1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
3 years ago
8

Top-down programming divides a very large or complex programming task into smaller, more manageable chunks.

Computers and Technology
1 answer:
vekshin13 years ago
5 0

Answer:

A

Explanation:

Top-down is a programming style, the mainstay of traditional procedural languages, in which design begins by specifying complex pieces and then dividing them into successively smaller pieces.

You might be interested in
WILL THUMBS UP!!!!!ALL COMMENTS!!!!!!
Mariulka [41]
True

the Articles of Confederation are finally ratified. The Articles were signed by Congress and sent to the individual states for ratification on November 15, 1777, after 16 months of debate. Bickering over land claims between Virginia and Maryland delayed final ratification for almost four more years. Maryland finally approved the Articles on March 1, 1781, affirming the Articles as the outline of the official government of the United States. The nation was guided by the Articles of Confederation until the implementation of the current U.S. Constitution in 1789.
4 0
3 years ago
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
notka56 [123]

Answer:

The answer is "compromise"

Explanation:

In computer science, the comprised system is used to describe as any technological resource, that has been negatively affected by an untrustworthy source for nondisclosure, integrity or accessibility either deliberately or inadvertently.

  • In this, the mechanical interaction from the unauthorized source or technological progress can result in compromise.
  • This helps you and the partner to meet each other's interests by taking into consideration both the positions and the solution to the main problem.

4 0
3 years ago
Read 2 more answers
Computer virus is a<br> a. software<br> b. hardware<br> c. bacteria<br> d. none of these
Nimfa-mama [501]
The answer is software
8 0
4 years ago
Descending selection sort with output during execution
zvonat [6]

Taking the input as a string, slicing it with a space as the delimiter, turning the divided portion into an integer, and then appending to the list.

<h3>Explanation:</h3>

def selection_sort_descend_trace(numbers):

i=len(numbers)

print("Output: ")

for num in range(0,i-1):# traversing from 0 to N-2, total N-1 iterations

val=numbers[num]

start=num+1

end=i

t=0

for j in range(start,end):

if(val<numbers[j]):

remember=j

val=numbers[j]

t=1

if(t==1):# swaping onlf if greater number is available

temp=numbers[num]

numbers[num]=val

numbers[remember]=temp

for p in range(i):# printing

print(numbers[p],end=' ')

print("\n")

if __name__ == "__main__":

print("Enter the integers separated by space: ")

numbers=[int(x) for x in input().split(' ')]

selection_sort_descend_trace(numbers)

For further details about the explanation, click here:

brainly.com/question/15728245

#SPJ1

6 0
2 years ago
Traffic shaping reduces traffic by ________. preventing certain undesirable traffic from entering the network limiting the amoun
Lera25 [3.4K]

Answer:

Explanation:

Traffic Shaping is a technique for managing congestion on a network by delaying the flow of less important/desired packets on the network so more valuable/desirables ones are able to pass. Traffic shaping reduces traffic by preventing certain undesirable traffic from entering the network as well as limiting the amount of certain undesirable traffic entering the network.

5 0
3 years ago
Other questions:
  • The time between requests to a web server is exponentially distributed with mean 0.5 seconds. NOTE: This is a multi-part questio
    8·2 answers
  • Which result would support the particle theory of light?
    6·2 answers
  • Which of the following correctly pairs a financing option with its description?
    14·2 answers
  • To enable a compute or device that does not have built-in networking capability, use a(n) ______.
    13·1 answer
  • 1. What is an advantage of the PCIe bus over the PCI bus?
    9·1 answer
  • The purpose of a software design is to enable programmers to implement the requirements by designating the projected parts of th
    14·1 answer
  • A(n) ________________ must be completed immediately following an incident as it is an essential document that details an inciden
    14·1 answer
  • Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.
    10·1 answer
  • 3 alternativas donde puedas utilizar la tecnologia que nos ayude a reducir el impacto ambiental al medio ambiente
    14·1 answer
  • 2.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!