1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Greeley [361]
3 years ago
9

PLZZZ HELP ME THIS IS THE THIRD TIME!!! BRAINLIEST AND 50 POINTS What are the advantages and disadvantages of top-down and botto

m-up programming? How would you decide which one to use? Do you approach problems in your real life from a bottom-up or top-down approach?
Computers and Technology
1 answer:
lord [1]3 years ago
5 0

I would do top to down approach start from the top and work your way down to the bottom.

You might be interested in
What is the computer that is connected to a<br> server
sergiy2304 [10]

Answer:

peripheral device network connection

5 0
3 years ago
Read 2 more answers
A ____ port is a connection in which eight data lines transmit an entire byte of data at one moment in time.​
harina [27]
A parallel port is a a connection in which eight data lines transmit an entire byte of data at one moment in time.
5 0
3 years ago
Although females are born with approximately 2 million ova, this number declines to
Pepsi [2]

Answer: 1

Explanation:

a woman is born with about 1-2million ova, during puberty this figure reduce to between 600,000 and 1million. during her child bearing years the figure drops down to about 300,000 to 400,000 ova, out of which only about 500 would be ovulated during her reproductive years. the rest die out during menopause.

8 0
3 years ago
What name is given to the assurance that requested information is available to authorized users upon request
mrs_skeptik [129]

Answer:

Availability

Explanation:

With Data availability, it means that we are saying that information is accessible to users. This gives the assurance of the system and also the data being accessible to authenticated users anytime they have the need for it.

It is simply saying that information would be operable by users with authorization whenever they request to.

5 0
3 years ago
A wireless access point is most like which other network device, in that all computers send signals through it to communicate wi
scZoUnD [109]

Answer:

Hub is the correct answer for the above question.

Explanation:

  • The hub is a network hardware device which can connect more computer with the network.
  • It has a multi-point which is used to connect multiple systems with the network or internet to share the information among them.
  • When any computer which is connected through this needs to communicate with the other computers on a network then it needs to send the signals to this device first then this device sends the signal to the other device.
  • The above question ask about that device which is used to connect the computer and send the signals to communicate which is a HUB which is described above.
3 0
4 years ago
Other questions:
  • Edhesive silly questionsj
    8·1 answer
  • Describe how the spoofing attack can affect multiple network layers (application, transport, network, and data link layers).
    14·1 answer
  • For example, sumDigits(234) returns 9 (= 2 + 3 + 4). (Hint: Use the % operator to extract digits and the / operator to remove th
    15·1 answer
  • Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Granite Sales C
    12·1 answer
  • Which is an example of an active visual interface? a display indicating the amount of ammunition for the currently equipped weap
    13·2 answers
  • A telephone repair technician uses a meter to measure voltage on a phone line. This meter is an example of _____.
    10·2 answers
  • How to can you avoid becoming a victim of identity theft?
    10·1 answer
  • What is the grade, as a percentage with two digits after the decimal point, obtained when you graded this 101-question multiple-
    13·1 answer
  • Given the IPv4 address in CIDR notation 215.200.110.50/25, identify the subnet IDs.
    15·1 answer
  • Speed and security are advantages generally associated with<br> networks.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!