1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
2 years ago
12

A _____ defines what must take place, not how it will be accomplished.​

Computers and Technology
1 answer:
ddd [48]2 years ago
7 0

This question is vauge, but through some searching I found an exact quote of this from the book "System Analysis and Design Tenth Edition" which states that this is known as Logical Design.

You might be interested in
Which of the following allows a user to quickly access a frequently used computer app? Alphabetize program icons. O Create a sho
professor190 [17]

Answer:

Create a shortcut on the toolbar

Explanation:

You can use process of elimination. alphabetizing would not help to find it quicker, but it is an easier way. Deleting all icons wouldn't help at all. And placing all icons in a folder would make it even messier. So, it is creating a shortcut. Plus, I got it right on my test :)

7 0
3 years ago
Read 2 more answers
Asking questions when something is unclear is part of
Ksenya-84 [330]
Personally responsibility

Hope this helps
6 0
3 years ago
Convert to binary 140
Ber [7]

00110001 00110100 00110000

5 0
3 years ago
Why is soccer the most popular sport
riadik2000 [5.3K]

Soccer is the most 'popular' sport in the world because it is played more than any other by kids growing up. ... So, yeah, ya see…Soccer's not so much “The Beautiful Game'' as it is…

5 0
3 years ago
Read 2 more answers
Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Al
UNO [17]

Answer:

Public key encryption

Explanation:

DescriptionPublic-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

5 0
3 years ago
Other questions:
  • Write a complete program to read two integers and display the number of integers that lie between them, including the integers t
    12·1 answer
  • Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
    9·1 answer
  • Where in an email would u find information about the action requirements​
    9·1 answer
  • _____ is an example of a professional networking site where you keep in touch with business contacts.
    9·1 answer
  • A _____ are devices that permit a user to connect to a digital t-carrier service.
    6·1 answer
  • What are the physical aspect of a presentation​
    7·1 answer
  • Question 3
    13·1 answer
  • Kenny FRIEND ME. Ps that is my brother
    9·2 answers
  • What videos do you think we should make next?
    9·1 answer
  • Explain the following IT terms Network: Packet: Router: IP address: Server: LAN: WAN: Bus topology: Ring topology: Star topology
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!