For each use case, a _____ in the form of a table is developed to document the name of the use case, the actor, a description of the use case, and so forth.
A. use case description
B. use case diagram
C. use case schematic
D. use case outline
Answer: A
Computer Science & Information Technology
You might also like to view...
Presenting an identifier to the security system is the __________ step.
A. authentication B. verification C. identification D. clarification
Computer Science & Information Technology
A(n) __________ is a class that stores data and organizes it in some fashion.
a. iterator b. container c. template d. box e. None of these
Computer Science & Information Technology
Explain the Java coordinate system for graphic objects.
What will be an ideal response?
Computer Science & Information Technology
Most people use the terms Internet and World Wide Web interchangeably, but they are two different things
Indicate whether the statement is true or false
Computer Science & Information Technology