An analyst may develop the data flow diagram using a top-down method by using:
A) algebraic notation.
B) structural records.
C) algebraic notation and structural records.
D) vertical expansion methodology.
C) algebraic notation and structural records.
Computer Science & Information Technology
You might also like to view...
____ is a vulnerability scoring system designed to provide an open and standardized method for rating IT vulnerabilities.
A. OVAL B. COBIT C. CVE D. CVSS
Computer Science & Information Technology
Wireless sensors are most effective when their ____ overlap.
A. thresholds B. signatures C. footprints D. keys
Computer Science & Information Technology