1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
15

Complete the sentence to identify advantages of top-down programming design. Choose all that apply.

Computers and Technology
2 answers:
Sati [7]3 years ago
7 0

Answer:

A,B,C

Explanation:

just gonna have to trust me :)

yanalaym [24]3 years ago
3 0

Answer:The original choice to write apply_fg so that it accepts function arguments is a good one, because it increases interoperability. When the callable arguments to apply_fg use a single protocol, we can easily exchange them: #include <functional> float log2(float); int a = apply_fg(5.Of, int b = apply_fg(3.14f,

Explanation:

You might be interested in
Based on the Standards, the statement, "Competition for computer time during periods of high demand had become intense because o
frozen [14]

Answer:

cause

Explanation:

According to my research, I can say that based on the information provided within the question this is an example of a "cause". This refers to something that makes something else happen, and is usually stated by the word "because". For example in this situation the a "planned increase in the use of the computer by operating departments" caused a "Competition for computer time during periods of high demand to become intense".

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

3 0
3 years ago
An idea concerning what will happen in the future. (Crossword)
dangina [55]

Answer:

<h2>Expectation </h2>

Explanation:

Expectation is  an idea concerning what will happen in the future

7 0
3 years ago
An access control system that grants users only those rights necessary for them to perform their work is operating on which secu
solmaris [256]

Answer:

B. Least privilege                

Explanation:

  • The principle of least privilege an important principle in computer security.
  • It limits the access rights for users and only grant them with the rights that are sufficient for them to perform their required task.
  • For example a user is granted privilege to execute a file or manipulate data or use only the resources that are required for them to perform a particular task.
  • This principle can be used only to limit and control access rights to system resources and applications.
  • The least privilege is beneficial as it reduces the risk of unauthorized access.
  • For example a user whose task is data entry and has nothing to do with controlling access or granting access rights to users, will only be allowed to enter data to the DB by the principle of least privilege.
7 0
3 years ago
What can be designed to create annoying glitches or destroy data
Yanka [14]
Viruses can cause this.
3 0
3 years ago
A _____ is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex
Shalnov [3]

A <em>"DATA FLOW DIAGRAM"</em> is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex process into simpler, more manageable, and more understandable subprocesses

8 0
3 years ago
Other questions:
  • PLEASE HELP ITS DRIVERS ED
    8·2 answers
  • You are in charge of five software development projects. The project characteristics of each of the sys are as follows:
    13·1 answer
  • PMI is a: computer program used to help managers write mission statements. rule of thumb used to determine how many employees sh
    15·1 answer
  • #Write a function called alter_list. alter_list should have#two parameters: a list of strings and a list of integers.##The list
    11·1 answer
  • Clearing the computer's cache helps store recently-used information.
    8·1 answer
  • The signature area in a cover letter includes the sender's first and last name, followed by his/her job title (if applicable). *
    13·1 answer
  • Complete the add repair method!<br> (Will give the brainiest)
    11·1 answer
  • Question 1 of 20 Gus has decided to organize his inbox on June 26 by using folders and deleting irrelevant messages. He creates
    14·2 answers
  • Complete the statement below using the correct term.<br>Website managers use<br>every day​
    11·2 answers
  • HELP PLZZ WILL MARK BRAINLIEST
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!