Solved

what criteria do you use to indicate the use case specification is complete and or correct?

Posted on 2007-11-23
7
251 Views
Last Modified: 2010-05-18
what criteria one should use to indicate the use case specification is complete or/ correct?
0
Comment
Question by:vinithasukesh
7 Comments
 
LVL 8

Accepted Solution

by:
mhunts earned 500 total points
ID: 20394053
The use case should cover all alternate paths or scenarios. Have the business user come up with alternate paths, until they can't come up with any more. Have them explain the expected result for each alternate path. When you can't come up with any more, you're done. If you have too many, use object oriented principles such as inheritance, and abstraction to break the uber use case into more manageable abstract ones.
0
 
LVL 15

Expert Comment

by:lyonst
ID: 20483994
Do you mean from a Customer Verification perspective?
0
 
LVL 8

Expert Comment

by:mhunts
ID: 20490652
Exactly! It is much easier for customers to verify a narriative, scenario-based use case, than an Excel sheet of functional requirements. The latter has proven difficult for non-technologists to understand, and put into a business context.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 15

Expert Comment

by:lyonst
ID: 20494312
Agreed.. Use Case should be used to document requirements, validate with the Customer a common and correct understanding, use them to actually code/build the application and then use them to test the application as verification criteria..
0
 

Expert Comment

by:1981m
ID: 20772766
It should meet the customer specifications and requirements.
0
 
LVL 1

Expert Comment

by:Computer101
ID: 21022526
Forced accept.

Computer101
EE Admin
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
what is the difference is between MLA and APA styles of writing? 6 62
Best winter heavy coats 6 65
DVI Ports 14 84
installed apps by date on android phone 1 30
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Stuck in voice control mode on your Amazon Firestick?  Here is how to turn it off!!!
Saved searches can save you time by quickly referencing commonly searched terms on any topic. Whether you are looking for questions you can answer or hoping to learn about a specific issue, a saved search can help you get the most out of your time o…
Where to go on the main page to find the job listings. How to apply to a job that you are interested in from the list that is featured on our Careers page.

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now