When considering OOAD artifacts and the resulting software, how far should one be able to trace
specific user requirements?
A.
Public methods
B.
Class diagrams
C.
Use cases
D.
Private methods
E.
Interaction diagrams
When considering OOAD artifacts and the resulting software, how far should one be able to trace
specific user requirements?
When considering OOAD artifacts and the resulting software, how far should one be able to trace
specific user requirements?
A.
Public methods
B.
Class diagrams
C.
Use cases
D.
Private methods
E.
Interaction diagrams