The technique used by programmers to break down an algorithm into modules is known as __________.
Fill in the blank(s) with the appropriate word(s).
top-down design
Computer Science & Information Technology
You might also like to view...
Modern operating systems can artificially extend the computer's RAM by using ________ memory
A) progressive B) PnP C) virtual D) read-only
Computer Science & Information Technology
_________ audit trails may be used to detect security violations within an application or to detect flaws in the application’s interaction with the system.
A. Application-level B. System-level C. User-level D. None of the above
Computer Science & Information Technology