Question: 1. When drawing a document flowchart draw a swim lane for each internal and external entity first Group of answer choices True False 2. Hackers
1. When drawing a document flowchart draw a swim lane for each internal and external entity first
Group of answer choices
True
False
2. Hackers use social engineering to gain access to sensitive information. Social engineering is:
Group of answer choices
a) Becoming friends with a legitimate user
b) Gain access through social networking
c) Acting as a legitimate user
d) Acting as a relation of an employee to gain access
3. Which of the following is not true about program flowcharts?
a) Program flowcharts are a high-level overview of all business processes
b) Program flowchart document the processing logic of computer programs.
c) A program flowchart will exist for every computer process symbol on a system flowchart
d) Program flowcharts tend to increase computer programmer productivity
4. What is the data store symbol used to represent
a) The storage of data
b) The storage of processes
c) The storage of customers details
d) Manual, transient or electronic storage of data
5. Data flow elements going into and out of a data store
a)Must be created by the process linking to the data store
b) must be base elements
c) must be on a data flow that is input to the process that creates the output that is going to the data store
d) must also be defined and contained in the data store
6. An upper level DFD showing external entities and one process element
... (pick 2 answers)
a) is a Context Diagram
b) provides a more detailed view of the Context Level Diagram
c) is a basic overview of the whole system.
d) shows the main functions carried out by the system are highlighted as it is
broken into its sub-processes
7. Data flow diagram processes that transform data should be named with a noun which indicates the data that has been transformed.
True
False
8. The name of the data flow coming out of a process should be different from the name of the data flow going into the process.
True
False
9. Which of the following is a method used to embezzle money a small amount at a time from many different accounts?
a) Data diddling
b) Pretexting
c) Spoofing
d) Salami technique
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
