1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Usimov [2.4K]
3 years ago
6

HURRY HELP THIS IS FOR CODING !!!! What are some real-life situations that require a program that is iterative? Include at least

three examples in your answer.
Computers and Technology
2 answers:
stellarik [79]3 years ago
7 0
<h2>Hello :D</h2>

Answer:

Apple has released multiple different versions of each model of its iPod products. The Nano, for example, has evolved from an original slim mP3 player with a very small screen to a tiny square touch-screen version to a longer, thinner touch screen version.

<em>Hope this helped! </em>

<em>Brainliest appreciated! </em>

<em>--Juri Davis</em>

Degger [83]3 years ago
5 0

Answer:

A health service, a sales service, a social network, all because they require you to make a request to return a result

You might be interested in
what will be the Trade discount and Invoice Amount if the List Price is $400.00 and the Trade Discount Rate is 85%
V125BC [204]

Answer:

$340

Explanation:

you have to multiply $400 bu 85% to get $340

4 0
3 years ago
Create the code that will find
frez [133]

Answer:

function findLongestWord(str) {

 var longestWord = str.split(' ').sort(function(a, b) { return b.length - a.length; });

 return longestWord[0].length;

}

findLongestWord(InputHere);

Explanation:

Replace InputHere with the input

7 0
3 years ago
What are the limits of hashing and verifying that files haven’t changed?
earnstyle [38]

The hashing function can take any number of key-value pairs and there is no specific limit to it.

<h3>What is hashing?</h3>

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

brainly.com/question/13106914

#SPJ1

5 0
2 years ago
A series of dialog boxes that guides you through creation of a form or report is called a ____.
victus00 [196]

Answer:

c i think it mit be right i'm sorry if it's not ,

Explanation:

it's c or D.

4 0
2 years ago
What term is used to describe the process of monitoring operating results and comparing actual results with the expected results
s344n2d4d5 [400]

Answer:

controlling

Explanation:

hope this helps

7 0
3 years ago
Other questions:
  • 2 negative impact of excessive use of computer even in solving mathematical problem.
    11·1 answer
  • Can someone that been helping me answer one more question for please and thx
    13·1 answer
  • Which of the following are some of the ways that the media influences consumers behavior
    9·1 answer
  • ________ is the process the compiler uses to divide your source code into meaningful portions; the message means that the compil
    7·1 answer
  • .- Una tienda de vestidos de fiesta, ofrece un descuento a las personas
    15·1 answer
  • Use the drop-down menus to complete statements about audio file formats.
    10·1 answer
  • Which of the following is the file type of Microsoft® Publisher files?
    12·2 answers
  • .NET
    15·1 answer
  • Imagine running a 64-bit system on a 32-bit system, where we simulate a single 64- bit memory location (register) using two atom
    14·1 answer
  • Does analogue conversation take place in source as transmitter?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!