1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
6

In a binary search, _______________________________ . a. It is assumed that all of the elements are integers. b. It is assumed t

hat all of the elements are Strings. c. It is assumed that the search pool is small. d. It is assumed that the search pool is ordered. e. It is assumed that elements must be stored inside an array.
Computers and Technology
1 answer:
madam [21]3 years ago
6 0

Answer:

d. It is assumed that the search pool is ordered.

Explanation:

A binary search/logarithimic search/half interval search/binary chop refers to search algorithm in computer science that sorts data in array in key:value arrangements. In order to locate a value in binary search, the key to the value in a sorted array is located. A binary search is characterized by an ascending, descending order arrangement of the array.

You might be interested in
Which example best demonstrates an impact of computers on the economy?
Lana71 [14]

Answer:

a

Explanation:

7 0
3 years ago
You must receive an invitation in order to join Pinterest. True or False?
malfutka [58]
That is false, Pinterest is a free website that anyone can join!
3 0
3 years ago
Read 2 more answers
What is the purpose of the Excel Function Reference?
Citrus2011 [14]

Answer:

To look up functions and their purposes

Explanation:

Edg

3 0
3 years ago
According to Newton's Second Law of Motion, when an object is acted on by an unbalanced force, how will that object respond?
Murrr4er [49]
A. It will decrease speed
5 0
3 years ago
The Zapper gun was an accessory for which game console?
Vladimir [108]
Nintendo Entertainment System
5 0
3 years ago
Read 2 more answers
Other questions:
  • Systematically tackling the threats and vulnerabilities in the seven individual domains of a typical IT infrastructure helps you
    6·1 answer
  • Write an examples of Output device, storage devices and inputs device 10 each excluding the common ones​
    5·1 answer
  • Remember for a moment a recent trip you have made to the grocery store to pick up a few items. What pieces of data did the Point
    15·1 answer
  • What date does GTA 6 come out<br> A. 2020<br> B. 2019<br> C. 2021<br> D. 2022
    10·2 answers
  • Questiul 2
    10·1 answer
  • A network slows down when a network card is locked in a perpetual mode
    12·2 answers
  • Which statement describes one drive?
    6·1 answer
  • What is the best motivation that you can do/give to make your employees stay? ​
    6·1 answer
  • Write a deffrentiate between inkjet peinter and laser printer​
    8·1 answer
  • B. WAP to check whether input number is palindrome number or not using SUB...... END SUB.​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!