1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hatshy [7]
3 years ago
5

Decomposition is

Computers and Technology
1 answer:
Allushta [10]3 years ago
8 0

Answer:

breaking a problem into smaller parts

Explanation:

In language of computer science, decomposition is the process in which complex problems are divided into simpler parts. These simpler parts helps in the solving of the complex problems. They are made easier and comprehensible for the user to understand. Each simple part is further analyzed separately and the solution of the complex issues are derived.  The process becomes lengthy but the solution is found.

You might be interested in
The _____ is an information and communication-based electronic exchange environment mostly occupied by sophisticated computer an
Airida [17]

Answer:

The correct answer to the following question will be "Marketspace".

Explanation:

  • A relatively new marketing term which seems to be a simulated market place. It's an area for the electronic exchange of ideas and information in which external boundary restrictions are removed, termed as Marketspace.
  • The electronic trading world focused on connectivity often filled by advanced computer and telecommunications technology and digitized deals.

Therefore, Marketspace is the right answer.

5 0
3 years ago
What are benefits of using debugging tools? Check all that apply.
vivado [14]

Answer:

It's

A. Debugging tools help programmers catch errors they might otherwise miss.

B. Debugging tools can save time.

D. Debugging tools help programmers make methodical assessments of the problem.

Explanation:

got it right on edge.

6 0
3 years ago
What does ‘‘negotiation’’ mean when discussing network protocols? give an example?
rewona [7]
Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.

One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.

4 0
3 years ago
Where is the risk of someone intercepting another person’s online activity the greatest?
sergey [27]

social networking site

3 0
3 years ago
residuals are A. data collected from individuals that is not consistent with the rest of the group. B. the difference between ob
Pepsi [2]

Answer:

Option B is correct.

Explanation:

Residuals are the variance between that of examined reactions as well as the values estimated through that methods.

  • The residual value seems to be the vertical difference among both that information set as well as the regression axis.  
  • Every information set seems to have a residual part.
  • It is a quantity that leftover after the certain objects which have been deducted or authorized.

So, the following are the reason that describes the other option is not appropriate according to the given scenario.

5 0
3 years ago
Other questions:
  • 50+ POINTS AND BRAIN IF CORRECT Chris is working with other employees on a worksheet. The other employees have made comments, bu
    8·1 answer
  • About n processes are time-sharing the CPU, each requiring T ms of CPU time to complete. The context switching overhead is S ms.
    12·1 answer
  • Which snippet of code is in XML?
    5·1 answer
  • A store sells rope only in whole-foot increments. Given three lengths of rope, in feet, the following code segment is intended t
    13·2 answers
  • HELP PLEASE!!!! Which type of prototyping is most often associated with the rapid prototyping development method?
    11·1 answer
  • Es la actividad que posibilita comunicar gráficamente ideas, hechos y valores procesados y sintetizados en términos de forma y c
    11·1 answer
  • Saujani describes that women are highly underrepresented in STEM careersShe attributes this to women needing more confidence. Wh
    13·1 answer
  • Defination of formula bar​
    14·1 answer
  • Integrity constraints are enforced by Group of answer choices A. The operating system B. The end user C. The database designer D
    15·1 answer
  • Which of the following declares an abstract method in an abstract Java class?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!