1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
7

What are some real-life situations that require a program that is iterative? Include at least three examples in your answer.

Computers and Technology
2 answers:
Hunter-Best [27]3 years ago
7 0
<h2>Hello :D</h2>

Your answer should be:

Apple has released multiple different versions of each model of its iPod products. The Nano, for example, has evolved from an original slim mP3 player with a very small screen to a tiny square touch-screen version to a longer, thinner touch screen version.

<em>Hope this helped! </em>

<em>Brainliest appreciated :3</em>

soldier1979 [14.2K]3 years ago
4 0

Wanted to point out that the other answer is directly pasted from here! https://examples.yourdictionary.com/iteration-examples.html

Don’t get flagged for plagiarism, have an awesome day!

You might be interested in
In 4-bit two's complement representation, what is the binary encoding of the number -5?
Katena32 [7]

Answer:

a) 1011

Explanation:

In 4 bit two's complement representation, the first bit is the sign bit.

If the sign bit is 1, the number is negative.

If the sign bit is 0, the number is positive.

What is the magnitude of the sign bit?

In n-bit two's complement representation, the magnitude of the sign bit is:

2^{n-1}-1

So, in 4-bit two's complement representation, the magnitude of the sign bit is:

2^{4-1}-1 = 8

Since the number is negative, the value of this bit is -8.

The other bits are magnitude bits, positive.

We have that the sum of these bits must be -5, and we already have -8. So what should be the value of these last 3 bits?

First, i am going to solve this equation to find the decimal value of the last three bits.

-5 = -8 + x

x = 3

So, the last three bits are:

3_{10} = (011)_{2}

The binary encoding of the number -5 is:

a) 1011

5 0
3 years ago
Game Design 40 POINTS. Help Please. If you help then you are godly.
Brrunno [24]

question 4 is b

question 3 is also b

last one A

5 0
3 years ago
Write a for loop to print the numbers from 20 to 30, inclusive (this means it should include both the 20 and 30). The output sho
soldi70 [24.7K]

In python:

for i in range(20, 31):

   print(i, end=" ")

3 0
3 years ago
Which term does not refer to a variant of the full-size secure digital (sd) memory card?
dsp73

Micro SD term does not refer to a variant of the full-size secure digital (sd) memory card.

<h3>What is Secure Digital a memory card?</h3>

A Secure Digital (SD) card is a tiny flash memory card developed for high-capacity memory and different portable devices, such as car navigation systems, cellular phones, e-books, PDAs, smartphones, digital cameras, music players, digital video camcorders, and individual computers.

<h3>What is the best device for storing digital photos?</h3>

Hard drives are good for storing photos because they are cheap, they provide fast admission to data, and it's very easy to copy a whole hard drive to another hard drive  especially if you have USB 3.0 or Thunderbolt associations

To learn more about Micro SD, refer

brainly.com/question/24723558

#SPJ4

4 0
2 years ago
SOMEBODY HELP ME ASAP PLEASE AND THANK YOU
Paha777 [63]

Answer:

Isnt there another thing that is supposed to be there like some website

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Does the brain play a role in smartphone addiction
    7·2 answers
  • Which of the following is an example of joint problem solving?
    12·1 answer
  • Write a definition in your own words for telecommunication. Do not cop and paste please.
    15·1 answer
  • Each of these is a step in cEach of these is a step in conflict resolution: Evaluate solutions suggested. Define the problem. De
    7·1 answer
  • Book information (overriding member methods) Given main() and a base Book class, define a derived class called Encyclopedia. Wit
    12·1 answer
  • Document accurately describes the differences between servers and computers and between local and wide area networks. Document p
    5·1 answer
  • Select the correct answer..
    6·1 answer
  • What type of software repairs or improves a larger application that is already installed on a system?
    9·2 answers
  • Which technological tool is important for storing critical files?.
    12·1 answer
  • Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!