Which of the following symbols is not used on the context-level data flow diagram?

A) rectangle with rounded corners
B) triangle
C) arrow
D) shaded corner square

B) triangle

Computer Science & Information Technology

You might also like to view...

Most attacks can be classified as one of three broad classes. Which of the following is not one of these classes?

a. Viruses b. Malware c. Blocking d. Intrusion

Computer Science & Information Technology

Which of the following permissions would enable users to modify files or directories on a server?

A. Access B. Execute C. Read D. Write

Computer Science & Information Technology