1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ganezh [65]
3 years ago
6

In general terms, a program that is broken into smaller units of code such as methods, is known as a ________

Computers and Technology
1 answer:
daser333 [38]3 years ago
5 0

Answer:

A Modularized Program.

Explanation:

Modular programming is a technique that consists of breaking down the functions of a program, into several small pieces of software (modules), in a way that every one of them contains all necessary tools to execute one specific task of the program.

This is greatly helpful when designing a large and complex program, as the software becomes easier to maintain, troubleshoot, or make future changes.

You might be interested in
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
Using the diagram to the right, match each letter
alexira [117]

Answer:

A - slide

B - ribbon

C- command

D - group

E - format painter

F - tab

Explanation:

edge2020

5 0
3 years ago
Insurance can help you:
AleksAgata [21]
The answer is: D for sure 
7 0
3 years ago
You are trying to create a user from the command line on a Linux computer. You get an error that permission is denied. What shou
Alisiya [41]

Answer:

preface the command with sudo

Explanation:

In the scenario being described, the best course of action would be to preface the command with sudo . This is because sudo is a program Linux operating system that allows the individual user to run programs with the security privileges of another user, which usually applies to the superuser. In this scenario, this would allow the user to bypass the error message and gain access to such a task.

5 0
3 years ago
Write a program that prints the numbers 1 - 50. If the number is even print the word 'EVEN!' next to it. If the number is odd pr
mamaluj [8]

In python 3.8:

for x in range(1,51):

   print(str(x)+" EVEN!" if x %2==0 else str(x)+" ODD!")

This works for me. Best of luck.

4 0
2 years ago
Other questions:
  • A computer has a pipeline with four stages. each stage takes the same time to do its work, namely, 1 nsec. how many instructions
    5·2 answers
  • Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
    7·1 answer
  • A teacher uses the spreadsheet below to determine the average quiz score of each student. The teacher inserts this information i
    11·2 answers
  • Everyone’s favorite speedy blue hedgehog recently returned to his 2D origins in a critically acclaimed side-scrolling game. What
    8·2 answers
  • Tim has an old server computer that his company uses as a backup. One of the hard drives has gone bad and needs to be replaced.
    13·1 answer
  • Create a Racket procedure compute_pos that reads numbers from the keyboard until 0 is read, count how many positive numbers are
    12·1 answer
  • Refer to the exhibit, a technician applies the configuration in the exhibit to an unconfigured router. To verify the configurati
    13·1 answer
  • In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
    12·1 answer
  • For what reason can security risks never be fully eliminated?​
    7·1 answer
  • Question 6 (1 point)
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!