List four elements used in DFDs, draw the symbols, and explain how they are used.
What will be an ideal response?
• A process receives input data and produces output that has a different content, form, or both. For instance, the process for calculating pay uses two inputs (pay rate and hours worked) to produce one output (total pay). The symbol for a process is a rectangle with rounded corners.
• A data flow is a path for data to move from one part of the information system to another. A data flow in a DFD represents one or more data items. The symbol for a data flow is a line with a single or double arrowhead.
• A data store is used in a DFD to represent data that the system stores because one or more processes need to use the data at a later time. The symbol for a data store is a flat rectangle that is open on the right side and closed on the left side.
• An entity provides data to the system or receives output from the system. The symbol for an entity is a rectangle, which may be shaded to make it look three-dimensional. The name of the entity appears inside the symbol.
You might also like to view...
Which of the following properly create and initialize a Font object?
A. Font f = new Font(); B. Font f = new Font("Serif", Font.Bold + Font.Italic, 19); C. Font f = new Font(Font.Bold, 20, "SansSerif"); D. Font f = new Font(20, Font.Bold, "Monospaced"); a. A and B. b. B and C. c. B. d. D.
Explain the design choices that are relevant to minimizing the amount of reply data held at a server. Compare the storage requirements when the RR and RRA protocols are used.
What will be an ideal response?
Which security solution can an organization deploy to prevent unauthorized external access to its internal network?
A. VPN B. Sniffer C. Firewall D. IDS
A company is preparing to decommission an offline, non-networked root certificate server. Before sending the server's drives to be destroyed by a contracted company, the Chief Security Officer (CSO) wants to be certain that the data will not be accessed. Which of the following, if implemented, would BEST reassure the CSO?
A. Disk hashing procedures B. Full disk encryption C. Data retention policies D. Disk wiping procedures E. Removable media encryption