1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ss7ja [257]
3 years ago
9

Suppose you were assigned to develop a logical model of the registration system at a school or college. would you be better off

using a top-down approach, or would a bottom-up strategy be better? what would influence your decision?
Computers and Technology
1 answer:
Valentin [98]3 years ago
5 0
<span>Top-down approaches are most often useful when solving problems such as these. Since all the data is already available, taking the overall problem and breaking it down into smaller parts (with more detail as each level is attained) helps to make the overall task easier.</span>
You might be interested in
Angular where to set httpclient root url.
Trava [24]

Answer:

start with what you know

Explanation:

you can learn a lot more

8 0
2 years ago
Does anybody want to be my friend
Gekata [30.6K]

Answer:

Yeah sure, mines aatelophxbia, i'm 14. what games you play?

6 0
4 years ago
Read 2 more answers
Ted wants to go out to a neighborhood park and shoot pictures of dew drops on grass. He wants to get a low-level angle of the de
daser333 [38]

i believe that the answer to this question is c


8 0
3 years ago
Read 2 more answers
What?<br> I couldn't hear you.<br> (play along)
nexus9112 [7]

Answer:

no

Explanation:

5 0
3 years ago
Which of the following Wi-Fi chalking method refers to drawing symbols in public places to advertise open Wi-Fi networks?
dezoksy [38]

Answer War Chalking

Explanation: War chalking is the technique for presenting the WiFi network publicly. This signifies about the WiFi is present but not describes the manner of it , that is whether it is open connection or closed connection.

It can be used by the people in general as well as hackers . Hackers usually tend to attack and hack its security that is present.Hackers then use the WiFi network  is then used for their own work after being hacked.

3 0
3 years ago
Read 2 more answers
Other questions:
  • There are N bulbs numbered from 1 to N, arranged in a row. The first bulb is plugged into the power socket and each successive b
    6·1 answer
  • Which iteration must have an expression that has a true or false value?
    11·2 answers
  • Why, y did brainly just do that........or did it just happen to me
    12·2 answers
  • How many types of sharing of Google Forms are possible?
    15·1 answer
  • Why do we people have feelings and emotions<br> Please help
    14·2 answers
  • HELP MY TABLET KEEPS ON REBOOTING I TRIED TO FACTORY RESET BUT IT KEEPS ON REBOOTING
    12·2 answers
  • The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the im
    8·1 answer
  • Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
    12·1 answer
  • A program similar to mtr, ____, is available as a command-line utility in Windows operating systems.
    12·1 answer
  • ____ uses a computer to design and test new products and modify existing ones. Computer-aided manufacturing Just-in-time design
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!