1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julia-pushkina [17]
3 years ago
13

Identify which statement explains why a programmer would break a logic problem into steps.

Computers and Technology
2 answers:
Luba_88 [7]3 years ago
8 0
The steps will form the basis of an algorithm
Aleks [24]3 years ago
6 0

Answer:

D, The steps will form the basis of an algorithm

Explanation:

The steps will form an algorithm that can serve as the basis for a computer program.

You might be interested in
Who invented computer ?​
liraira [26]

Answer:

Charles Babbage invented computer.

hope this helps!

8 0
2 years ago
Read 2 more answers
What are the core scripting and coding technolies used to build ai platforms?
boyakko [2]
<span>Artificial Intelligence is a huge field. </span>
4 0
3 years ago
In addition to developing sketches, computer-aided design programs are used by fashion designers to perform which task?
nikdorinn [45]

Answer:

flat drawing, pattern making development, computerized marker planning and many other fashion designing related aspects.

Explanation:

6 0
2 years ago
We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
Rina8888 [55]

Answer:

D

Explanation:

All three of A, B and C are required to harden a host. Thus, All of the above makes the best option.

Hardening simply refers to making your data impossible to be penetrated. More like bulletproof.

To do this, ensure measures like

- Regular Program cleanup

- Patches management

- service pack installation

- service or usage policies

...among others.

Cheers

3 0
3 years ago
Quiero saber que tipo de gama es mi laptop (gama baja, media, o alta)
nalin [4]

Answer:

I think the answer would be 60x something but I'm not for sure

8 0
2 years ago
Other questions:
  • The ________ is(are) used to display information on the computer's screen.
    13·1 answer
  • 7.
    6·1 answer
  • 8. A pattern of being late for work or for appointments is usually
    12·1 answer
  • Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
    8·1 answer
  • How should font appear in a slide presentation compared to the font in a document
    7·1 answer
  • How is this fictional tex in the people could fly different from the nonfictional text​
    12·2 answers
  • If you are a mathematics student and want to study the secret of writing cryptographic codes, algorithms, encryption and decrypt
    14·1 answer
  • Write a program that uses an initializer list to store the following set of numbers in an array named nums. Then, print the arra
    10·2 answers
  • Easy<br> What is your favorite Anime<br> Mine is Attack On Titan at the moment
    7·2 answers
  • Computers that are joined together are called networks true or false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!