This preview shows page 1. Sign up to view the full content.
Unformatted text preview: Step 2 : They system responds by displaying a screen to enter the new clients information. Step 3: The user may request to enter more than one clients information. Step 4: The system will verify that the user has the right to enter new clients. The display should include an option for retuning to the original list. ALTERNATE COURSES: CONCLUSION: This use case will conclude in 6 months. POST-CONDITION: BUSINESS RULES Internet security is highly important and needs to be implemented before any new clients can be entered. IMPLEMENTATION CONTRAINTS AND SPECIFICATIONS The system needs to have internet security in place before entering new clients. ASSUMPTIONS: OPEN ISSUES:...
View Full Document
- Spring '05