1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
2 years ago
11

The binary search algorithm cannot be used to search an array that is not sorted does twice as much work as sequential search on

the average case must be written using recursion is slower than sequential search when the item being searched for is not in the array
Computers and Technology
1 answer:
maks197457 [2]2 years ago
4 0

Answer:

Option A => cannot be used to search an array that is not sorted

Explanation:

The reason for choosing ‘option a’ is that, the actual working mechanism of binary search is to sort the array first then choose a middle element and compare the given search element with the help of middle element. Let us deeply understand how this sorting and choosing middle element does the work of search.

So this middle element is the key pointer which tells the system that the matching element might be present either to the list of values which are less than middle element or it would be present in the right side / greater than middle element. So, it would search only in the list satisfying the middle element. So it is always necessary to sort the element.

You might be interested in
As our use of the internet increases e-safety becomes essential.<br> Discuss why e-safety is needed.
nlexa [21]

Answer:

The answer is described below

Explanation:

E safety means means protection of private information and personal safety when using the internet. E safety involve the protection of private information, passwords against identity theft or property theft. A persons  private information, passwords can be gotten through the use of phishing or malwares.

Also, the use of internet has exposed people to cyber bullying(i.e abuse of an individual), stalking, engaging underage children into sexual relationships and sextortion.

E safety  help protect children from harmful content and services as those listed.

8 0
3 years ago
____ is the control or suppression of what can be accessed, published, or viewed on the internet.
arlik [135]
It is internet censorship
6 0
3 years ago
What mistake do you think you might make related to changing the data in a cell that's used in a formula?
Virty [35]

Answer

Hi,

The mistake could be the #DIV/0! error , or a #REF! error

Explanation

When changing the data in a cell that’s used in a formula, a #DIV/0! Error can occur when the formula attempts to divide a number by 0 or an empty cell. To rectify this, you will need to change the value of that cell to a value not equal to 0. In some cases, the #REF! error could be displayed. This means that the formula refers to a cell that is not valid.

Hope this Helps!

4 0
3 years ago
How chip memory is divided based upon retention, power and manufacturing
Kisachek [45]

Answer:

Some computer science stuff I guess

6 0
3 years ago
Which key toggles between insert mode and overtype mode?
andrew-mc [135]
The keyboard key that toggles between insert mode and overtype mode is the INSERT key.
7 0
2 years ago
Other questions:
  • Why is Abraham called the Father of Believers?
    6·1 answer
  • What are some short term goals for getting a bachelors degree
    10·1 answer
  • Which of the following is NOT true about RMI? RMI uses the socket connection, including opening and closing the socket. RMI allo
    8·1 answer
  • Choose two browsers and compare their security features.
    5·1 answer
  • The extent to which a program satisfies its specificationand fulfills the customer’s mission objectives is said to beachieving t
    5·1 answer
  • How does voting help in a social news site?
    10·1 answer
  • Two machines can finish a job in StartFraction 20 Over 9 EndFraction hours. Working​ alone, one machine would take one hour long
    10·1 answer
  • Please help
    11·1 answer
  • 2. Read the following scenarios about how three different programmera approach
    7·2 answers
  • The final step in the object-oriented design (ood) process consists of developing the?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!