A ____ is the flowcharting symbol used to represent a process.

A. diamond
B. rhombus
C. rectangle
D. circle


Answer: C

Computer Science & Information Technology

You might also like to view...

After you've created a storyboard, it is advisable to lengthen sentences and add adverbs and adjectives to your text

Indicate whether the statement is true or false

Computer Science & Information Technology

In a(n) ____________________ attack, the attacker monitors (or sniffs) packets from the network, modifies them using Internet Protocol spoofing techniques, and then inserts them back into the network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Top-level domain is a synonym for primary source.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What training should programmers who do custom programming have?

A. Programmers need to be trained in secure programming both in general and for their particular language and application. B. Programmers don't need any security training. C. Programmers need to be trained in general networking security . D. Programmers need to be trained in secure programming for their particular language and application only.

Computer Science & Information Technology