1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
8

________ programming is a method of writing software that centers on the actions that take place in a program.

Computers and Technology
1 answer:
Norma-Jean [14]3 years ago
8 0

Answer: Procedural software

Explanation:

Procedural software programming is the programming mechanism that functions through splitting the data and functions of the program.This programming focuses on subroutines or action for functioning as per call of procedure.

  • It can carry out computation through steps in linear manner or top-to-bottom manner.
  • These steps consist of data ,subroutines, routines and other variable and functions for working.
You might be interested in
"The fact that we could create and manipulate an Account object without knowing its implementation details is called"
ladessa [460]

Answer:

Abstraction

Explanation: Abstraction is a software engineer terminology that has been found to be very effective and efficient especially as it relates to object-oriented computer programming. It has helped software engineers and other computer experts to effectively manage account objects without having a knowledge of the details with regards to the Implementation process of that account object.

6 0
3 years ago
Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to
seropon [69]

PKI trust model that should be used, is a distributed trust model.

  • A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums.

  • With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.

Conclusively, we can say that PKI trust model that should be used is a distributed trust model.

Learn more from:

brainly.com/question/14837773

8 0
2 years ago
>>> import math >>> print(math.Pi) 3.141592653589793 >>> def print_volume(): print ("What is the radi
nata0808 [166]
I have no clue what this is asking...
4 0
3 years ago
WHICH PROGRAMMING LANGUAGES ARE THE BEST FOR PROGRAMMING?
Andrews [41]

Answer:

python is probably the best is you are a begginer

java and C++ are good too

6 0
2 years ago
a user reports that his dot matrix printer is printing dark and clear on the left of the paper but that the print is very light
yarga [219]

Answer:

Correctly position the platen of the printer to hold the paper in place.

Explanation:

Since the dot matrix printer is printing dark and clear on the left of the paper but very light on the right side of the paper, it is possible that the paper is not being held properly. So adjusting the platen will hold the paper properly and hence uniform prints on the paper.

Note: Dot matrix printers are printers that print closely related dots to form require texts (shapes) by striking some pins against an ink ribbon.

Some of the parts of these printers are; power supply, carriage assembly, Paper sensor, ribbon, platen and pins.

4 0
2 years ago
Other questions:
  • Background Susan finished work on system architecture issues, and her system design specification was approved. Now she is ready
    15·1 answer
  • What's the ASCII code for boy ?
    15·1 answer
  • Whats your favorite sport between these options?
    12·2 answers
  • ) How many switching functions of two variables (x and y) are there?
    11·1 answer
  • What do you do to add a line or circle to your presentation?
    7·2 answers
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • Among the eight unique features of​ e-commerce, which is related to the ability to interact with web technology​ everywhere?
    14·1 answer
  • In java please
    13·1 answer
  • Which of the following is NOT a function of a Web Browser?
    9·1 answer
  • Record the issue of 4,000 shares of $5 par value common stock for $35000 cash
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!