1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
3 years ago
7

B. Does “refactoring” mean that you modify the entire design iteratively? If not, what does it mean?

Computers and Technology
1 answer:
Liono4ka [1.6K]3 years ago
6 0

Explanation:

Refactoring consists of improving the internal structure of an existing program's source code, while preserving its external behavior. 

You might be interested in
What is the index of 7 in this list?
Ganezh [65]

Answer:

Assuming this is 0 based array indexing, it would look like this...

[ 5, 6, 10, 7, 3, 2.5 ]

[ 0, 1, 2, 3, 4, 5, 6 ]

The index of 7 would be 3.

6 0
3 years ago
HELP! Answer to question 2?
Vesnalui [34]
One advantage of Binary Search Algorithm: 
Compared to Linear search it is much faster because linear search starts its searching right from the first value but binary searches for something by splitting the array in two again and again and again. 

One disadvantage of Binary Search Algorithm:
Have to be sorted, unlike linear search that doesn't have to be. 
4 0
3 years ago
An effective team would never have ______.
inysia [295]
An ineffective leader
3 0
2 years ago
BRAINLIEST plz help
avanturin [10]

Answer:C

Explanation:

8 0
3 years ago
Which of the following statements concerning a short in a series circuit is true?
Romashka [77]

Answer:

what is the answers it gave you?

6 0
2 years ago
Other questions:
  • Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit
    13·1 answer
  • Where does the term for a star network describe? A) a network for Department of Defense scientists to share data about the stars
    13·2 answers
  • We never need to use a forward declaration when invoking a public subprogram. true or false?
    15·1 answer
  • Cyberterrorism is the use of terrorism to attack (Points : 1) public libraries. computer based networks. government spy networks
    15·1 answer
  • ______involves encoding information using fewer bits than the original representation Group of answer choices
    6·1 answer
  • Can someone explain what Bytes are? I would really like to know.
    5·2 answers
  • What is the code for this please?​
    13·1 answer
  • Complete the sentence with the correct response.
    9·1 answer
  • Write a program that simulates applying a "boost" to a spaceship in a spaceship race game.
    12·1 answer
  • Is permanent software programmed into read-only memory.<br> Firmware<br> JavaScript<br> PHP<br> o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!