An analyst may develop the data flow diagram using a top-down method by using:

A) algebraic notation.
B) structural records.
C) algebraic notation and structural records.
D) vertical expansion methodology.

C) algebraic notation and structural records.

Computer Science & Information Technology

You might also like to view...

____ is a vulnerability scoring system designed to provide an open and standardized method for rating IT vulnerabilities.

A. OVAL B. COBIT C. CVE D. CVSS

Computer Science & Information Technology

Wireless sensors are most effective when their ____ overlap.

A. thresholds B. signatures C. footprints D. keys

Computer Science & Information Technology