You show an include use case in a(n) ____________________ with a dashed arrow pointing to the subroutine use case.

Fill in the blank(s) with the appropriate word(s).

oval

Computer Science & Information Technology

You might also like to view...

Which of the principles of security is supported by hashing?

a. Availability b. Confidentiality c. Integrity d. Safety

Computer Science & Information Technology

Which of the following is a type of control structure?

a) declaration structure b) repetition structure c) flow structure d) All of the above.

Computer Science & Information Technology