what criteria do you use to indicate the use case specification is complete and or correct?

Posted on 2007-11-23
Last Modified: 2010-05-18
what criteria one should use to indicate the use case specification is complete or/ correct?
Question by:vinithasukesh

Accepted Solution

mhunts earned 500 total points
ID: 20394053
The use case should cover all alternate paths or scenarios. Have the business user come up with alternate paths, until they can't come up with any more. Have them explain the expected result for each alternate path. When you can't come up with any more, you're done. If you have too many, use object oriented principles such as inheritance, and abstraction to break the uber use case into more manageable abstract ones.
LVL 15

Expert Comment

ID: 20483994
Do you mean from a Customer Verification perspective?

Expert Comment

ID: 20490652
Exactly! It is much easier for customers to verify a narriative, scenario-based use case, than an Excel sheet of functional requirements. The latter has proven difficult for non-technologists to understand, and put into a business context.
Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

LVL 15

Expert Comment

ID: 20494312
Agreed.. Use Case should be used to document requirements, validate with the Customer a common and correct understanding, use them to actually code/build the application and then use them to test the application as verification criteria..

Expert Comment

ID: 20772766
It should meet the customer specifications and requirements.

Expert Comment

ID: 21022526
Forced accept.

EE Admin

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
Where to go on the main page to find the job listings. How to apply to a job that you are interested in from the list that is featured on our Careers page.
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now