... |
... |
@@ -29,7 +29,7 @@ |
29 |
29 |
* **Non-Functional Requirements** |
30 |
30 |
** **Lower-level technical use cases** derived from high-level business use cases that are not directly visible to end users, but form the backbone of software functionality. This includes the expected behavior of the underlying components, modules and units. |
31 |
31 |
** **Border cases** that could theoretically occur, such as maximum/minimum values, nulls, invalid input outside the permissible value range, zeroes, negative numbers, empty lists, values with special meaning, exceptions, etc. |
32 |
|
-** If existent: |
|
32 |
+** If necessary: |
33 |
33 |
*** **Performance requirements** |
34 |
34 |
*** **Security requirements** |
35 |
35 |
*** **Load requirements**, when software is expected to handle a certain number of requests per second. |