Question: Case Name: ID: Priority: Brief Description: Actor: Trigger: Type External Temporal Preconditions: Normal Course Information for Steps Alternative Course(s): Postconditions: Exceptions: Summary: Inputs Source Outputs

| Case Name: | ID: | Priority: | ||||
| Brief Description:
| ||||||
| Actor: | ||||||
| Trigger: Type External Temporal | ||||||
| Preconditions:
| ||||||
| Normal Course
| Information for Steps | |||||
| Alternative Course(s):
| ||||||
| Postconditions:
| ||||||
| Exceptions:
| ||||||
| Summary: Inputs Source Outputs Source | ||||||
|
|
|
|
| |||
J. Create a set of use cases for a university library bor- rowing system. (Do not worry about catalogue search- ing, etc.) The system will record the books owned by the library and will record who has borrowed what books. Before someone can borrow a book, he or she must show a valid ID card that is checked to ensure that it is still valid against the student database main- tained by the registrar's office (for student borrowers) the faculty/staff database maintained by the person- nel office (for faculty/staff borrowers), or against the library's own guest database (for individuals issued a "gues" card by the library). The system must also check to ensure that the borrower does not have any overdu
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
