1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
3 years ago
9

What are some other projects or things you do in your life (other than writing an essay) where you use an iterative process?

Computers and Technology
2 answers:
Sophie [7]3 years ago
7 0

Answer:The iterative design process occurs in a continuous cycle involving three unique stages: formulate, test, evaluate. These core elements make up the basic progression in which the development of a game will follow. The rest is simply rinse and repeat

Explanation:

vlada-n [284]3 years ago
3 0

Answer:

Coke has experimented with different formulations of its popular Coca Cola product, including the failed New Coke iteration. The aim is to achieve the best tasting product that customers like.

A company that is operating a factory or assembly line may experiment with different methods of arranging the assembly line or with different production methods. Each time the production process is changed, this is a different iteration. Each time the order of operations and procedures are changed, this is a different iteration. The goal is to achieve the fastest, best and most optimal method of creating a product.

A musician may start with one version of a song and refine it, making changes to a note here and there or changing the tempo and speed. Many different iterations of a song may be created this way until the optimal finished product has been created that sounds and works the best.

A cook may experiment with a recipe, tweaking the ingredients or changing different steps of the process slightly until the food tastes as good as it possibly can.

Microsoft has released multiple versions of the Windows operating system to add functionality for users and to correct bugs. Each different version is a different iteration of its operating system and the goal is for the next iteration to be better than the last.

Explanation:

Pick an example, and put it in your own words.

You might be interested in
Visual-verbal synergy has nothing to do with text, but solely with images used in a design.
Ilia_Sergeevich [38]
I think it is true (A) 
3 0
3 years ago
Where are methods listed in a UML class diagram showing three parts?
denis23 [38]

Answer:

the bottom third

Explanation:

Check out the exampe below.

swim() would be an example of a method.

3 0
2 years ago
What is the purpose of the literature review section of research paper
navik [9.2K]

variation of colored sediment

5 0
3 years ago
If AL contains binary 1000 1111, which one will show the information of the binary bits in AL after performing operation SHR AL,
padilas [110]

Answer:

a) AL will contains 0011 1100

Explanation:

In assembly language, shifting bits in registers is a common and important practice. One of the shifting operations is the SHR AL, x where the x specifies that the bits be shifted to the right by x places.

SHR AL, 2 therefore means that the bits contained in the AL should be shifted to the right by two (2) places.

For example, if the AL contains binary 1000 1111, the SHR AL, 2 operation will cause the following to happen

Original bit =>                                        |   1  |  0 |  0  |  0  |  1 |  1 |  1 |  1 |

Shift once to the right =>                |  1 |   0 |  0  |  0  |  1 |  1 |  1 |  1 | (0) |

Shift once to the right =>          |  1 |  0 |  0  |  0  |  1 |  1 |  1 |  1 | (0) | (0) |

Notice;

(i) that there are two shifts - one at a time.

(ii) that the bits in bold face are the bits in the AL after the shift. Those that in regular face are those in the carry flag.

(iii) that the new bits added to the AL after a shift are the ones in bracket. They are always set to 0.

5 0
3 years ago
email communication has its own set of etiquette guildelines for users to follow if they want to be effectove communicators. whi
Len [333]
Effective not effectove. These are guidelines:
Be brief.
Have a short opening sentence or paragraph that puts the matter in context.
Use the middle paragraph(s) to cover the matter(s) in hand.
Close with a clear agreement of what will be done, by whom, and by when.
7 0
3 years ago
Other questions:
  • Unix/linux are ____ systems, which let many people simultaneously access and share the resources of a server computer.
    13·1 answer
  • When you lost important information how do you gain the information back?
    14·2 answers
  • What is the impedance mismatch problem? Which of the three programming
    10·1 answer
  • Write the definition of a class clock. the class has no constructors and three instance variables. one is of type int called hou
    12·1 answer
  • You can use pen and highlighter tools to emphasize information on a slide during a PowerPoint presentation. These tools are avai
    11·1 answer
  • When using color in a computer - generated presentation aids you should use?
    7·1 answer
  • Why is information broken down into packets
    15·1 answer
  • What are the origins of the parking barrier?
    12·1 answer
  • How many cubic millimeters are present in 0.0923 m3?​
    14·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!