1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
4 years ago
7

The binary search algorithm ________. will have a maximum number of comparisons equal to the number of elements in the array wil

l, normally, have the number of comparisons that is half the number of elements in the array is less efficient than the sequential search algorithm will cut the portion of the array being searched in half each time it fails to locate the search value
Computers and Technology
1 answer:
dimaraw [331]4 years ago
4 0

Answer:

Hi!

The correct answer is:

The binary search algorithm will cut the portion of the array being searched in half each time it fails to locate the search value.

Explanation:

Important! The elements of the array have to be in order to perform a binary search.

For example.

An array of 10 position. Each position represent the value of the element.

If you have to seek the number 1:

  • The first loop takes position 5 and evaluates. The value is greater than  searched, discard the upper part of the array.

      1  2  3  4  5  6  7  8  9  10

  • The second loop takes the position 3 and evaluates. The value is greater than searched, discard the upper part of the array.

      1  2  3 <em> 4  --- 5  6  7  8  9  10</em>

  • The third loop takes the position 2 and evaluates. The value is greater than searched, discard the upper part of the array.

      1  --- <em>2  3</em> <em> 4  5  6  7  8  9  10</em>

  • The fourth loop takes the position 1 and evaluates. The value is equal to searched, finish the seek.

      1 <em> </em><em> ---</em> <em>2 </em> <em>3</em> <em> 4  5  6  7  8  9  10</em>

<em />

You might be interested in
Which of the following is an example of synchronous communication?
kirza4 [7]

The answer is D) on Oddessey Ware

4 0
3 years ago
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the intern
VikaD [51]

Answer:

ICMP

Explanation:

3 0
3 years ago
!! HELP PLZ !!
DochEvi [55]
I think it might be short range and long-term
3 0
3 years ago
Read 2 more answers
What are software applications?
navik [9.2K]

Answer:

files that are stored on the computer

Explanation:

there is an actual definition, but it isnt listed here. Application software is commonly defined as any program or number of programs designed for end-users. That's it, in a nutshell.

4 0
3 years ago
Read 2 more answers
Input and output devices provide means of communication between computers and outer world<br>​
abruzzese [7]

Answer:

See explanation

Explanation:

This question seem incomplete as what's required was not stated.

To answer this question, I'll assume it's a fill-in-the-gap question

The definition given above describes computer peripherals.

Peripherals is one of the links between a computer user and the computer itself.

Through peripherals such as keyboards, mouse, light pen , one can send input into the computer.

In the same vein, one can get outputs through peripherals such as the computer monitor, speakers, printers, etc.

3 0
3 years ago
Other questions:
  • .How does kinetic energy affect the stopping distance of a vehicle traveling at 30 mph compared to the same vehicle traveling at
    13·1 answer
  • In 2-4 sentences, explain the difference between the “save” and the “save as” commands.
    9·2 answers
  • True or false a computer network requires both hardware and software
    9·2 answers
  • Main characteristic of open source software<br> ?
    7·1 answer
  • 1. Create an interface called Runner. The interface has an abstract method called run() that display a message describing the me
    8·1 answer
  • You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensi
    11·1 answer
  • Write C code for a getCommonNeighbors function that accepts two vertex struct pointers, u and v, and returns unordered_set conta
    9·1 answer
  • When using the protection options in Excel 2016, what does the Protect Workbook function do?
    8·2 answers
  • As you will solve more complex problems, you will find that searching for values in arrays becomes a crucial operation. In this
    9·1 answer
  • ________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Hum
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!