1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
9

Suppose as a computer programmer, you have been assigned a task to develop a program to store the sorted data in ascending order

. Initially you have used linked list data structure to store the data but search operation was time consuming then you decided to use BST (Binary Search Tree) but retrieval efficiency is not improved. In such situation, How can you improve the efficiency of search operation for BST? Justify your answer with solid reason.
Computers and Technology
1 answer:
shepuryov [24]3 years ago
3 0

Answer:

In case the data is arranged in the ascending order, you can always change the Binary search tree into a Height BST, and which is also known as the self-balancing BT. And through this, it's quite on hand to better the operations like searching on the new BST. And these SBBTs are quite commonly made use of for constructing as well as maintaining the ordered list. This is the case in the case of the priority queue, and this is what is required here.

Explanation:

Please check the answer.

You might be interested in
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software c
GalinKa [24]

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. <u>VPN </u> software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.

Explanation:

  • A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet.
  • VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more. .
  • Virtual Private Network, is a private network that encrypts and transmits data while it travels from one place to another on the internet. VPNs aren't just for desktops or laptops, you can set up a VPN on your iPhone, iPad or Android phone.
  • A VPN encrypts the traffic from your machine to the exit point of the VPN network. A VPN isn't therefore likely to protect you from an adversary like Anonymous.
  • VPNs add another layer of encryption to your internet traffic, your latency will go up and speeds will go down.

3 0
3 years ago
What cold, hard facts support your position?
Sladkaya [172]
Idk what is it?
a computer?
plz mark me as brainliest
6 0
3 years ago
What is a semiconductor
Elis [28]
A semiconductor material has an electrical conductivity value falling between that of a conductor, such as metallic copper, and an insulator, such as glass. Its resistivity falls as its temperature rises; metals behave in the opposite way. I hope this helps and have a great day! (Also brainliest would be appreciated but you don’t have to) :)
7 0
3 years ago
Read 2 more answers
You work part-time at a computer repair store, and you are on-site at a customer's premises. Your customer has signed up for DSL
patriot [66]

The fill up are:

First Install the DSL router and link it to the phone line via:

  • Look at the Shelf, and expand Routers.
  • Take in the DSL router to the Workspace area.
  • Beyond the router, click on Back to switch to the back view of the router.

<h3>What is the steps about?</h3>

Next check On the Shelf, and expand Cables.

Click on the twisted pair cable that has RJ11 connectors.

Looking at the Selected Component window, take in a connector to the RJ11 port on the router.

Looking at the Selected Component window, take in or drad the other connector to the empty phone port that can be seen on the wall outlet.

Then Plug in the router via:

The Shelf, click on the power adapter.

  • Using the Selected Component window, take in the DC power connector to the power port on the DSL router and also take in the AC power plug to the wall outlet then:

Click on the computer to the DSL router as follows:

Beyond the computer, click on Back to switch to the back view of the computer and in the Shelf, click on the Cat5e cable.

Using the Selected Component window, take in a connector to the network port on the computer and then take in other connector to a network port on the DSL router.

The implementing DSL and Select the DSL filter then click on the phone cable under Partial connections and take in or drag unconncected connector to the RJ11 port on the filter.

Learn more about DSL internet  from

brainly.com/question/14599737

#SPJ1

5 0
2 years ago
A company wants to ensure that the validity of publicly trusted certificates used by its web server can be determined even durin
Natali [406]

Answer: OCSP

Explanation:

Ocsp(online certificate status protocol) is used to maintain the security status of the server and also to determine the status of SSL/TLS certificates used by the webserver.

5 0
3 years ago
Other questions:
  • Please help!
    15·1 answer
  • From the ages of 18 to 24, individuals born from 1980 to 1984 held an average of 6.2 jobs—which is slightly higher than the numb
    10·1 answer
  • A quick boot allows you to do what?
    7·2 answers
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    5·1 answer
  • Charts are more effective in attaining attentionthen others methods of presenting data. Do you agree?
    10·1 answer
  • Suppose you are on a desert island and possess exactly 20 coconuts your neighbor Friday is a fisherman and he is willing to trad
    14·1 answer
  • There is an interface I that has abstract class AC as its subclass. Class C inherits AC. We know that C delegates to an object o
    12·1 answer
  • PACIFIC NORTHWEST
    10·1 answer
  • Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common
    13·1 answer
  • A____consists of many users and their information.​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!