Sociologists use social network diagrams called _________ to depict connections between people.

Fill in the blank(s) with the appropriate word(s).


sociograms

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Systems must keep records of their activities to permit later forensic analysis to trace security breaches. 2. The attack surface is the reachable and exploitable vulnerabilities in a system. 3. The SDN controller is a high-value target that needs a high level of protection. 4. IoT is the newest, easiest, and most developed area of network security. 5. IoT must support security audit for data transmission, storage, processing, and application access.

Computer Science & Information Technology

What is not true about an RTF formatted file?

A) It retains most of the text and paragraph formatting. B) It can be read by almost all word processors. C) Because the file size can be excessively large, you should only use it when no other format will work. D) It is a universal document format.

Computer Science & Information Technology

When a formula contains an error and the Trace Dependents tool has not helped you correct the problem, using the Review Formula tool is the next step

Indicate whether the statement is true or false.

Computer Science & Information Technology

Which of the following is the topmost node in a tree and does not have a parent?

A. root B. child C. leaf D. interior node

Computer Science & Information Technology