1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalka [10]
3 years ago
10

Choose all statements that identify the benefits of programming design.

Computers and Technology
2 answers:
Neporo4naja [7]3 years ago
6 0

Answer:

ACD

Explanation:I just took it the other answer is wrong

Lubov Fominskaja [6]3 years ago
4 0

Answer:

yes

Explanation:

it provides a design approach to a specific type of problem

You might be interested in
Write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate cond
masha68 [24]

The algorithm is as follows:

1. Start

2. bottles = 0

3. While bottles != 500

3.1 Create bottle

3.2 bottle = bottle + 1

4. Switch off machine

5. Stop

Explanation:

This begins the algorithm

1. Start

This initializes bottles to 0

2. bottles = 0

The loop is repeated until 500 bottles is created

3. While bottles != 500

This creates a new bottle

3.1 Create bottle

This increments the number of bottles by 1

3.2 bottle = bottle + 1

This switches of the machine after all bottles are created

4. Switch off machine

End algorithm

5. Stop

THANKS

4 0
3 years ago
(50 points) What animes should I watch?
Eddi Din [679]

Answer:

naruto,naruto shippuden and baruto

Explanation:

3 0
3 years ago
Read 2 more answers
A security specialist discovers a malicious script on a computer. The script is set to execute if the administrator's account be
levacccp [35]

The security specialist has discovers a malicious script on a computer known as a logic bomb.

<h3>Is logic bomb a type of malware?</h3>

A logic bomb is known to be a form of a malicious program that is set up or ignited if a logical condition is met, such as after a series of transactions have been done, or on a given date.

Therefore, The security specialist has discovers a malicious script on a computer known as a logic bomb.

Learn more about malware from

brainly.com/question/399317

#SPJ1

7 0
2 years ago
One of the First-Generation Computer built in 1942 during the Second World War and fully utilized to compute Military Artillery
Temka [501]
ENIAC, in full Electronic Numerical Integrator and Computer, the first programmable general-purpose electronic digital computer, built during World War II by the United States. American physicist John Mauchly, American engineer J. Presper Eckert, Jr., and their colleagues at the Moore School of Electrical Engineering at the University of Pennsylvania led a government-funded project to build an all-electronic computer.

From Brittanica.com
7 0
3 years ago
Which error produces incorrect results but does not prevent the program from running?
rusak2 [61]
The logic error produces incorrect results but does not prevent the program from running. The other name for the logic error i<span>n computer programming is bug. When present , this type of error does not terminate (crash) the program, but cause the program to operate incorrectly. Bugs are very hard to find in a program. </span>
4 0
3 years ago
Other questions:
  • When powering up the computer, the initial program loading and start-up is performed by using a ______________ program that is b
    14·1 answer
  • In a spreadsheet, there are many features that help you edit quickly. True False
    11·1 answer
  • Harry is undertaking a digital photography course as the college and wants to
    12·1 answer
  • Methods inherited from the base/super class can be overridden. This means changing their implementation; the original source cod
    5·1 answer
  • Your unit has an upcoming training event. What form is used to record and maintain document numbers for ammunition documents?
    5·1 answer
  • 5. How would you describe the relationship between blocks of code and commands?​
    14·2 answers
  • The first and second numbers in the Fibonacci sequence are both 1. After that, each subsequent number is the sum of the two prec
    6·1 answer
  • What symbol do we use to denote a character?
    14·1 answer
  • A ____ is a a set of presentation rules that control how text should look. It is applied to an XML file to change the collection
    9·1 answer
  • Dynamics simulate stillness via calculations performed by the computer.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!