1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
11

Yolanda first breaks down the whole game she needs to program into modules. She then breaks these modules into smaller modules u

ntil the individual parts are manageable for programming. She writes the smallest modules, and then recombines them into larger parts.
Computers and Technology
1 answer:
Tcecarenko [31]3 years ago
5 0
That’s coo. What’s the question?
You might be interested in
Select the functions in the Insert tab in PowerPoint.
Alja [10]

Answer:

this is a screenshot of notes i took. this is not an infected file :) i hope this screenshot helps :D

3 0
3 years ago
Refer to the image of the Cornell method, then use the drop-down menus to complete each statement. Number 1 should be . Number 2
kifflom [539]

Answer:

e

Explanation:

6 0
3 years ago
Read 2 more answers
For the following 4-bit operation, assuming these register are ONLY 4-bits in size, which status flags are on after performing t
m_a_m_a [10]

Answer:

All flags are On ( c, z , N  )

Explanation:

Given data:

4-bit operation

Assuming 2's complement representation

<u>Determine status flags that are on after performing </u> 1010+0110

    1   1

    1  0   1  0

    0  1   1  0

  1  0 0 0 0

we will carry bit = 1 over

hence C = 1

given that: carry in = carry out there will be zero ( 0 ) overflow

hence V = 0

also Z = 1      

But the most significant bit is  N = 1

8 0
3 years ago
Since the 1970s, local tv newscasts have developed a similar look. that's because
professor190 [17]
<span>(news doctors, consultants) said people should be young, attractive, smile and look happy.</span>
6 0
4 years ago
Internet Security: How can you work securely on the internet? What actions should be avoided and what are the pitfalls?
Cerrena [4.2K]

Answer:First of all, to work safely at the internet you should avoid any not secure page, and if you can’t do that, avoid entering stuff such as credit cards or passwords on this sites. Now, to work safely it’s recomendable to have a VPN(virtual private network), that hides your IP direction.

Explanation:

8 0
3 years ago
Other questions:
  • The user interface design principle that places an emphasis on the intuitive flow of the interface (i.e. left to right and top t
    12·1 answer
  • NEED HELP NOW WILL MARK BRAINLIEST 27 POINTS!!!!!!!!!!!!!!!!
    14·2 answers
  • Chunking is a good strategy for completing large assignments because it makes the work
    7·2 answers
  • Database applications are seldom intended for use by a single user.
    15·1 answer
  • Documenting Business Requirements helps developers control the scope of the system and prevents users from claiming that the new
    13·1 answer
  • WILL GIVE BRAINLIEST
    15·1 answer
  • Adobe Indesign project 4 museum indesign file. The instructions are 70 pages long I cant sit still long enough to read them
    11·1 answer
  • Use the drop-down menus to match each description to its corresponding term.
    7·1 answer
  • What is operating system​
    10·2 answers
  • Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after t
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!