In a use case, the _____ is shown as a stick figurewith a label that identifies its role.

A. actor
B. association
C. linkage
D. service request


Answer: A

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Security has three interrelated aspects: physical, logical, and behavioral. As long as at least two aspects are in place, the quality of security is considered high. 2. Passwords and authorization codes are examples of logical security controls. 3. A firewall constructs a barrier between an internal network and an intranet. 4. A firewall is attack-proof.

Computer Science & Information Technology

What is the maximum cable length in a 100BaseT Ethernet network?

A) 10 meters B) 2 meters C) 100 meters D) 200 meters

Computer Science & Information Technology

To access the Step-by-Step Mail Merge Wizard, click Start Mail Merge on the ____ tab.

A. Home B. Insert C. Mailings D. References

Computer Science & Information Technology

In the context of communication networks, the term __________ refers to the structure and layout of network components.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology