Potato workflow management system
Organization model case description
V1.0
Project Name: Potato Workflow System
Schedule: wind rolling
Writtenman: wind rolling
Writing time: 2004.8.18
QQ: 9131144
table of Contents
Directory. 2
1. Personal maintenance. 3
1.1. Increase people ... 3
1.2. Delete personnel ... 3
1.3. Modify personnel ... 3
1.4. Query personnel ... 3
2. Department maintenance. 3
2. Increase the department ... 3
2.2. Delete department ... 3
Person maintenance
1.1. Increase
Usage name:
Increasing personnel
aims:
This use case meets all the goals of new people. Description:
Add a person in the system. priority:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to the system post condition:
Personnel join the people's library trigger events:
Principal path:
1. System administrator entry the person name, ID, and other basic information 2. The system checks the recorded data 3. Check the pass, add a record alternate path in the person library:
Abnormal path:
1. There is no need to enter ID, name, department, etc. 2. If the input ID is already in the system, the system administrator will re-enter
Extended point:
Personal role, setting constraints / problems / risks:
Non-functional demand:
Business Rules:
Remarks:
1.2. Delete
Usage name:
Delete
aims:
This use case satisfies all the goals of deleting one or some people. Description:
Delete one or some people from the system. priority:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to the system post condition:
Remove this person from the person library to record the trigger event:
Principal path:
1. Select the person you want to delete 2. The system deletes the spare path:
Abnormal path:
1. The selected person does not exist in the library (may already be deleted in the library) 2. If this person is logged in to the system, the prompt cannot be deleted:
Delete this person-related role, permission, etc. Set constraints / issues / risks:
Non-functional demand:
Business Rules:
Remarks:
1.3. Modify
Usage name:
Modifiable personnel
aims:
This use case meets all the objectives of the modified person:
Modify the basic information of the person. Administrators can modify the personnel department, role, job, etc., and ordinary employees can only modify their basic information priority:
1 Related case:
The main participants:
System administrator, ordinary employee auxiliary participants:
Preconditions:
System administrators or ordinary employees have been logged in to system post-standard:
Update the information triggering event from the library:
Principal path:
1. The system administrator modifies the information of a person (the person ID cannot be modified) 2. The system updates the record alternate path based on the ID of the modified person:
1. Ordinary employees modify their own basic information 2. The system is updated according to the person ID:
1. If this person does not exist in the system, the system makes a prompt extension point: constraint / problem / risk:
Non-functional demand:
Business Rules:
Remarks:
1.4. Inquiries
Usage name:
Query personnel
aims:
All objective descriptions of this use case query:
Check the person basic information priority by entering your name:
1 Related case:
The main participants:
System administrator, ordinary staff auxiliary participants:
Preconditions:
Participants have logged in to the system post:
Returns the result set trigger event:
Principal path:
1. Enter the query content name 2. The system returns the result set of queries:
Abnormal path:
1. If you don't find the match, the system makes a prompt extension point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
2. Department maintenance
2.1. Increase the department
Usage name:
Increasing department
aims:
This use case meets all the objectives of the increased department:
Add a departmental priority in the system:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to the system post condition:
Add a department record trigger event in the library:
Principal path:
1. System administrator entry department information 2. The system checks the integrity of the entry information. Add a department record alternate path in the system:
Abnormal path:
1. If the entry department already exists (that is, the system has existed in the specific department A), the system gives a hint. 2. If the entry information is incomplete, the system gives a prompt. Extended point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
2.2. Delete department
Usage name:
Delete department
aims:
This use case satisfies all target descriptions of the deletion of one or some departments:
Remove one or some departmental priority in the system:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to this system post-control:
Remove this department record trigger event in the human system:
Principal path:
1. Select a certain or some department 2. According to the selected department ID, the system removes the sectoral record spare path from the system:
Abnormal path:
1. If this department does not exist in the system (probably deleted), the system makes a prompt. 2. If there is a person under this department, it is prompted to delete all employees under this department. Extended point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
2.3. Modification department
Usage name:
Revised department
aims:
This use case satisfies all objective descriptions of modifying a department information:
Modify the basic information priority of a department in the system:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to this system post-control:
Updating this department record trigger event: Main path:
1. The system administrator modifies the information of a department (department ID cannot be modified) 2. The system updates the record alternate path according to the ID of the modified department:
Abnormal path:
1. If this department does not exist in the system (probably deleted), the system makes a prompt. Extended point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
2.4. Query department
Usage name:
Query department
aims:
All target descriptions of this use case query department:
Query the basic information priority by entering the department name:
1 Related case:
The main participants:
System administrator, ordinary staff auxiliary participants:
Preconditions:
Participants have logged in to the system post:
Returns the result set trigger event:
Principal path:
3. Enter the query content - department name 4. The system returns the result set of queries:
Abnormal path:
1. If you don't find the match, the system makes a prompt extension point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
3. Role maintenance
3.1. Add role
Usage name:
Increasing role
aims:
This use case satisfies all objective descriptions of increasing roles:
Add a role priority in the system:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to the system post condition:
Add a role record trigger event in the library:
Principal path:
1. The system administrator entered role information 2. The system checks the integrity of the entry information. Add a role in the system to record the spare path:
Abnormal path:
1. If the entered role already exists, the system gives a prompt. 2. If the entry information is incomplete, the system gives a prompt. Extended point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
3.2. Delete the role
Usage name:
Delete role
aims:
This use case satisfies all object descriptions of deleting one or some roles:
Delete one or some role priority in the system:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to this system post-control:
Remove this role record trigger event in the human system:
Principal path:
1. Select a certain or some role 2. According to the selected role ID, the system removes this role record alternate path from the system:
Abnormal path:
1. If this role does not exist in the system (may be deleted), the system makes a prompt. 2. If there is a person under this role, this role is prompted to delete the person. Extended point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
3.3. Modify the role
Usage name:
Modify the role
aims:
This use case satisfies all objective descriptions to modify a role information:
Modify the basic information priority of a role in the system: 1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to this system post-control:
Update this role record trigger event in the human system:
Principal path:
1. The system administrator modifies the information of a role (role ID cannot be modified) 2. The system updates the record alternate path according to the ID modified role:
Abnormal path:
1. If this role does not exist in the system (may be deleted), the system makes a prompt. Extended point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
3.4. Query role
Usage name:
Query role
aims:
All objective descriptions of this use case query role:
Query roles Basic information priority by entering the role name:
1 Related case:
The main participants:
System administrator, ordinary staff auxiliary participants:
Preconditions:
Participants have logged in to the system post:
Returns the result set trigger event:
Principal path:
1. Enter the query content - Role Name 2. The system returns the result set of queries:
Abnormal path:
1. If you don't find the match, the system makes a prompt extension point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
4. Group maintenance
4.1. Increase group
Usage name:
Increasing group
aims:
This use case meets all the target descriptions of the group:
Add a group priority in the system:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to the system post condition:
Add a group of group record triggers in the library:
Principal path:
1. The system administrator entered group information 2. The system checks the integrity of the entry information. Add a group of group records in the system:
Abnormal path:
1. If the entry group already exists, the system gives a hint. 2. If the entry information is incomplete, the system gives a prompt. Extended point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
4.2. Delete group
Usage name:
Delete group
aims:
This use case satisfies all target descriptions of the deletion of a group:
Remove a group priority in the system:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to this system post-control:
Remove this group record trigger event in the human system:
Principal path:
1. Select a group 2. According to the selected group, the system removes this group record alternate path from the system:
Abnormal path:
1. If this group does not exist (probably deleted) in the system, the system makes a prompt. Extended point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
4.3. Modify group
Usage name:
Modify group
Objective: This use case meets all target descriptions to modify a group information:
Modify the basic information priority of a group in the system:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to this system post-control:
Update this group record trigger event in the human system:
Principal path:
1. The system administrator modifies the information of a group (group ID cannot be modified) 2. The system updates the record alternate path based on the ID modified group:
Abnormal path:
1. If this group does not exist (probably deleted) in the system, the system makes a prompt. Extended point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
4.4. Query Group
Usage name:
Query group
aims:
This use case query group all target descriptions:
Query the basic information priority by entering the group name:
1 Related case:
The main participants:
System administrator, ordinary staff auxiliary participants:
Preconditions:
Participants have logged in to the system post:
Returns the result set trigger event:
Principal path:
1. Enter the query content - Group Name 2. The system returns the result set of queries:
Abnormal path:
1. If you don't find the match, the system makes a prompt extension point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
5. Position maintenance
5.1. Increase job
Usage name:
Increasing position
aims:
This use case satisfies all target descriptions of increasing positions:
Add a job priority in the system:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to the system post condition:
Add a job record trigger event in the library:
Principal path:
1. The system administrator is entered into job information 2. The system checks the integrity of the entry information. Add a job record alternate path in the system:
Abnormal path:
1. If the entry of the job already exists, the system gives a prompt. 2. If the entry information is incomplete, the system gives a prompt. Extended point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
5.2. Delete the job
Usage name:
Delete jobs
aims:
This use case satisfies all objective descriptions of deleting a job:
Remove a job priority in the system:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to this system post-control:
Remove this job record trigger event in the human system:
Principal path:
1. Select a certain or some position 2. According to the selected job, the system removes this job record alternate path from the system:
Abnormal path:
1. If this position does not exist in the system (may be deleted), the system makes a prompt. 2. If there is a person under this position, you will be deleted, and if you delete it, remove the relevant person's position. Extended Point: Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
5.3. Modify the position
Usage name:
Amendment
aims:
This use case satisfies all target descriptions of modifying a position information:
Change the basic information priority of a position in the system:
1 Related case:
The main participants:
System administrator auxiliary participants:
Preconditions:
The system administrator has logged in to this system post-control:
Update this job record trigger event in the human system:
Principal path:
1. The system administrator modifies the information of a job (the position ID cannot be modified) 2. The system updates the record alternate path according to the ID of the modified position:
Abnormal path:
1. If this position does not exist in the system (may be deleted), the system makes a prompt. Extended point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
5.4. Query position
Usage name:
Query position
aims:
All objectives of this use case query position:
Query the basic information priority by entering the job name:
1 Related case:
The main participants:
System administrator, ordinary staff auxiliary participants:
Preconditions:
Participants have logged in to the system post:
Returns the result set trigger event:
Principal path:
1. Enter the query content - the job name 2. The system returns the result set of queries:
Abnormal path:
1. If you don't find the match, the system makes a prompt extension point:
Constraint / Problem / Risk:
Non-functional demand:
Business Rules:
Remarks:
contact details
QQ: 9131144
E-mail: workflow@163.com