In a use case, the _____ is shown as a stick figurewith a label that identifies its role.
A. actor
B. association
C. linkage
D. service request
Answer: A
You might also like to view...
Answer the following statements true (T) or false (F)
1. Security has three interrelated aspects: physical, logical, and behavioral. As long as at least two aspects are in place, the quality of security is considered high. 2. Passwords and authorization codes are examples of logical security controls. 3. A firewall constructs a barrier between an internal network and an intranet. 4. A firewall is attack-proof.
What is the maximum cable length in a 100BaseT Ethernet network?
A) 10 meters B) 2 meters C) 100 meters D) 200 meters
To access the Step-by-Step Mail Merge Wizard, click Start Mail Merge on the ____ tab.
A. Home B. Insert C. Mailings D. References
In the context of communication networks, the term __________ refers to the structure and layout of network components.
Fill in the blank(s) with the appropriate word(s).