1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reptile [31]
2 years ago
13

Consider the following implementation of a search method:

Computers and Technology
2 answers:
antiseptic1488 [7]2 years ago
6 0

Answer:

-1

Explanation:

i = 5 and target is 4, hence the result will be -1 going to the else statement because its not equal to the target

agasfer [191]2 years ago
3 0

Answer:

4

Explanation:

That's what the answer key says.

You might be interested in
When you save a drawing using paint, it's automatically stored as a?
serious [3.7K]

Answer:

Bitmap File

Explanation:

6 0
3 years ago
The chart shows an example of a study-time survey. Students can use the formula shown in the survey to figure out ways to track
LUCKY_DIMON [66]
<span>how many hours they can work on a project.</span>
3 0
3 years ago
Which is the correct order for arranging these numbers in terminal-digit filing order? 30 15 39 87 39 64 12 46 33 16 75 24 30 15
Pavel [41]

Answer:

16 75 24

12 46 33

30 15 39

87 39 64

Explanation:

8 0
3 years ago
Gourmet pizza shop with a
Alja [10]

Answer:

B.Strong direct competition.

Explanation:

Netflix can be viewed by anyone and at anytime.

8 0
2 years ago
What word is used today to refer to network-connected hardware devices?
Alina [70]

endpoint is the word used today to refer to network-connected hardware devices.

An endpoint is a network-connected hardware device, such as a computer, printer or smartphone. Today, the term endpoint is used to refer to any device that can be connected to a network.

Endpoints are important because they are the devices that users interact with when they access a network. For example, when you log into a website, you are using an endpoint (your computer) to connect to a server.

Endpoints can be either physical or virtual. Physical endpoints are actual hardware devices, while virtual endpoints are software-based and run on top of physical hardware.

Most endpoint security solutions focus on physical devices, but as more and more devices become virtual, it's important to consider security for both physical and virtual endpoints.

Learn more on endpoints here:

brainly.com/question/28221902

#SPJ4

8 0
2 years ago
Other questions:
  • Write a program in c++ to displaypascal’s triangle?
    14·1 answer
  • Adrian wants to run a digital movie clip that his friend shared with him through email. His system has 2 GB of RAM and 20 GB of
    15·1 answer
  • The key schedule results in generating multiple keys from the one secret key. These multiple keys are used:
    9·1 answer
  • .Choose the extention of Scratch Project<br><br><br> .sb2<br><br> jpeg<br><br> .exls
    5·2 answers
  • In order to create a chart, which of the following must be selected?
    8·1 answer
  • How to convert meters to centimeters in c programming​
    8·1 answer
  • Atheel tests a program and gets a NameError. How can this be fixed?
    13·2 answers
  • 1k bits equals to how many bits
    12·1 answer
  • Explains why we use tables in documents; and is at least three sentences long in word office 360​
    15·1 answer
  • Physical education is the body's ability to function effectively and efficiently without excessive farigue. TRUE/FALSE
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!