Two tools used by programmers to design programs before writing actual code are __________ and __________

Fill in the blank(s) with correct word


pseudocode, flowcharts, hierarchy charts are all okay answers

Computer Science & Information Technology

You might also like to view...

Which of the following statements should be used to validate that a number input by the user into a variable namedWidgetsis an integer value?

a. ```While Widgets != Widgets Write “Please enter an integer value:” Input Widgets End While``` b. ```While Int(Widgets) != Widgets Write “Please enter an integer value:” Input Widgets End While``` c. ```Repeat Write “Please enter an integer value:” Input Widgets End Repeat``` d. ```While Widgets > 0 Write “Please enter an integer value:” Input Widgets End While```

Computer Science & Information Technology

What does the following method do?

``` // Parameter b must be positive to prevent infinite recursion static int Mystery(int a, int b) { if (b == 1) { return a; } else { return a + Mystery(a, b - 1); } } ```

Computer Science & Information Technology

The cropped portion of an image is hidden and cannot be redisplayed by reversing the cropping

Indicate whether the statement is true or false

Computer Science & Information Technology

NTFS permissions and share permissions are cumulative. In other words, access to a share over the network will use the most restrictive permissions, regardless of whether they're NTFS or share permissions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology