here are the cases:
So in terms of security for a university its great to understand the process of enrolling. Students can go straight into a university however foreign students need to go through background checks. Registrar personnel have access to system that allows them to override classes where as student access is limited
Here is the link, it explains it much clearer with the pictures provided:
https://docs.google.com/drawings/d/1mJ7aDFj1FGqhwgLvXC28gRl8J7RHG1SldWGoPUjnIw4/edit?usp=sharing
Please don't abuse it guys. E-mail seems to be the primary source of communication at the university I want to work with. They haven't replied back though, again.
So this looks like an activity diagram :-) Use cases would usually break out the different things that different stakeholders would do, focusing just on their perspectives one at a time. It's the activity diagram that brings them all together.
ReplyDeleteIt's interesting to hear that international students go through security checks - I didn't know that. I'm not sure though how that's related to the computer security software you were talking about previously