1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
8

Which of the following is NOT a component of a DFD?

Computers and Technology
1 answer:
OverLord2011 [107]3 years ago
3 0

Answer:

Relationship between external entities

Explanation:

There are four primary components in all data flow diagrams: entity, process, data store and data flow.

  • External entity

Also recognized as performers, sources or sinks, and terminators, internal entities generate and consume information flowing between the diagramming entity and system. These data flows are the DFD's inputs and outputs.

  • Datastore

No activities are generated by a data store, but it merely maintains data for subsequent access. Data stores may consist of long-term files or a batch of documents stored for a short time while waiting for processing.

  • Dataflow

Dataflow between external entities, procedures and information shops is depicted by an arrow symbol indicating the flow direction.

You might be interested in
You are creating a budget for your new business.What should you include
aev [14]

Answer:

When operating a business, your budget will need to be created to account for fixed and variable costs. Fixed costs include your rent, utilities, phone/ Internet, accountant, legal fees, technology, salaries, advertising & marketing. Variable costs include the costs of goods sold and labor costs/ commissions.

Explanation:

5 0
3 years ago
Explain how the use of Git and a shared public Git repository simplifies the process of managing opensource development when man
GrogVix [38]

Answer:

Git is a collaborative software used by members of a group to share and work on the same projects. Github is a web application that uses git to link people working together on a codebase. With git and Github, opensource projects can be accessed and collaborated on by volunteers.

Explanation:

Opensource development is a collaborative group of developers working together on a software or platform with a general public license. When working on an opensource project, each developer is able to folk or get a copy of the repository downloaded to a local computer which they can work on and push or update to the actual online repository if the condition for a change is met.

4 0
3 years ago
Who knows a website that can connect videos in your phone
Arte-miy333 [17]
Get a screen recorder then record all the videos u wanna save then u can go back and watch them wenever u want to
5 0
3 years ago
which of the following electromagnetic waves are not used for communication? a.gamma rays b.microwaves c.infrared waves d.radio
Flura [38]

Gamma rays are not used for communication.

-- We have no safe way to generate them.
-- We have no cheap way to detect them.
-- We have no way to impress information on them (modulate them).
-- They're dangerous.

Otherwise they're ideal for communication.


3 0
3 years ago
Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
Mars2501 [29]

Since Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard, the attacks that is related to encrypted wireless packets is option A: IV attacks.

<h3>Describe an IV attack.</h3>

A wireless network attack is called an initialization vector (IV) attack. During transmission, it alters the IV of an encrypted wireless packet. One packet's plaintext can be utilized by an attacker to calculate the RC4 key stream produced by the IV employed.

Note that A binary vector used to initialize the encryption process for a plaintext block sequence in order to boost security by adding more cryptographic variance and to synchronize cryptographic hardware. The initialization vector is not required to be kept secret.

Learn more about Wi-Fi Protected Access  from

brainly.com/question/13068630
#SPJ1

See full question below

Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understanding that WPA uses a combination of an RC4 stream cipher and Temporal Key Integrity Protocol (TKIP), this makes a wireless access point NOT vulnerable to which of the following attacks when related to encrypted wireless packets?

IV attacks

Malware

Ransoware

5 0
1 year ago
Other questions:
  • Why ois my printer not printing pictjures?
    9·1 answer
  • tuition $36,620 room and board $12,900 books and fees $2,450 transportation $3,100 other $1,330 . Emily is using the table to de
    8·2 answers
  • What is the purpose of a scatter plot introduction to computer applications
    6·2 answers
  • If you are involved in a collision that results in property damage, injury, or death, you must call
    13·1 answer
  • What is one way to recognize whether an online source has been copyrighted? The source features the phrase “all rights reserved.
    6·2 answers
  • From which type of data storage does the CPU load information for processing during normal operation?
    14·1 answer
  • Which person would be the best fit for a career in the Information Technology field?
    6·2 answers
  • Ema Company for business .
    14·1 answer
  • Classify the following as cross-section or time-series data: Gross sales of 200 ice cream parlors in July 2009
    8·1 answer
  • There is a group of 10 people who are ordering pizza. If each person gets 2 slices and each pizza has 5 slices, how many pizzas
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!