1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
3 years ago
9

What are some other projects or things you do in your life (other than writing an essay) where you use an iterative process?

Computers and Technology
2 answers:
Sophie [7]3 years ago
7 0

Answer:The iterative design process occurs in a continuous cycle involving three unique stages: formulate, test, evaluate. These core elements make up the basic progression in which the development of a game will follow. The rest is simply rinse and repeat

Explanation:

vlada-n [284]3 years ago
3 0

Answer:

Coke has experimented with different formulations of its popular Coca Cola product, including the failed New Coke iteration. The aim is to achieve the best tasting product that customers like.

A company that is operating a factory or assembly line may experiment with different methods of arranging the assembly line or with different production methods. Each time the production process is changed, this is a different iteration. Each time the order of operations and procedures are changed, this is a different iteration. The goal is to achieve the fastest, best and most optimal method of creating a product.

A musician may start with one version of a song and refine it, making changes to a note here and there or changing the tempo and speed. Many different iterations of a song may be created this way until the optimal finished product has been created that sounds and works the best.

A cook may experiment with a recipe, tweaking the ingredients or changing different steps of the process slightly until the food tastes as good as it possibly can.

Microsoft has released multiple versions of the Windows operating system to add functionality for users and to correct bugs. Each different version is a different iteration of its operating system and the goal is for the next iteration to be better than the last.

Explanation:

Pick an example, and put it in your own words.

You might be interested in
Maria is conducting a security investigation and has identified a suspect. The suspect is an employee of the organization who ha
Snowcat [4.5K]

Answer:

k12

Explanation:

8 0
2 years ago
Suppose a worker needs to process 100 items. the time to process each item is exponentially distributed with a mean of 2 minutes
stiks02 [169]
Suppose a worker nneeds to process100 items
7 0
3 years ago
If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then:
IgorLugansk [536]

Answer:

specific areas of access should be determined and they should be as restrictive as possible.

Explanation:

According to my research on security features of networks , I can say that based on the information provided within the question then specific areas of access should be determined and they should be as restrictive as possible. This would provide the highest level of security while still allowing production to be smooth.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
A record is a specific piece of information state true or false​
Alex787 [66]

Explanation:

<h3> I think it is False</h3>

hope it's help

5 0
3 years ago
Lynn has created a quarterly sales report using a word processor. The document is confidential, and Lynn wants to secure it with
sweet-ann [11.9K]
Stop cheating



It’s b
3 0
3 years ago
Other questions:
  • When one block is executed after another block in order from top to bottom, this is called ______ (see picture) Question 31 opti
    8·1 answer
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
    12·1 answer
  • Unit 3 Computer Programming Study Guide
    6·1 answer
  • Which is most harmful computer virus define​
    15·1 answer
  • Indexed sequential access, an index is more useful when the number of record is
    10·1 answer
  • Read the section, "Junior Year." Why would someone chose to complete an apprenticeship after high school? How many occupations c
    14·2 answers
  • All of the following are valid Excel arithmetic operators except _____.
    11·1 answer
  • You need to update both the DEPARTMENT_ID and LOCATION_ID columns in the EMPLOYEES table using one UPDATE statement. Which claus
    5·1 answer
  • Edhesive Intro to cs quiz 2 q#9 <br><br> What is output? <br> Print (3 % 15)<br> Thanks!!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!