Data flow diagrams
A. depict logical tasks that are being performed, but not who is performing them
B. illustrate the relationship between processes, and the documents that flow between them and trigger activities
C. represent relationships between key elements of the computer system
D. describe in detail the logic of the process
Answer: A
You might also like to view...
In which of the preceding cases is grep used as a filter?
Give an example of a command that uses grep a. With both input and output redirected. b. With only input redirected. c. With only output redirected. d. Within a pipeline.
If you leave the Bin Range box blank, Excel will not be able to generate bin values automatically
Indicate whether the statement is true or false
A(n) ________ exists for use as a web application that lists anything that can be required via the company's cloud infrastructure
A) Internal database catalog B) Private catalog entity C) Cloud database D) Cloud services catalog
A company has been attacked and their website has been altered to display false information. The security administrator disables the web server service before restoring the website from backup. An audit was performed on the server and no other data was altered. Which of the following should be performed after the server has been restored?
A. Monitor all logs for the attacker's IP B. Block port 443 on the web server C. Install and configure SSL to be used on the web server D. Configure the web server to be in VLAN 0 across the network