1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naily [24]
4 years ago
7

What changes do you need to a algorithm to compare 100 numberst

Computers and Technology
1 answer:
Aliun [14]4 years ago
3 0

Answer:

It really depends - in general every data structure has its use.

Explanation:

Furthermore, traversing the list will be inefficient because the data items are not contiguous in memory, forcing the CPU to jump all over the RAM memory causing further slowdown.

You might be interested in
A ____ database supports data distributed across several different sites.
Tcecarenko [31]
The blank is supposed to be "distributed" so the sentence goes like this "A distributed database supports data distributed across several different sites"<span />
5 0
3 years ago
What do you enter at the command prompt to prevent the shell from using to much of the systems resources?
kap26 [50]

Answer:

Ulimit is the correct answer for the above question.

Explanation:

The Linux operating system is a system on which a user can work on multiple programming system. If a user is working on multiple programs then he needs to set the limit for the system resources so that the system can not access so many resources for any particular program and he can able to access multiple programs. For this a user needs to use the Ulimit command which syntax is as follows--

ulimit [-A] (Where A can be any of them (a, b, c, d, e, f, H, i, l, m, n, p, q, r, s, S, t, T, u, v, x) which refers the type of and units of resources.)

The question asked about the command which is used to prevent to use many of the system resources, then the answer is Ulimit command which is described above.

3 0
3 years ago
Explain mportance of using Microsoft Excel in pharmaceutical science​
goldenfox [79]

Answer:

research the question and go to setting and press advanced search and it will give answer

4 0
3 years ago
What are the small squares that appear in the corners and in the middle of the sides of a selected object's border called?
Juli2301 [7.4K]

The sizing handles is known to be the small squares that appear in the corners and in the middle of the sides of a selected object's border.

<h3>What is sizing handles in MS Word?</h3>

The term sizing handles is known to be a tool that a person can use to be able to change a picture's size.

Note that if the mouse pointer is placed on a key that is of the sizing handles, the pointer alters to a double-headed arrow and a person can be able to then alter the size or shape of the image by dragging the sizing handle.

Note that it is often called handle, drag handle, sizing grip, resize corner, and therefore, The sizing handles is known to be the small squares that appear in the corners and in the middle of the sides of a selected object's border.

Learn more about sizing handles from

brainly.com/question/8806816

#SPJ1

3 0
2 years ago
In a database the primary key must contain?
lakkis [162]

Answer:

A field with a unique value

Explanation:

A primary key is a field (or a collection of fields) that contain a unique data to identify a precise row in a given table.  This is used for data retrieval but also to fully identify the row to be edited in case of update.

It can be as simple as an auto-increment counter, a serial number or an email address for example.

It can also be complex and take into account a series of fields, like a combination of a date and a userID, as a simple example.  In such case, the date field by itself would occur many times (many entries per day), and the userID would happen also many times (many daily entries by the userID), but the pair (date/userID) would be unique.

6 0
4 years ago
Other questions:
  • You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination compute
    14·1 answer
  • A properly formatted title page is left aligned. true or false.
    10·1 answer
  • Why are networked systems beneficial?
    9·2 answers
  • Which command group does a user need to access the Formula dialog box?
    11·1 answer
  • 1. How fast do human beings walk?
    15·2 answers
  • A ________ is a single media file including art, sound, animation, or movies.
    9·1 answer
  • If you have created a document that contains a table that is 10 inches wide and 4 inches high, you will want to print the docume
    6·2 answers
  • _____is used to organize and modify the properties of the current selection.
    6·1 answer
  • 2.9.8 stop light codehs
    10·1 answer
  • If the following are using default subnet masks, which one(s) of the following are valid node ip addresses: (select one) a) 220.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!