1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Greeley [361]
3 years ago
9

PLZZZ HELP ME THIS IS THE THIRD TIME!!! BRAINLIEST AND 50 POINTS What are the advantages and disadvantages of top-down and botto

m-up programming? How would you decide which one to use? Do you approach problems in your real life from a bottom-up or top-down approach?
Computers and Technology
1 answer:
lord [1]3 years ago
5 0

I would do top to down approach start from the top and work your way down to the bottom.

You might be interested in
All of the following are ways to limit what is tracked about you online, except:
Veseljchak [2.6K]

Answer:b

Explanation: turning off your screen does nothing on the cyber side and people and companies can still access your internet history even while your screen is off

5 0
3 years ago
Which command button contains the following sub options as given in the picture?
DiKsa [7]

Answer:

D) Slide options

Explanation:

hope this helps

7 0
3 years ago
Read 2 more answers
A ___________ variable is used to add up a set of values. fill in the blank
TEA [102]

Answer:

dependent variable -- As it depends on the other variables, changes when they change

3 0
3 years ago
An access control system that grants users only those rights necessary for them to perform their work is operating on which secu
solmaris [256]

Answer:

B. Least privilege                

Explanation:

  • The principle of least privilege an important principle in computer security.
  • It limits the access rights for users and only grant them with the rights that are sufficient for them to perform their required task.
  • For example a user is granted privilege to execute a file or manipulate data or use only the resources that are required for them to perform a particular task.
  • This principle can be used only to limit and control access rights to system resources and applications.
  • The least privilege is beneficial as it reduces the risk of unauthorized access.
  • For example a user whose task is data entry and has nothing to do with controlling access or granting access rights to users, will only be allowed to enter data to the DB by the principle of least privilege.
7 0
3 years ago
The lower an applicant's credit score, the lower the risk to the lender.
ladessa [460]
False your welcomeeeeee
5 0
2 years ago
Other questions:
  • In the ascii coding scheme, each byte represents a single ____________________, which can be a number, letter, blank space, punc
    9·1 answer
  • Which technology forms the foundation for cloud computing? forms the foundation for cloud computing.
    12·2 answers
  • What do we call the time it takes for all of the sub-pixels on the panel to go from pure black to pure white and black again
    6·1 answer
  • To what would you compare the transport layer?
    14·1 answer
  • Write a program that takes the radius of a sphere (a floating-point number) as input and then outputs the sphere’s: Diameter (2
    7·1 answer
  • What is a slide master ?
    8·2 answers
  • New Top Level Domains (TLDs) are coordinated by:_______.
    10·1 answer
  • Jack lost all the data he saved on his desktop because of a power outage while working on a presentation. On which of these comp
    15·2 answers
  • 4.2 lesson practice help plzs
    6·1 answer
  • he degree of operating leverage is equal to: Group of answer choices FC / OCF. VC / OCF. 1 FC / OCF. 1 VC / OCF. 1 Picture FC /
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!