Identify characteristics of top-down programming design. Choose all that apply.
It assumes the problem has a simple solution.
It is good for running simple calculations.
It is simple to modify if steps change.
It is made of one or more modules.
It breaks a task into simpler and simpler steps.

Answers

Answer 1

Answer:

The correct option is;

It is made of one or more modules.

It breaks a task into simpler and simpler steps.

Explanation:

The implementation of top-down programming approach begins from the system defining basic modules and progresses by putting in place intermediate modules that take charge of more detailed and complex activities and processes. The intermediate modules are further streamlined into more specific programming

Therefore, the top-down programming is made of one or more modules that breaks a task into simpler and simpler steps.

Answer 2

Answer:

A, B, D and E

Explanation:


Related Questions

Which of the following is not a networking equipment?

Answers

Answer:

[tex]\boxed{\sf (C) \ mouse}[/tex]

Explanation:

A networking equipment can share data along a computer network. A mouse is not a networking equipment.

Could Anyone help me with these two questions?

Answers

Answer:1st is b

2nd is d

Explanation:

Design a program that gives simple math quizzes. The program should display two random numbers that are to be added, such as: 247 + 129 The program should allow the student to enter the answer. If the answer is correct, a message of congratulations should be displayed. If the answer is incorrect, a message showing the correct answer should be

Answers

Answer:

import random

num1 = random.randint(0, 1000)

num2 = random.randint(0, 1000)

print(str(num1) + " + " + str(num2) + " = ?")

result = int(input("Enter the answer: "))

if result == (num1 + num2):

   print("Congratulations!")

else:

   print("The correct answer is: " + str(num1 + num2))

Explanation:

*The code is in Python.

Import the random to be able to generate random numbers

Generate two numbers, num1 and num2, between 0 and 1000

Ask the sum of the num1 and num2

Get the input from the user

If the answer is correct, display a message of congratulations. Otherwise, display the correct answer

Here is the first line of a method declaration with some parts missing. public ________ scoreAnswer (studentAnswer ) Fill in the blanks in the method declaration using the following information: If scoreAnswer returns nothing and studentAnswer is a Paragraph object.

Answers

Answer:

void

Explanation:

The code snippet illustrates an object oriented programming (OOP)

From the question, the method name is scoreAnswer and it is not expected to return anything.

In OOP, when a method is expected to return nothing, the method is declared as void.

So, the blank will be replaced with the keyword void and the full statement is

public void scoreAnswer(studentAnswer)

Different bosses have the authority to run their own departments in what department?

Answers

Answer:

Decentralized organization

Explanation:

A decentralized organization is an organization that decisions about the operation of the organizations units are made by the mid-level managers or lower-level managers as the case may be, instead from being made directly from the senior management or the company head

Fast-food franchise chain management is an example of a decentralized organization such that each outlet manages the planning income and expenditure of the unit business.

Decentralization is can be beneficial as it can lead to outstandingly broad creativity as demonstrated in  Google,which is  another good example of a decentralized structure of organizational management.

In a batch operating system, three jobs JOBI, JOB2, JOB3 are submitted for ex- ecution. Each job involves an I/O activity, a CPU time, and another 1/0 activity. JOB1 requires a total of 21 ms, with 3 ms CPC time. JOB2 requires 29 ms total time with 5 ms CPU time. JOB3 requires 14 ms total time with 4 is CPU time. 3.1 What will be the CPU utilisation for uniprogramming? Write down all interme diate steps. 3.2 What will be the CPU utilisation for multiprogramming? Write down all inter- mediate steps

Answers

Answer:

The answer to this question can be defined as follows:

In option 1, the answer is "18.75%".

In option 2, the answer is "33%".

Explanation:

Given:

JOB 1-Time of the CPU = 3ms, rest = 18ms, sum = 21  

JOB 2-Time of the CPU = 5ms, rest = 24ms, sum  = 29    

JOB 3 -Time of the CPU =4ms, rest = 10ms, sum = 14  

In option 1:

whenever the job has also been allocating the system, in the uni-programs system, which looks at the CPU until it is complete.  

Formula:

[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]

                              [tex]=\frac{(3+5+4)}{(21+29+14)}[/tex]

                              [tex]=\frac{12}{64}\\\\= 0.1875\\\\=18.75%[/tex]

In option 2:

However, if any software is interested in other operations like I / o, it can assign to the CPU Processor to others Systems and other software may be carrying out I / o operations there while the processor is with any other application.

Formula:

[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]

                              [tex]=\frac{12}{36}\\\\=\frac{1}{3}\\\\=.33\\\\= 33 \%[/tex]

What does the statement mean “To take a photograph is to participate in another’s person’s mortality, vulnerability, and mutability?

Answers

Answer:

probuly to take a photograph of ur childhood

Explanation:

idk

Answer:

To take photograph is to participate in another’s person’s mortality, vulnerability, and mutability. That means when you take a picture of someone you are participating in their lives, it may be just a small fragment of that life, but it still is a life.

Explanation:

Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output it produces. Which stage of the software development life cycle is Carlos ready for next? Coding Design Maintenance Testing

Answers

Answer:

Testing

Explanation:

From the question, we understand that Carlos just finished the coding of the app.

In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;

This stage is an integral part of the implementation process and according to the question, the coding has been completed;

The next phase or stage after the implementation phase is testing.

Hence, Carlos is getting ready to test the app.

Answer:

Testing                                   I took the test I definetly testing <3

Complete the body of the format_name function. This function receives the first_name and last_name parameters and then returns a properly formatted string. Specifically: If both the last_name and the first_name parameters are supplied, the function should return like so:

Answers

Answer:

Here is the Python program:

def format_name(first_name, last_name):  #function definition of format_name that takes first_name and last_name as parameters

   if first_name != '' and last_name != '':  #checks if first_name and last_name both are not equal to " "

       return ("Name: " + last_name + ", " + first_name)  #returns first name and last_name in format: "Name: last_name, first_name"

   elif first_name != '' or last_name != '':  #checks if either of the first_name or last_name is not equal to " "

       return ("Name: " + last_name + first_name)  #returns first name and last_name in format: "Name: last_name" or "Name: first_name"

   else:  #if both names are blank

       return ''  #return ""

 

Explanation:

The working of the above function can be checked by using the following statements:

print(format_name("Ernest", "Hemingway"))  

print(format_name("Voltaire", ""))  

print(format_name("", "Madonna"))  

print(format_name("", ""))

The program has a function format_name which takes two strings i.e. the first_name and last_name as parameters and returns the formatted string.

The first if condition checks if both the first_name and last_name are blank. For example if first_name = "Ernest" and last_name= "Hemingway" this means both the first_name and last_name are not blank or empty. So If this condition evaluates to true then the following statement is returned:

return ("Name: " + last_name + ", " + first_name)

This returns the last_name string first followed by a comma in between and then first_name string in the last. For the above example the string is printed in the following format:

Name: Hemingway, Ernest    

The elif condition checks if either of the first_name or last_name is blank. For example if first_name = "Voltaire" and last_name= "" this means last_name is blank or empty. So if this condition evaluates to true then the following statement is returned:

return ("Name: " + last_name + first_name)  

This returns the last_name string. For the above example the string is printed in the following format:

Name: Voltaire          

IF none of the above condition is true and both the first_name and last_name are blank then the following statement is returned

return ''  

This will just print and blank space in output.

The program and its output is attached.            

You work in a customer call center. Martin is on the phone asking about the difference between solid-state drives (SSDs), hybrids, and magnetic hard drives for his laptop. He is going to use for web surfing, emailing, and creating documents. Which hard drive would provide the best performance and reliability

Answers

Answer:

the hybrids will be better

The availability of the appropriate compiler guarantees that a program developed on one type of machine can be compiled on a different type of machine.A. TrueB. False

Answers

A true because for an example do you have a computer and you want and you got a new one and you just want to put everything that was on the computer on it you can just switch the data and then automatically it will go on the other computer.
hope this helps

You have an application that for legal reasons must be hosted in the United States when U.S. citizens access it. The application must be hosted in the European Union when citizens of the EU access it. For all other citizens of the world, the application must be hosted in Sydney. Which routing policy should you choose in order to achieve this

Answers

Question options:

A. Latency-based routing

B. Simple routing

C. Geolocation routing

D. Failover routing

Answer:

C. Geolocation routing

Explanation:

Geolocation routing is used in allocating resources for different traffic sources originating from different geographical locations. Consequently you are allocating a different resource to handle a different DNS query based on the location/origination of the DNS query. In the above example, you will need to for example to route all queries from any other place in the world that is not US or Europe to a load balancer for Sydney. Your application in their different locations using geolocation routing would have to be adapted and localized to the region so as to serve the audience there

The properly marked source document states: (C) Operation Panda will take place on 29 September. The new document states: (C) On 29 September, Operation Panda will commence. What concept is used to derivatively classify the statement in the new document?

Answers

Answer:

The answer is "Contained in"

Explanation:

Its term refers to the classified information of the extraction process, even though outlined in an authorized categorization instruction origin without extra explanation or review, and incorporates these data in a new document.

In this concept, the information appears in the extracted word-for-word, its definition of 'in' will apply, or if its data has been paraphrased or restated from the current text, that's why we can say that this concept derivatively classifies the statement in new documents.

________is a nickname for social media tools which allows users to contribute content easily and to easily connect to each other. Instant Messaging Web 2.0 Cognitive surplus QR codes

Answers

Answer:

Web 2.0

Explanation:

The term that is being defined here is known as Web 2.0. As mentioned in the question this term refers to any and all social platform websites that emphasize user-generated content, ease of use, participatory culture, and interoperability for end users. Some examples of Web 2.0 features would be social media sites like FB, blogs, wikis, video sharing sites, image sharing sites, etc.

What are the parts to an
email?

A)Recipient, Greeting, Body, Closing
B)Recipient, Subject, Body, Signature
C)Recipient, Subject, Greeting, Body, Closing, Signature
D)None of the above

Answers

Answer:

B) recipient subject body signature

Which list method allows elements in a sequence to be removed and added at either end of the structure?
index
queue
stack
deque

Answers

Answer:

c.) stack

Explanation:

Answer:

the answer is c stack not only dose stack make the most since but i also got it right on edge 2020

Explanation:

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?

Answers

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

This attack is aimed to avoid legal customers of one's website from accessing it.  In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  One other way to successfully attack is to send fake requests from the attacker.

Which step is common to both creating a new document and saving a document?

clicking the File tab
clicking the New tab
clicking the Save As tab
clicking the Blank document icon

Answers

Answer: clicking the File tab

Explanation: The file tab refers to a multifunctional tab in most Microsoft products such as Microsoft Word, Microsoft Excel and so on. The tab is located on the ribbon and usually the first located on the upper left corner. The tab houses the file functions. Clicking on the file tab, users can create a new document by clicking the File tab, click new, then click bank document to create a new document. Also, to save a file either using the 'save' or 'save as' command, just locate the file tab, click on it and select either the save or save as option. The save as function allows users to save a copy of a document without making changes to the already saved copy.

Answer:

clicking the File tab

Explanation:

I just took it

Which statement is true about teams?

Answers

Answer:

Which is true of jet streams

A The subtropical jet stream flows to the east while the polar jet stream flows to the west

B The subtropical jet stream lies between the westerlies and polar easterlies

C The polar jet stream is generally stronger than the subtropical jet stream

D The polar jet stream lies between the polar easterlies and trade winds

The subtropical jet stream lies between the westerlies and trade winds.

Jet stream is defined as "a narrow, variable band of very strong, predominantly westerly air currents encircling the globe several miles above the earth." Each hemisphere has 2 or 3 primary jet streams that follow their same basic courses.

Explanation:

A team is a more collaborative and joint organization of individuals that function to perform similar set of tasks. The team all members work in accords with each other and complete the tasks on time.

The team is formed by a like minded people and has all characteristics of cooperation, coordination and friendliness. Thus the option D is correct . A Teams is more productive than with fewer individuals.

Learn more about the true about teams.

brainly.com/question/12078417.

You are generating a derivatively classified piece of information and are looking for information in a classified database. While you are searching, you find a piece of information that is extremely helpful. It appears to include all of the classification markings including portion, banner, and classification authority block. Is this information authorized for use as a source of derivative classification?

Answers

Answer:

Yes

Explanation:

A classified information is piece of information that is hidden from public eyes as it could threaten national security if exposed

A derivatively classified piece of information is a piece of information document that extracts information from a classified information source and incorporates this information into the document. These classified documents bear classification markings which are used to show that the information is classified and give instructions on handling and dissemination. A derivative classifier is one who develops classified information using authorized classified information sources

Section 1.4 of Executive Order 13526 lists categories of information eligible for classification

You play guitar and keep two files on your computer. One file, called strings, lists the different brands of strings you keep on hand. Another file, called music, lists the music books and scores you own. When you enter the command paste strings music, what happens

Answers

Answer is given below

Explanation:

when performing in computer and we have two files on the computer first one is string and another one is the music list                 so when we enter the command paste strings music than there will they display side by side on the screen.and on the left side of lists the string in screen and the right side is columns list the music book              

Can someone please tell me how I can hack WiFi with a raspberry pi in Kali Linux do I need a wireless adapter for raspberry pi if so please tell me and me ASAP please thanks appreciate it

Answers

lol wym hack wifi? need more info lol

Well honestly i dont know how to. i personally don't own one but there is YT videos. Go on YT and look up network chuck. hehas what your looking for.

What type of edge does UML use to denote interface implementation? Group of answer choices A dotted arrow from the interface to the class terminated with a triangular tip. A dotted arrow from the interface to the class terminated with an open arrow tip. A dotted arrow from the class to the interface terminated with an open arrow tip. A dotted arrow from the class to the interface terminated with a triangular tip.

Answers

Answer:

A. A dotted arrow from the class to the interface terminated with a triangular tip

Explanation:

Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to

Answers

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, it would have been better if the writer includes experience with a computer virus so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

Answer:

b

Explanation:

50 POINTS!!!! What is HpseuHostLauncher, and can I disable it without any major impact on my laptop?

Answers

Answer:

????????

Explanation:

A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A. Documents findings, actions, and outcomes.
B. Reboot the device to verify the fix.
C. Reconnect the device to the network.
D. Verify the settings in IPConfig.
E. Research the problem based on symptoms.
F. Run a virus scan.

Answers

Answer:

A. Document findings, actions, and outcomes.

F. Run a virus scan.

Explanation:

In 25 words or fewer, describe what Jaime could do at the guitar store to help customers satisfy their needs and wants.

Answers

Answer:

Jaime could allow the use of the guitars that are for sale within the store.

Explanation:

One of the biggest problems with these musical instrument stores is that you are not allowed to play the instruments unless you are going to buy them.

A store that allows the practice of these instruments within the establishment ensures that the customer tried to play the instrument, liked it, and decided to buy it.

It is a way to satisfy the customer.

Answer:

He could ask customers if they need help finding what they want. He can let his manager know if any product is running low.

Explanation:

legit the answer lol

Does anyone know how I can fix this? I don’t know what is wrong. When I click retry it restarts my laptop and returns back to this. Please help!

Answers

Answer:

Software Program Reinstallation

Use the following steps to reinstall factory installed software programs:

Click Start (), All Programs, Recovery Manager, and then Recovery Manager again.

Figure : Recovery Manager

Recovery Manager main screen

Under I need help immediately, click Software Program Reinstallation.

On the Software Program Reinstallation welcome screen, click Next.

Look in the Factory installed programs list for the software program you want to reinstall.

If your software program is listed, select the title.

If the program you want to reinstall is not listed, select The program is not in the list, and then click Next. Follow the instructions to reinstall the program.

Figure : Select program to reinstall

Software Program Reinstallation window

Click Next.

If you are not prompted to uninstall the program before reinstalling it, continue to the next step.

If you are prompted to uninstall the program before reinstalling it, follow these steps.

Click Start (), and then Control Panel.

Under Programs, Uninstall a program.

The Uninstall or change a program window opens.

Figure : Uninstall or change a program

Uninstall or change a program screen

Select the program you want to remove.

Click Uninstall or Uninstall/Change at the top of the program list.

Read and respond to any messages that appear while the software is being removed from your computer.

Once the program is uninstalled, resume the reinstallation from the Recovery Manager program.

When the reinstallation is complete, select Yes, and then Finish to restart the computer.

what is the importance of personal computers in connecting to the internet ?
^please I need an answer, PLEASE ^​

Answers

Answer:

if you dont you wont be able to do school work or check your email

Explanation

Answer:

security because it very important when we use internet

if you want to refine your google search by date, which option should you use?

Answers

Answer:

If you want to refine your Google search results by date, you should use Advanced search.

Explanation:

Answer:

Advanced Search.

Explanation:

Just go down to settings at the bottom of google and choose advanced search and fill in the boxes so your search comes up more specific.

Other Questions
what is sometimes used as a reference for relative location in panama 1. Association Suppose you were to collect data for each pair ofvariables. You want to make a scatterplot. Which variable wouldyou use as the explanatory variable and which as the responsevariable? Why? What would you expect to see in the scatter-plot? Discuss the likely direction, form, and strength.a) Apples: weight in grams, weight in ouncesb) For each week: ice cream cone sales, air-conditioner salesc) College freshmen: shoe size, grade point averaged) Gasoline: number of miles you drove since filling up, gallonsremaining in your tank 3 QUESTIONS PLEASE ANSWER! The average weight of the top 5 fish caught at a fishing tournament was 12.3 pounds. Some of the weights of the fish are shown in the table.What was the weight of the heaviest fish? Which of the following pieces of evidence does not support the claim that eating less red meat protects the environment? Reduces greenhouse gases Produces less waste Conserves water Improves topsoil What is the complete ionic equation for this reaction?2KOH(aq) + H2SO4(aq) 2H20(1) + K2SO4(aq)O A. 2K+ + OH + H2SO4 OH + 2H+ + K2SO4B. OH + 2H+ + 2H20()C. 2KOH + H2SO4 2H20 + K2SO4D. 2K+ + OH + 2H+ + SO42- 2H20() + 2K+ + SO42-SUBMIT How do I do this? All of em 5. The volleyball team has a double-header on Friday. The probability that theywill win both games is 38%. The probability that they will win just the first game is70%, What is the probability that the team will win the second game given thatthey have already won the first game? Crane Sales Company uses the retail inventory method to value its merchandise inventory. The following information is available for the current year:Cost RetailBeginning inventory $ 30,000 $ 45,000Purchases 190,000 260,000Freight-in 2,500 Net markups 8,500Net markdowns 10,000Employee discounts 1,000Sales revenue 205,000If the ending inventory is to be valued at the lower-of-cost-or-market, what is the cost-to-retail ratio?a) $220,000 $315,000b) $222,500 $305,000c) $222,500 $313,500d) $222,500 $303,500 Two stationary positive point charges, charge 1 of magnitude 3.25 nC and charge 2 of magnitude 2.00 nC , are separated by a distance of 58.0 cm . An electron is released from rest at the point midway between the two charges, and it moves along the line connecting the two charges.Required: What is the speed of the electron when it is 10.0 cm from the +3.00-nC charge? 22)Subtract (4 - 21) - (3 - 51)A)1+3iB)1-717+3iD)7-7i The removal of waste products from the body is called How does this image enhance the information providedin the book?o It connects the book's central ideas about bicycleinnovators.It offers an example of how the American mediaportrayed bicyclesO It provides insight about safety improvements madeto the bicycle0 It emphasizes the need for changing laws toaccommodate bike riders.yeah you think I should wait At what minimum angle will you get total internal reflection of light traveling in diamond and reflected from ethanol? What happened when the separate nations of India and Pakistan were created? Ammonia, methane, and phosphorus trihydride are three different compounds with three different boiling points. Rank their boiling points in order from lowest to highest.A. CH4< NH3 < PH3B. NH3 < PH3< CH4C. CH4 < PH3 < NH3D. NH3 < CH4< PH3E. PH3< NH3 < CH4 6) 8x+y=-16-3x+y=-5Solve each system by elimination? Identify where each resource comes from. gold deposits in regions near major rivers, such as the Niger salt from the desert kola nuts sold as trade gold mines Which document would you read if you wanted to learn about colonists' religious views? Who was the leader of the Safavid Dynasty? Suleiman Abbas I Babur Akbar