location is occupied or restricted, an error message is displayed.2b. If the location is valid, the system places the selected tower and updates the game state.2b.i. The tower starts attacking cyber threats based on its type.2b.ii. The game updates the player's in-game currency to reflect the tower placement cost. |
3a. If an error occurs (e.g., insufficient funds, restricted placement zone), the player is informed with a clear message and suggested corrective action. 3b. If successful, the player sees the placed tower and its active status. |
Postconditions: The tower is placed successfully and begins defending the network from cyber threats. |
---|