For each use case, a _____ in the form of a table is developed to document the name of the use case, the actor, a description of the use case, and so forth.

A. use case description
B. use case diagram
C. use case schematic
D. use case outline


Answer: A

Computer Science & Information Technology

You might also like to view...

Presenting an identifier to the security system is the __________ step.

A. authentication B. verification C. identification D. clarification

Computer Science & Information Technology

A(n) __________ is a class that stores data and organizes it in some fashion.

a. iterator b. container c. template d. box e. None of these

Computer Science & Information Technology

Explain the Java coordinate system for graphic objects.

What will be an ideal response?

Computer Science & Information Technology

Most people use the terms Internet and World Wide Web interchangeably, but they are two different things

Indicate whether the statement is true or false

Computer Science & Information Technology