This document provides guidance on completing an Application Use Case (AUC) template. It describes the typical sections of an AUC document, including the introduction, use case details, performance requirements, supplementary requirements, and interface requirements. It explains how to identify basic flows, alternative flows, and extension points within a use case. The document demonstrates how to apply styles, insert diagrams, and use cross-referencing to link related requirements and flows. Completing the template correctly involves identifying actors, preconditions, steps, and constraints for a use case and representing these following the guidelines in the presentation.
Hotel Management System project provides all features of
security. Detail of any particular record can be searched easily by
providing its id or name. New records can be easily added in the
database, existing record can be easily modified later on too. If any
record is found useless it can be deleted easily by the authorized user of
the system. So in short we can say that ‘Hotel management system’ is a
very efficient project, which helps in daily basis work of hotel
management process. Reduces work load on employees, provide data
security. Only permitted users can view, modify or delete its data, no
other person can access hotel database.
In our CSE471 course, System Analysis and Design, we presented our proposal to create an Employee Management system.
The Use Case Diagram, Activity Diagram, Sequence diagram, Data Flow Diagram, and Windows Navigation Diagram, all are shown here
Hotel Management System project provides all features of
security. Detail of any particular record can be searched easily by
providing its id or name. New records can be easily added in the
database, existing record can be easily modified later on too. If any
record is found useless it can be deleted easily by the authorized user of
the system. So in short we can say that ‘Hotel management system’ is a
very efficient project, which helps in daily basis work of hotel
management process. Reduces work load on employees, provide data
security. Only permitted users can view, modify or delete its data, no
other person can access hotel database.
In our CSE471 course, System Analysis and Design, we presented our proposal to create an Employee Management system.
The Use Case Diagram, Activity Diagram, Sequence diagram, Data Flow Diagram, and Windows Navigation Diagram, all are shown here
Here is the easy presentation of Software Requirements Specification Model on "Payroll Management System" for employees of a company. It is important for Developing the software for mentioned system. More information you can find after opening the document.
A dispensary is a place, a career, and in some cases, a company's business. A dispensary is a place, where the licensed pharmacists of medicines, based on a prescription issued by a legitimate doctor. A pharmacy is a pharmacy. Some of the companies do not have pharmacies, but they will sell medicines bought without a prescription. In a pharmacy, it can be a stand-alone building, or it can be to be found in other locations as well, such as a pharmacy, a medical office or a hospital. Pharmacists are registered with the Pharmaceutical Council and have been designated as registered pharmacists. However, this is a title that is only awarded after the passing of a truly national and practical and legal studies. Pharmacists must always be vigilant against fake prescriptions ordered due to the addicts who are trying to illegally obtain drugs and other controlled substances. The pharmacy also means that it is in the practice of pharmacy as a profession. Pharmacy has a rich appeal. With the availability of computers and the development of the advances in information technology have led to the fact that we have the ability to quickly and efficiently, to receive or collect to analyze, transfer, and storage of large amounts of information related to patient care.
Employee management system in Software EngineeringSadia Akter
Employee management system in Software Engineering
Employee management system in Software Engineering pdf
Employee Management System with Scenario, Use-case, GUI, Class diagram.
Thank you
Here is the easy presentation of Software Requirements Specification Model on "Payroll Management System" for employees of a company. It is important for Developing the software for mentioned system. More information you can find after opening the document.
A dispensary is a place, a career, and in some cases, a company's business. A dispensary is a place, where the licensed pharmacists of medicines, based on a prescription issued by a legitimate doctor. A pharmacy is a pharmacy. Some of the companies do not have pharmacies, but they will sell medicines bought without a prescription. In a pharmacy, it can be a stand-alone building, or it can be to be found in other locations as well, such as a pharmacy, a medical office or a hospital. Pharmacists are registered with the Pharmaceutical Council and have been designated as registered pharmacists. However, this is a title that is only awarded after the passing of a truly national and practical and legal studies. Pharmacists must always be vigilant against fake prescriptions ordered due to the addicts who are trying to illegally obtain drugs and other controlled substances. The pharmacy also means that it is in the practice of pharmacy as a profession. Pharmacy has a rich appeal. With the availability of computers and the development of the advances in information technology have led to the fact that we have the ability to quickly and efficiently, to receive or collect to analyze, transfer, and storage of large amounts of information related to patient care.
Employee management system in Software EngineeringSadia Akter
Employee management system in Software Engineering
Employee management system in Software Engineering pdf
Employee Management System with Scenario, Use-case, GUI, Class diagram.
Thank you
Welcome to my series of articles on Unified Modeling Language. This is "Session 2 – Use Case UML" of the series. I have covered Use Case Scenario, Use Case Narrative and Use Case Model in this session.
Please view my other documents where I have covered each UML diagram with examples
A Study of Software Size Estimation with use Case Pointsijtsrd
Estimates for cost and schedule in software projects are based on a prediction of the size of the system. Software size estimation is the most important role in software cost estimation. Use Case Point method can provide software size estimation at the early stage of the development process. Software size estimation is based on the high level speciation of Use Case. This paper describes a simple approach to software size estimation base on use case models the "Use Case Points Method. This model is imported into an estimating tool. To get software size with Use Case Point, the needed factors are the number of use cases and their complexity, the number of actors and their complexity, technical complexity factors TCF , and environmental complexity factors ECF . The system computes unadjusted use case points UUCP , adjusted use case points UPC , and the total effort in staff hours. Aye Aye Seint "A Study of Software Size Estimation with use Case Points" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26531.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/26531/a-study-of-software-size-estimation-with-use-case-points/aye-aye-seint
According to an article published in Forbes in 2010, the 10 essent.docxnettletondevon
According to an article published in Forbes in 2010, the 10 essentials of an effective website includes the following: company/product easily identifiable, front and center contact information, fast search bar, speed; detailed, well-organized content; product qualities highlighted, differentiated benefits presented, encourages return visit, easy to navigate, and fresh new content.
Visit two-three websites for ONE type of product (e.g., laptops, laundry detergents, beverages, athletic shoes, etc.) and analyze the layout of these sites including the 10 essential elements listed above. Respond to the following questions evaluating the overall effectiveness of the websites.
1. How does a consumer’s perception affect the influence the website has on the consumer? Include a discussion of the sensory aspects.
2. What are the stages of perception as it relates to consumer decision and buying? Relate these stages to the qualities of effective websites as identified by Forbes.
3. How does a consumer’s personality affect his or her buying decisions which inevitably shapes his or her lifestyles? Include a discussion of how a consumer’s view of him or herself also impacts buying decisions.
4. Analyze the effectiveness of the websites in reaching their respective target markets. What specific things would you recommend implementing in order to improve upon the effectiveness?
Your response should be a minimum of two pages, double-spaced. References should include your textbook plus a minimum of one additional credible reference. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations, and cited per APA guidelines.
Title of the Project
by
Student Name
This is an Engineering project submitted to the Gannon University graduate faculty in
partial fulfillment for the degree Master of Science in Engineering.
Major Subject: Electrical Engineering
Approved:
Advising Professor in Charge of Major Work
Chairperson of Major Department
Gannon University
Erie, Pennsylvania 16541
Month, Year
Acknowledgements
The writer thanks mentors, colleagues, lists the individuals or institutions that supported the research, and gives credit to works cited in the text for which permission to reproduce has be granted. ACKNOWLEDGMENTS appears centered at the top of the page.
Abstract
Give a 60-100 word abstract/executive summary of the project here.The abstract briefly summarizes the thesis and the contents of the paper. ABSTRACT appears centered at the top of the page.
Table of Contents
51.
INTRODUCTION
1.1
Scope
6
1.2
Background
6
1.3
Summary
6
1.4
Road Map to the report
6
2.
REQUIREMENTS ANALYSIS
7
2.1
System Overview
7
2.2
Application Constraints and Dependencies
7
2.3
Specific Requirements
7
2.4
Interfaces
7
2.5
Summary
8
SYSTEM DESIGN
9
3.1
Top Level Design
9
3.2
Product Flow
9
Interface
9
3.4
Description
9
3.5
Initialization
10
3.6
Interface Design
10
3.7
Functional Design
11
.
Similar to How to Complete a Use Case Templlate with MS Word (20)
Using Agile In A Quality Driven EnvironmentLeslie Munday
A business analysts' experience with Scrum / agile projects.
This presentation provides an overview of a process that supplements Scrum, by adding roles and activities for testers, writers, deployment manager, system architect, UI designer and a business analyst.
Provides the reader with an overview of what is, Business and Systems Analysis. A jigsaw puzzle is used to represent a system. The piecing together of the puzzle is use as a simple analogy to represent the analysis of a complex system.
Describes a multi-dimensional view of the Business Analysis Body of Knowledge, based upon artifacts and their consumers.
The BABOK is captured with a UML model that shows how activities, artifacts, roles and techniques are related. I created this model to help study for the CBAP exam.
Requirements management and traceability for IIBALeslie Munday
This presentation, created for the Seattle chapter of the International Institute of Business Analysts, describes my experienes with managing requirements traceability.
This presentation guides you around the project properties and security windows of Rational RequisitePro. It also shows how to create a new ReqPro project.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Modern design is crucial in today's digital environment, and this is especially true for SharePoint intranets. The design of these digital hubs is critical to user engagement and productivity enhancement. They are the cornerstone of internal collaboration and interaction within enterprises.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
Your Digital Assistant.
Making complex approach simple. Straightforward process saves time. No more waiting to connect with people that matter to you. Safety first is not a cliché - Securely protect information in cloud storage to prevent any third party from accessing data.
Would you rather make your visitors feel burdened by making them wait? Or choose VizMan for a stress-free experience? VizMan is an automated visitor management system that works for any industries not limited to factories, societies, government institutes, and warehouses. A new age contactless way of logging information of visitors, employees, packages, and vehicles. VizMan is a digital logbook so it deters unnecessary use of paper or space since there is no requirement of bundles of registers that is left to collect dust in a corner of a room. Visitor’s essential details, helps in scheduling meetings for visitors and employees, and assists in supervising the attendance of the employees. With VizMan, visitors don’t need to wait for hours in long queues. VizMan handles visitors with the value they deserve because we know time is important to you.
Feasible Features
One Subscription, Four Modules – Admin, Employee, Receptionist, and Gatekeeper ensures confidentiality and prevents data from being manipulated
User Friendly – can be easily used on Android, iOS, and Web Interface
Multiple Accessibility – Log in through any device from any place at any time
One app for all industries – a Visitor Management System that works for any organisation.
Stress-free Sign-up
Visitor is registered and checked-in by the Receptionist
Host gets a notification, where they opt to Approve the meeting
Host notifies the Receptionist of the end of the meeting
Visitor is checked-out by the Receptionist
Host enters notes and remarks of the meeting
Customizable Components
Scheduling Meetings – Host can invite visitors for meetings and also approve, reject and reschedule meetings
Single/Bulk invites – Invitations can be sent individually to a visitor or collectively to many visitors
VIP Visitors – Additional security of data for VIP visitors to avoid misuse of information
Courier Management – Keeps a check on deliveries like commodities being delivered in and out of establishments
Alerts & Notifications – Get notified on SMS, email, and application
Parking Management – Manage availability of parking space
Individual log-in – Every user has their own log-in id
Visitor/Meeting Analytics – Evaluate notes and remarks of the meeting stored in the system
Visitor Management System is a secure and user friendly database manager that records, filters, tracks the visitors to your organization.
"Secure Your Premises with VizMan (VMS) – Get It Now"
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
1. 2009 copyright Leslie Munday University
Guide To An AUC Document Template
Requirements Discipline
23 February 2010
2. 10/28/2019 2
Precursor
In order to understand the material in this
course, you should have knowledge of use case
modeling and the material in the following:
Working With Styles and Properties,
An introduction to RequisitePro.
Terms used in this presentation:
System – the hardware under which an application
executes. Includes the user interface (monitor,
keyboard, etc) and communication ports to other
systems (network, USB, printer, etc)
Application – the software within the system that
satisfies the requirements for the system.
3. 10/28/2019 3
Overview
In this presentation you will learn:
the purpose of the different sections of the
AUC document,
the information that goes into each
section,
How to fill out an AUC document template.
This lesson will end with a Q & A
session.
4. 10/28/2019 4
The sections of the AUC Document
The AUC document captures a single application use
case for a single application.
It’s sections are:
1 Introduction
2 Use Case Details
3 Use Case Performance Requirements
4 Use Case Supplementary Requirements
5 Interface Requirements
The guidelines in this presentation can be adjusted for
whatever requirements management tool you use.
[The template that comes with this presentation is designed
to be imported into RequisitePro.]
5. 10/28/2019 5
Introduction
This section contains introductory text for the
AUC:
Purpose – The purpose of the AUC document (this is
standard text where only the name of the document
changes),
Audience – Who this document is written for (may
change from project to project),
Scope – What are the limitations of the use case,
Definitions, Acronyms, and Abbreviations – Any terms
specific to this AUC,
Goals – A high level description of what this use case is
trying to achieve.
6. 10/28/2019 6
Use Case Detail
This section contains the use case details:
Description – a description of the details of the use case,
Usage – the maximum frequency that the use case is expected to
execute,
Primary Actor - the initiator of the use case,
Secondary Actors - any roles or systems used by the use case,
Precondition(s) - what state the system must be in before the use case
executes,
Successful PostCondition –is the state the system is in after the use case
has ended,
Alternative Postconditions – other possible states that could cause the
use case to end,
Basic Flow – the expected externally visible steps of the use case,
Alternate Flows - externally visible steps that deviate from and return to
the basic flow,
Extension Points - externally visible steps that describe a path that
extends from the basic flow, never to return,
Activity Diagram - a pictorial view of the use case steps.
7. 10/28/2019 7
Supplementary Requirements
A location for requirements that impact this
use case. Supplementary requirements are
generally located in their own repository and
referenced from this section. The
supplementary requirement references the
steps that it impacts.
Supplementary requirements may be of type:
Usability, Reliability, Performance, Supportability, Design Constraint,
Accessibility, Globalization, Availability, Installability, Serviceability
(Maintainability), Security, (Vulnerability), User Documentation,
Consumeability (Migration), Integration, Software
Reuse/Componentization, Purchased Components, Interfaces,
Licensing Requirements, Legal/Copyright/Other Notices, Applicable
Standards, To be determined.
8. Performance Requirements
These are a special type of supplementary
requirement.
They are put into their own section to
emphasize that a use case has a need to
perform within a certain time.
Every time the system performs an action
it has a maximum amount of time to
complete that action.
Every system action step in the use case
should be referenced, (by implication or
explicitly) in this section.
10/28/2019 8
9. Interface Requirements
Where the use case interfaces with
another application a reference is made
to the appropriate standards for using
that interface.
The interface is specified in a separate
document, because it is applicable to 2
or more applications and we do not
want to duplicate information.
10/28/2019 9
10. 10/28/2019 10
A Use Case Is Black Box
An ‘externally visible step’ is an action that can be observed
from a ‘black box’ perspective.
A black box observation is an event that can be detected
without opening up the system.
All black box events are witnessed by the actors of the use
case.
All black box events are tested at the interfaces to the
application.
Example: ‘The system verifies that the password is correct’
would not be a black box event, because we cannot test this
when the password is correct, without opening the application.
Example: ‘The password is invalid and the system returns a
password in error message’, is a black box event because we
entered an invalid password through the user interface and got
the error message back through the user interface.
When writing a step, ask yourself the question: ‘How would I
test this?’
11. Creating the Use Case Document
Add the AUC document template to the
templates that are recognized by MS Word.
Working in MS Word create a new AUC
document.
Complete the properties for the AUC document.
Complete the introductory sections.
Once the scope and overview have been agreed
upon, start to detail the steps of the basic flow.
Once the basic flow has been agreed upon,
search for alternative and extension paths.
Parse the use case steps to add supplementary
requirements.
10/28/2019 11
15. Inserting Use Case Steps
Add use case steps as normal text.
Apply the 'Use Case Step‘ style to each line
of the use case flow.
This will cause the steps to be automatically
numbered and become blue-underlined.
In order to show 2 or more actions
occurring in parallel, add them as bullet
points to a use case step and set their style
to ‘Use Case Bullet’.
10/28/2019 15
17. 10/28/2019 17
Alternate And Extension Flows
Once the Basic Flow is complete we start to look for
alternate and extension flows.
Entering Steps For Alternate And Extension Flows:
Enter alternate flow headings and apply the 'Alternate Flow‘ style
to them.
Enter extension flow headings and apply the Extension Flow‘ style
to them.
Enter each alternate and extension flow step and apply the ‘Use
Case Step‘ style.
For each alternate/extension flow make reference to the step(s)
that it comes from in the use case Basic Flow, by using the
'Insert->Reference->Cross Reference' command to reference the
step number.
Similarly when an alternate flow returns to the basic flow, use
Word’s ‘Cross-Reference’ feature to enter the step that is returned
to.
19. 10/28/2019 19
References Within Use Case Steps
Using the Word
command, ‘Insert-
>Reference->Cross
Reference’, select the
Numbered Item’
Reference Type, Insert
Reference To
‘Paragraph Number’ an
make sure that ‘Insert
As HyperLink’ is ticked.
20. Alternate Flows With Reference
Once all references to use case steps have been
inserted, you may navigate between flow references
using the ‘Control/Click’ function of Word.
10/28/2019 20
21. Renumbering the steps
Suppose (as it will happen) that a new step is inserted or an existing
step is taken out of scope.
Simply add or remove the step(s), select all text and press F9.
All steps and cross-references are automatically updated with the
correct numbers.
(two new lines have been inserted.)
10/28/2019 21
23. 10/28/2019 23
Demo
Create a use case document from the AUC
template.
Select the correct styles for each section of
the document.
Add cross-references to the use case steps.
Renumber steps in the use case by adding
and removing steps in the basic flow and the
alternate flows.
Ctrl-A + F9 to update fields.
24. Importing Diagrams
There are 2 locations for diagrams in the
document;
the details description includes a use case
diagram.
an activity diagram is located after the details of
the steps.
If feasible add diagrams to the document as
linked objects, otherwise copy and paste, and
set their style to ‘figure’.
Enter a ‘return’ character after the diagram and
the next line is automatically set to style ‘figure
label text’. Add a diagram name to this line of
text.
10/28/2019 24
27. 10/28/2019 27
Use Case Supplementary Requirements
Sections 3 contains supplementary requirements that
impact this use case.
These requirements are captured here during development
of the use vase, but will ultimately reside in a
supplementary requirements repository.
Supplementary requirements reference the use case step
#(s) to which they apply.
For each step in the completed use case, identify any
additional restrictions upon that step. Add each restrictions
as a supplementary requirement and use the cross-
reference feature the reference the steps that the
supplementary requirement impacts.
Set the style for each supplementary requirement to be
‘Supplementary Requirement’.
28. Performance And Interface
Determine a common response time for each
interface to the use case. Document this as a
supplementary timing requirement.
For each step in the use case, identify any
unusual performance requirements for that
step. Document each performance requirement
in section 3.1, referencing the step that it
impacts.
For each interface to another application,
create an interface requirement in section 3.2
and reference where this interface is
documented.
10/28/2019 28
30. The AUC Template
This document contains ‘template text’ in blue italics. This
text may be removed at any time during the creation of
the use case document.
The text contains useful instructions for completing the
template, along with examples of the different sections.
Prior to publishing the AUC, all template text should be
removed from the document.
All properties in the document (including the TOC) should
be updated to reflect the current state of the document.
Finally, make sure that no rogue styles have been
attached to the document. Ensure that all contents are of
a valid style and delete any styles that do not belong,
from the styles pane.
10/28/2019 30
31. Demo A Complete AUC Document
Include:
Use case and activity diagrams,
Supplementary requirements,
Performance requirements,
Interface requirements,
Updated table of contents,
Styles pane.
10/28/2019 31
32. 10/28/2019 32
Summary
In this presentation you learned:
the purpose of the different sections of the
AUC document.
the information that goes into each
section.
when to use the AUC document.
33. 10/28/2019 33
Test Your Knowledge
How many use cases are there in an application use case
document?
How do we identify the primary actor?
Can systems be secondary actors?
What do we call a constraint on the state of the
application before the use case may execute?
If an actor is entering data into the application and has
to stop (end the use case) because there is missing
information, is this documented under an alternative or
extension flow?
Open the AUC document style guide and change the
example AUC in the document into a true use case with
the correct styles and references applied.