The process of breaking down a large program into modules is called ____.

A. decomposing
B. modularization
C. fragmentation
D. caching


Answer: B

Computer Science & Information Technology

You might also like to view...

What interfaces are in the package java.lang?

What will be an ideal response?

Computer Science & Information Technology

To edit a recorded macro, you use the macro recorder. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Inherent risk

A. exists because all control structures are flawed in some ways. B. is the likelihood that material misstatements exist in the financial statements of the firm. C. is associated with the unique characteristics of the business or industry of the client. D. is the likelihood that the auditor will not find material misstatements.

Computer Science & Information Technology

Which of the following is the maximum transmission distance of 10GBaseLR?

A. 6 miles (9.7 kilometers) B. 25 miles (40 kilometers) C. 512 miles (824 kilometers) D. 1,024 miles (1648 kilometers)

Computer Science & Information Technology