The structured design approach is also known as ____.
A. top-down design
B. bottom-up design
C. object design
D. stepwise updating
Answer: A
You might also like to view...
Explain hownonces are used to increase security when encrypting messages that are short or that include fields for which the plaintext might be known to an intruder.
What will be an ideal response?
Which packets, if any, are captured by ethereal?
What will be an ideal response?
Identify the letter of the choice that best matches the phrase or definition.
A. The file used to store worksheets. B. The worksheet that is displayed in the work area. C. Identifies the cell, and is formed by combining the cell's column letter and row number. D. A computerized spreadsheet. E. A grid of rows and columns in which you enter text, numbers, and the results of calculations.
On which of the following is the Web based?
A. microprocessors B. Intel C. hypertext D. kilobytes