Modelling a problem by extracting the essential variables and their relationships is called a(n) __________.

a. algorithm
b. interface
c. abstraction
d. top-level design
e. top-down design

C

Computer Science & Information Technology

You might also like to view...

WEP and WPA are examples of ________

A) spam blockers B) firewall applications (apps) C) antivirus applications (apps) D) protocols that use encryption to protect wireless transmissions

Computer Science & Information Technology

Buffer overflow attacks have become less prevalent with the growth of the Internet.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology