Answer:
breaking a problem into smaller parts
Explanation:
In language of computer science, decomposition is the process in which complex problems are divided into simpler parts. These simpler parts helps in the solving of the complex problems. They are made easier and comprehensible for the user to understand. Each simple part is further analyzed separately and the solution of the complex issues are derived. The process becomes lengthy but the solution is found.
Answer:
GOD HAS FORSAKEN YOU NOW PRAISE DHAR MANN
Answer:
semantic information that tells a browser how to display a page and mark up the content within a document
Answer:
A. Document camera
Explanation:
Document cameras, which are also known as visual presenters or visualisers, digital overheads, or docucams. They are real-time image capture devices for displaying an object to a large audience. Just like an opaque projector, a document camera is able to magnify and project the images of actual, three-dimensional objects, as well as transparencies. They are, simply put, high resolution web cams, that is mounted on arms so as to facilitate their placement over a page.
This makes it easier and convenient for a teacher, lecturer or presenter to write on a sheet of paper or to display a two or three-dimensional object while the audience watches.
In Theory, the document camera can be used to display all objects.
Gwen only needs to place her photo under a document camera and deliver her speech while the image will be displayed for the class.
Answer:
Zero-day exploits
Explanation:
Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.
When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.