1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
3 years ago
8

Deciding whether to explode a process further or determine that it is a functional primitive is a matter of experience, judgment

, and interaction with programmers who must translate the logical design into code.
True / False.
Computers and Technology
1 answer:
pickupchik [31]3 years ago
3 0

Answer:

The answer is "True".

Explanation:

The conceptual, abstract design is also known as a logical design. This design doesn't use to discuss in matter of the actual execution. It only has to identify the kinds of information.  

  • In the logical development process, it involves inserting information into a number, which includes the organizations and features of rational networks.
  • It is used to organize the entities, for example, tables for a relation database, in a given market environment into the database systems, that's why the given statement is true.
You might be interested in
Java what are synchronized functions.
adelina 88 [10]

<h2>answer:</h2>

Synchronized method is used to lock an object for any shared resource. When a thread invokes a synchronized method, it automatically acquires the lock for that object and releases it when the thread completes its task.','.

4 0
3 years ago
Lindsay owns a candy store that typically makes all of its sales to tourists visiting a nearby zoo. Why might she decide to set
umka2103 [35]
Social media is so powerful in this generation because it is able to reach many different corners of the world. It is not only used merely for communication but also sometimes or most of the times for business. For Lindsay, the use of social media will allow her to increase the size of the customer base. The answer is letter A. 
4 0
3 years ago
Read 2 more answers
List out analog computer​
Fynjy0 [20]

Answer:

1. Wall clocks.

2. Analog watches

3. Measuring instruments with callibration

Explanation:

5 0
3 years ago
Modify your previous exercise to determine if the user can ride a rollercoaster. To ride the rollercoaster, you must be at least
sweet-ann [11.9K]

Answer:

In Python:

age = int(input("How old are you? "))

height = float(input("How tall are you (inches)? "))

if age>=9 and height >= 42:

    print("You can ride the roller coaster")

else:

    print("You ca'nt ride the roller coaster")

Explanation:

The code segment of the "previous exercise" is not given; so, I rewrite the program from scratch using python.

And using the solution I provided, you'll have an idea of how to write the expected code If the "previous exercise" is not written in python,

This line prompts user for age

age = int(input("How old are you? "))

This line prompts user for height

height = float(input("How tall are you (inches)? "))

This checks if user is at least 9 years old and at least 42 inches tall

if age>=9 and height >= 42:

If true, the user gets to ride the roller coaster

    print("You can ride the roller coaster")

else:

If otherwise, the user will not ride the roller coaster

    print("You ca'nt ride the roller coaster")

4 0
3 years ago
Which of the following are ways a vote thief could cast multiple votes in an online election? (check all that apply)
saveliy_v [14]

Answer:

All of the given options apply and are correct.          

Explanation:

a) The first option is correct because the intruder can use denial-of-service attack and by flooding the site with traffic to get the voter server unavailable. Then he can direct the voters to a fraud vote server.

b) The second options correctly applies too because the thief also buys the pass codes from the people who want to sell their right to vote and this way the thief can purchase multiple pass code and cast multiple votes.

c) The hackers can set up fake vote servers and then direct the voters to these servers or websites in order to collect pass codes of voters. These pass codes can then be misused by the thief to cast multiple votes in an online election.

d) Social engineering techniques can also be used to get pass codes from certain voters. By manipulating the targeted voters psychologically they can get their pass codes to cast multiple votes illegally.

3 0
3 years ago
Other questions:
  • What is the utility of a lever?
    11·2 answers
  • What is an example of constructive criticism for an employee who is shy during meetings?
    15·2 answers
  • Many works by Mark Twain were published before 1923. In addition, there are other works that were discovered after his death and
    8·1 answer
  • A department manager would like to choose an access control model in which the owner of a resource decides who may modify permis
    8·1 answer
  • Which of the following accurately describes one way that individual goods
    11·1 answer
  • What are the four common tags used on webpages?
    11·1 answer
  • LeonRoyal15 if anyone plays fortnite
    10·2 answers
  • The symbol located to the left of a code number that identifies a code description that has been revised is _____.
    12·1 answer
  • What is the HTML tag used to define a block of content?<br> O <br> O class<br> O #id<br> O
    8·2 answers
  • I need help here thanks forever who helps
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!