You show an include use case in a(n) ____________________ with a dashed arrow pointing to the subroutine use case.
Fill in the blank(s) with the appropriate word(s).
oval
Computer Science & Information Technology
You might also like to view...
Which of the principles of security is supported by hashing?
a. Availability b. Confidentiality c. Integrity d. Safety
Computer Science & Information Technology
Which of the following is a type of control structure?
a) declaration structure b) repetition structure c) flow structure d) All of the above.
Computer Science & Information Technology