1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
8

Is a technique for breaking a problem down into smaller, less complex parts.

Computers and Technology
1 answer:
Readme [11.4K]3 years ago
8 0
Decomposition hope this helps :)
You might be interested in
Knowledge of HTML and CSS is considered essential for the job of a(n)
Ira Lisetskai [31]
I'm not sure but I think d. Webmaster
8 0
3 years ago
Convert to different number system as mentioned.(17)10=(?)2​
Scorpion4ik [409]
“convert to a different number system as mentioned” there was no number system mentioned, but if you are just trying to find 17 * 10 = x * 2

all you need to do is find that 17 * 10 = 170 and 170/2 is 85 so

17 * 10 = 85 * 2
3 0
3 years ago
A magazine ran a survey about a web site for downloading music. Readers could register their responses on the​ magazine's web si
Evgesh-ka [11]

Answer:

The following are the answer to this question:

Explanation:

In the question the choices were missing, that's why we define the correct choice only, but first, we define the survey.

The survey is a data collection method, or knowledge on various topics from a predetermined group of participants, in which the users can have several objectives, or researchers will do it. In this question, the survey is a voluntary actual response survey, therefore the findings may not represent the people.

5 0
4 years ago
All web page urls begin with the letters ____.
Degger [83]
The answer will be HTTP.
6 0
4 years ago
What determines the speed at which your computer performs tasks?
Arturiano [62]
The CPU is probably the most common
4 0
3 years ago
Read 2 more answers
Other questions:
  • What is plagiarism?<br> EXPLAIN IT
    15·2 answers
  • The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured syst
    10·1 answer
  • Which data type or collection of data types can SOQL statements populate or evaluate to?
    9·1 answer
  • __________ has become a widely accepted evaluation standard for training and education related to the security of information sy
    5·1 answer
  • Elizabeth works for a local restaurant At the end of her shift, she is required
    15·2 answers
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • Omar is preparing to deliver a presentation to his class. It is about a program to collect samples from an asteroid that has bee
    13·1 answer
  • What error occurs in the following program? #include using namespace std; int main() { int number1, number2, sum; cout &lt;&lt;
    13·1 answer
  • List the steps to identify address or link window on a phone​
    9·1 answer
  • Select a software package/electronic device that you know well. It can be from any domain (work related, entertainment, desktop,
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!