1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
3 years ago
9

UML is a graphical language that is used for designing and documenting software created within the _____________ framework. (a)

top-down programming (b) bottom-up programming (c) structured programming (d) object oriented programming
Computers and Technology
1 answer:
stealth61 [152]3 years ago
7 0

Answer:

The answer is "option d".

Explanation:

UML stands for Unified Modeling Language. It is an OOPs based language that is used to design a graphic by software developers. This language can also be used to build diagrams and provide some tools to ready-to-use, interactive templates for users and other options are not correct that can be described as:

  • In option a, The Top-down approach is not followed by UML.
  • In option b, UML uses an object-oriented programming language that follows a bottom-up approach. It refers to a style of programming.
  • In option c, It does not use structured programming because it uses procedural languages.

You might be interested in
. Convert your age into binary and then to hexadecimal. Show your work.
Dovator [93]

Explanation:

Age = 23.

To convert a base 10 number to hexadecimal number we have to repeatedly divide the decimal number by 16 until  it becomes zero and store the remainder in the reverse direction of obtaining them.

23/16=1 remainder = 5

1/16=0 remainder = 1

Now writing the remainders in reverse direction that is 15.

My age in hexadecimal number is (15)₁₆.

5 0
4 years ago
You are a cleared employee. Your friend called and told you that he saw information about the classified XYZ program on the Inte
m_a_m_a [10]

Answer:

Yes, because though you are a cleared employee, the classified information should not be open for all employees to see as it is a data disclosure violation.

Explanation:

Data is a vital tool in the business industry. The need to secure data or present it to be seen by competitors is very crucial as it maintains the dominance of a company on its competitors.

Only authorized employees in a company are allowed to view classified data and must report any siting of data spill, to avoid prosecution.

3 0
3 years ago
Which access database object asks a question about the data stored in a database and displays specific fields and records that a
elena-14-01-66 [18.8K]
The Query object is used to asks a question about the data stored in a database and displays the specific fields and records that answer the question.

In code form, the select command is used for queries. 
6 0
3 years ago
Successful attacks are commonly called ________. a. security incidents b. countermeasures c. both a and b d. neither a nor b
nadya68 [22]
Hey there,
The answer is Security Incidents

Hope this helps :))

~Top
4 0
3 years ago
Applications of computer 15 fields ​
ioda

Answer:

Explanation:

1 robotics

2. Engineering

3. Government

3. Industries

5. Individual programming

6. Business

7. Schools

Etc

4 0
4 years ago
Other questions:
  • Shut down and unplug the computer. Remove the CPU case lid. Locate the various fans, and then use compressed air to blow dirt ou
    13·2 answers
  • Compare and contrast how the roles of women and men in society are changing​
    14·1 answer
  • Telecommunications devices transmit data in the form of electrical signals. what is the technical term that we use for these sig
    14·2 answers
  • Pamela finds that she is constantly spelling the word “color” as “colour” when she is typing. Even though this is how the word i
    11·1 answer
  • Write a function index(elem, seq) that takes as inputs an element elem and a sequence seq and returns the index of the first occ
    7·1 answer
  • What is the primary means by which attackers infect computers with these attacks? How do these attacks commonly occur?
    8·1 answer
  • Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color
    10·2 answers
  • Que papel tuvo la innovación en la propagación de la telefonía móvil?​
    7·1 answer
  • Worksheet-I • Make a list of 10 application software and 5 utility programs installed in your computer, along with their uses. U
    9·1 answer
  • What are some of the characteristics found in an editorial photograph?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!