The technique used by programmers to break down an algorithm into modules is known as __________.

Fill in the blank(s) with the appropriate word(s).

top-down design

Computer Science & Information Technology

You might also like to view...

Modern operating systems can artificially extend the computer's RAM by using ________ memory

A) progressive B) PnP C) virtual D) read-only

Computer Science & Information Technology

_________ audit trails may be used to detect security violations within an application or to detect flaws in the application’s interaction with the system.

A. Application-level B. System-level C. User-level D. None of the above

Computer Science & Information Technology