1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
2 years ago
14

Which of the following statements are true concerning abstraction and refinement? Select 3 options:

Computers and Technology
1 answer:
Akimi4 [234]2 years ago
5 0

Answer:

The answer to this question is given below in the explanation section

Explanation:

First,  we need to know what is abstraction and refinement.

Abstraction and refinement are used in application/system development in the field of computing. Abstraction is used to abstract the details from the model. It means that displaying only essential information about the the model and hiding other details. While refinement is the idea that is used in software development by moving through each level of abstraction and incrementally refining each level of abstraction, providing more detail at each increment. Refinement is the inverse of abstraction.  

So the correct options to this question are:

  • Models may be abstracted and refined depending on the goals of the project.
  • Abstraction is a technique used in computational thinking.
  • Refinement is the inverse of abstraction.

You might be interested in
what allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple system
Karolina [17]
Connections, allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems. They do not entirely eliminate information redundancy, but they do ensure information consistency among multiple systems.
6 0
2 years ago
Which of the following are the two main types of copyright relevant to the recording industry? Select all that apply
Bond [772]

Answer:

LETTER A...

CUZ ITS TRUE

6 0
2 years ago
Windows will automatically generate a domain-wide __________ security certificate for any user who encrypts a file for the first
Katena32 [7]
<span>Windows will automatically generate a domain-wide EFS security certificate for any user who encrypts a file for the first time.
</span> EFS stands for Encrypting File System.  The certificate <span> provides </span>filesystem-level encryption and enables files to be transparently encrypted<span> to protect confidential data from attackers with physical access to the computer.</span>
4 0
3 years ago
list all columns of the resource table with a rate between $10 and $15 including the end points 10 and 15. Sort the result by ra
egoroff_w [7]

Answer:

select * from resources

where rate between 10 and 15

order by rate (ASC|DESC)

Explanation:

On Chegg + SQL textbook

(Here we are using * keyword to fetch all the records from resource table and between operator is used to fetch values between two vaues(values included).

Order By clause is used to sort the values and ASC is used with order by clause to sort in ascending order and DESC is used to sort in Descending Order.

By default if we do not specify anything then it will take ASC.

5 0
3 years ago
Hold onnn I got on this app and saw that people were/are asking questions yall got work on break?? or is ylls break over?!! caus
solong [7]

Answer:

Yeah people get assignments and winter homework. It's quite bizarre

5 0
2 years ago
Read 2 more answers
Other questions:
  • As the team leader, John ensures that all his teammates are clear in the team goals they need to achieve. He demonstrates the qu
    12·2 answers
  • Don't pat any attention to this
    7·2 answers
  • Does anybody know if that apple watch is actually worth what it costs?
    9·2 answers
  • The practice of texting is most popular and what age group
    12·2 answers
  • Please help me!! 10 Points are waiting!!
    8·1 answer
  • If an author is creating a reference list and wants the second and succeeding lines indented for a reference, they should select
    13·2 answers
  • Creating a chart using a spreadsheet Chart Wizard involves four steps. Which is the last step?
    6·1 answer
  • For each of the threats and vulnerabilities from the Identifying Threats and Vulnerabilities in an IT Infrastructure lab in this
    10·1 answer
  • Entering the search criteria "B?" would yield which of the following results?
    6·1 answer
  • Carmen has met new people online that she enjoys talking to. One of these people has asked her to meet at the park in person and
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!