1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hatshy [7]
3 years ago
10

Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure.

Computers and Technology
1 answer:
wariber [46]3 years ago
7 0

Answer:

C. top-down approach.

Explanation:

Structured application development uses a top-down approach in structural design, which is a process used to design application, by identifying the top functionalities is an application and splitting the to smaller modules where their tasks are simplified and specific.

It was introduced by IBM in the mid 1970s. It systematically shows the dataflow from the general structure to the detailed structure. This best suits systems with individual functions with little or no interaction.

Another type of approach to application structured design is the bottom-up approach.

You might be interested in
the computer that communicate with each other are called ______please ask the answer in 15 minutes after 1 p.m. ​
Elis [28]

The computers that communicate with each other are called \sf\purple{transmission \:control\: protocol\: (TCP)}.

\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{!}}}}}

8 0
3 years ago
Users can make notes or highlight areas of a website and then use the ________ feature of Microsoft Edge to send the highlighted
exis [7]

Answer:

Share.

Explanation:

Microsoft Edge is a web browser developed and hosted by Microsoft. It integrates cortana platform and other extensions, which are all hosted on Microsoft.

Just like every other browser, microsoft edge can interpret web codes values to its appropriate web page, it is simply used to browse the internet. When an area of the web page is highlight, copied or downloaded, it can be shared to other microsoft edge users through the share option.  

8 0
4 years ago
Some of the more important __________ include anti-virus (and anti-malware), host-based firewall, system hardening (removing unw
xeze [42]

Answer:

host-based security measures

Explanation:

Anti-virus, host-based firewall, system hardening, change control, and log management are host based.

6 0
3 years ago
The source must decode a message before it can be sent. select one: <br> a. True <br> b. False
Pani-rosa [81]
True because that's what i said it is 
5 0
3 years ago
Transaction processing systems (TPSs) provide valuable input to management information systems, decision support systems, and kn
nadezda [96]

A transaction is a simple task carried out as part of corporate operations. Transaction processing systems (TPS) handle business transactions for the corporation, supporting overall enterprise operations.

A TPS creates papers pertaining to a non-inquiry transaction and records the transaction itself, together with all of its results, in the database.

Today, TPS are required for business operations in practically every firm. TPSs feed information into organizational databases; they also serve as the framework for management-oriented information systems. Source data automation frequently involves direct data entering. Electronic data interchange is being utilized by transaction processing systems more and more. These systems offer computer-to-computer communication without the need for repeated data entry by substituting paper documents with formatted transaction data sent over telecommunications networks.

Learn more about information here-

brainly.com/question/15709585

#SPJ4

5 0
1 year ago
Other questions:
  • Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?A. Collision avoidan
    12·1 answer
  • Letm1, m2,···mnbe distinct numbers on the number line, in the increasing order. Your goalis to color all of them blue. You have
    9·1 answer
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • Rob Janoff believes that technology should not be used too
    11·1 answer
  • What does that program print out?<br><br> a) 2<br> b) 3<br> c) 4<br> d) 8
    14·2 answers
  • Sally needs to teach her class how to convert a decimal number to a binary number. What is the first step she should take to sta
    5·1 answer
  • A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
    6·1 answer
  • What formatting has been applied to this title?
    8·1 answer
  • Write programs in python to display “Valid Voter”. (condition : age of person should be
    15·1 answer
  • Fill in the blank with the correct term.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!