Professional Documents
Culture Documents
<Organization>
10-17-2021
Version 1.0
The document in this file is for UML Use Case Documentation Specifications, which
conforms to the requirements of UML 2.0.
Items that are intended to stay in as part of your document are in bold; blue italic text is
used for explanatory information that should be removed when the template is used.
2 v. 1.0 2006
Use Case Template
Table of Contents
1. GENERAL INFORMATION................................................................................................................3
1.1 VERSION CONTROL..................................................................................................................... 4
1.2 INFORMATION DETAILS................................................................................................................ 4
2. USE CASE TEMPLATE.....................................................................................................................4
3 v. 1.0 2006
Use Case Template
1. GENERAL INFORMATION
Fill in the following details to keep trace of Project Phases and Iterations.
4 v. 1.0 2006
Use Case Template
Success Condition User/ Admin is able to access the system if the credentials are entered to
be correct.
Failed Condition Authentication error occurs leading to no access to the system
Postconditions 1. The user is logged in to system
2. The user has access to the functions of the system
Primary Actors User/ Admin
5 v. 1.0 2006
Use Case Template
6 v. 1.0 2006
Use Case Template
7 v. 1.0 2006
Use Case Template
Preconditions <Condition that the Use Case Assumes to start its Functionality>
Success Condition <The state of the Use Case upon successful completion>
Failed Condition <The state of the Use Case if goal abandoned>
Postconditions <Condition that is Satisfied by the Use Case at exit >
Primary Actors <A role name or description for the primary actor>.
Trigger <The action upon the system that starts the use case>
DESCRIPTION Ste Basic Course of Action
p
1 <Narrate the steps of the scenario from trigger to goal delivery, and
any cleanup after>
2 <...>
3
DESCRIPTION Ste Alternate Course of Action
p
1 <Narrate the steps of the scenario from trigger to goal delivery, and
any cleanup after>
2 <...>
3
DESCRIPTION Ste Extension Points
p
1 <Narrate the steps of the scenario from trigger to goal delivery, and
any cleanup after>
2 <...>
3
DESCRIPTION Ste Error Scenario
p
1 <Narrate the steps of the scenario from trigger to goal delivery, and
any cleanup after>
2 <...>
3
8 v. 1.0 2006
Use Case Template
Trigger <The action upon the system that starts the use case>
DESCRIPTION Ste Basic Course of Action
p
1 <Narrate the steps of the scenario from trigger to goal delivery, and
any cleanup after>
2 <...>
9 v. 1.0 2006
Use Case Template
3
DESCRIPTION Ste Alternate Course of Action
p
1 <Narrate the steps of the scenario from trigger to goal delivery, and
any cleanup after>
2 <...>
3
DESCRIPTION Ste Extension Points
p
1 <Narrate the steps of the scenario from trigger to goal delivery, and
any cleanup after>
2 <...>
3
DESCRIPTION Ste Error Scenario
p
1 <Narrate the steps of the scenario from trigger to goal delivery, and
any cleanup after>
2 <...>
3
10 v. 1.0 2006
Use Case Template
Trigger <The action upon the system that starts the use case>
DESCRIPTION Ste Basic Course of Action
p
1 <Narrate the steps of the scenario from trigger to goal delivery, and
any cleanup after>
2 <...>
3
DESCRIPTION Ste Alternate Course of Action
p
1 <Narrate the steps of the scenario from trigger to goal delivery, and
any cleanup after>
2 <...>
3
DESCRIPTION Ste Extension Points
p
1 <Narrate the steps of the scenario from trigger to goal delivery, and
any cleanup after>
2 <...>
3
DESCRIPTION Ste Error Scenario
p
1 <Narrate the steps of the scenario from trigger to goal delivery, and
any cleanup after>
2 <...>
3
11 v. 1.0 2006
Use Case Template
12 v. 1.0 2006
Use Case Template
4.1 ACTORS
The main actors of the use case are the admin and the user who perform different kinds
of use cases like login, registration, booking hostel, allot rooms, manage and view room
details as well as student profile and manage students.
4.2 TRIGGER
The Triggers for the system are:
The User decides to login to the system.
The User decides to accommodate the hostel and fill the registration form.
The User decides to book the hostel by adding their room details and personal
information.
The User decides to view or modify their personal details.
The User decides to view and print their room details.
The Administrator decides to login to the system
The Administrator decides to accommodate a student in the hostel and fills the
registration form.
The Administrator decides to issue the membership card to the student.
The Administrator decides to add significant course the following student is pursuing as
well as removes and updates or modifies it.
The Administrator decides to allot the room.
The Administrator decides to view the dashboard with various options (other use cases)
The Administrator decides to manage the student by removing the student from the
hostel as well as viewing their personal details.
4.3 DESCRIPTION
The User can login to the system if they are already registered or fill the registration form
to accommodate the hostel room. The Administrator can login to the system and
13 v. 1.0 2006
Use Case Template
accommodate a student in the hostel by filling the registration form. The User can book
the hostel by adding their room details and personal information and the Administrator
can issue the membership card to the student. The User can view or modify their personal
details and also print their room details. The Administrator on the other hand can add
significant course the following student is pursuing as well as removes and updates or
modifies it and allots the room. The Administrator has the facility to view the dashboard
with various options (other use cases) and manage their data by removing the student
from the hostel as well as viewing their personal details.
4.4 PRECONDITIONS
The activities that must take place, or any conditions that must be true, before the use
case can be started are:
1. User’s identity has been authenticated.
2. System must be fully configured; appropriate user ID and passwords must be
obtained.
3. User’s computer has sufficient free memory available to launch task.
4.5 POSTCONDITIONS
The state of the system at the conclusion of the use case execution is:
1. The user must have an access to the functions of the system.
14 v. 1.0 2006
Use Case Template
X.2 Student Registration can be performed both by the admin and the user.
4.8 EXCEPTIONS
X.1 The system will show an authentication error if the login credentials of the user or
the admin are entered to be incorrect.
X.1, X.2, X.3 The system login or registration, modification of data cannot be possible if
there is an internet connectivity error and the data will not be saved.
4.9 INCLUDES
Issuing of membership card for the student and not just viewing the student details alone
but also generation of a PDF to print the data to save for later as a record.
4.10 PRIORITY
There are the requirements that are not directly related to the functionality of the system which
should be considered as mandatory when the system is developed. The following Constraints
were arrived at for the system:
For gaining entry into the system the admin should be able use login & passwords for gaining
access to the system.
The admin should be able to change their passwords for increased security.
The system should be easy to understand and organized in a structured way.
The use cases mentioned should be used frequently by the users and admin. The system
shall be available 24 hours a day.
Business rule states the on-time submission of the duly mentioned cases which includes
the effective updating of the databases for sound consistency.
15 v. 1.0 2006
Use Case Template
The system needs to be deployed on a good support of network resources, which most of
the recent servers are capable of running in their native state. The specific use-cases aim
to receive the RAM of 4 GB (minimum).
4.14 ASSUMPTIONS
The assumptions made were that the system software’s would be running on a duly
suitable environment, supporting high-scale massive infrastructural capabilities.
16 v. 1.0 2006