1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Volgvan
3 years ago
8

Sam’s instructor suggests a top-down programming approach. Which of the following should Sam create in order to follow this sugg

estion?
a binary code
an editor
modules
a decimal variable
Computers and Technology
2 answers:
Deffense [45]3 years ago
8 0

Answer:

Modules is the answer

Explanation:

Mark me brainlist?

Pachacha [2.7K]3 years ago
6 0
Modules is the correct answer… hope this helps, if you need any help don’t be afraid to contact me! ;)
You might be interested in
The value of a variable can change multiple times during the execution of a computer program.
ratelena [41]

Answer:

a. True

Explanation:

6 0
2 years ago
Which of the following help departments organize unique access controls for access to folders and data files within a department
never [62]

Answer:

B. Role-based access controls

Explanation:

Roll-based access control is a way to control access to the network and to data which depends on the position of employees in a department. This way the permission to access information are granted according to roles that are assigned to employees. This type of access control allows access privileges to employees only to the folders and data files which they need in order to perform their tasks and it does not allow them to access the data or information which is not relevant to them. This helps the department to secure the sensitive information and data files and reduces the risk of data breaches.

6 0
3 years ago
What is the value of the result after the following statement is executed? int result = 2 + 3 + 4 ;
kow [346]

2 + 3 + 4 = 9 so the value of result is also 9

8 0
3 years ago
The 7-bit ASCII code for the character ‘&’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans
Lorico [155]

Answer

First part:

The transmitted 8-bit sequence for ASCII character '&' with odd parity will be 00100110. Here leftmost bit is odd parity bit.

Second part:

The invalid bit sequence are option a. 01001000 and d. 11100111

Explanation:

Explanation for first part:

In odd parity, check bit of either 0 or 1 is added to the binary number as leftmost bit for making the number of 1s in binary number odd.

If there are even number of 1s present in the original number then 1 is added as leftmost bit to make total number of 1s odd.

If there are odd number of 1s present in the original number then 0 is added as leftmost bit to keep the total number of 1s odd.  

Explanation for second part:

A valid odd parity bit sequence will always have odd number of 1s.

Since in option a and d,  total number of 1s are 2 and 6 i.e. even number. Therefore they are invalid odd parity check bit sequences.

And since in option b and c, total number of 1s are 5 and 7 i.e. odd numbers respectively. Therefore they are valid odd parity check bit sequences.

7 0
3 years ago
2. (40 POINTS) Assume a 16-word direct mapped cache with b=1 word is given. Also assume that a program running on a computer wit
Fynjy0 [20]

Answer:

See the attached file for the answer.

Explanation:

(a) Find attached of question a.

b. the miss rate for the above instructions address sequence is 100% as no address is repeated.

5 0
3 years ago
Other questions:
  • What is the primary purpose of a business plan? To file for incorporation To help you identify your goals and plan how you will
    6·1 answer
  • What are the technique CSP does for the Cloud Storage Security?
    10·1 answer
  • Fill in the missing statements or expressions in the following code that checks to ensure that a user enters an integer value at
    11·1 answer
  • Which type of spreadsheet cell represents the left hand sides (lhs) formulas in an optimization analysis?
    5·1 answer
  • This folder is ndownload and it isn't like download file
    14·1 answer
  • You are looking for ways to pay your higher education costs.Which of the following options will require you to pay back any mone
    6·1 answer
  • What is the Explicit Dependencies Principle? Explain why explicit dependencies are better than implicit dependencies.
    6·1 answer
  • make a clan using 5S of the current state of your workstation now in the computer laboratory room how are you going to manage sm
    8·1 answer
  • Peyton is having trouble searching for information on butter lettuce. Every time he searches for it, he gets some results for bu
    6·2 answers
  • From Edmentum/Plato
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!