In the ________ version of the sequence diagram, the participating objects are business objects.
A) design
B) programming
C) analysis
D) updated
Question 2
Security authentication prevents parties from denying actions they have taken.
Indicate whether the statement is true or false