Which of the following symbols is not used on the context-level data flow diagram?
A) rectangle with rounded corners
B) triangle
C) arrow
D) shaded corner square
B) triangle
Computer Science & Information Technology
You might also like to view...
Most attacks can be classified as one of three broad classes. Which of the following is not one of these classes?
a. Viruses b. Malware c. Blocking d. Intrusion
Computer Science & Information Technology
Which of the following permissions would enable users to modify files or directories on a server?
A. Access B. Execute C. Read D. Write
Computer Science & Information Technology