1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
3 years ago
13

From the binary search algorithm, it follows that every iteration of the while loop cuts the size of the search list by half.

Computers and Technology
1 answer:
Colt1911 [192]3 years ago
6 0

Answer:

True: In binary search algorithm, we follow the below steps sequentially:

Input: A sorted array  B[1,2,...n] of n items and one item x to be searched.

Output: The index of x in B if exists in B, 0 otherwise.

  1. low=1
  2. high=n
  3. while( low < high )
  4.  {      mid=low + (high-low)/2
  5.         if( B[mid]==x)
  6.          {
  7.             return(mid)  //returns mid as the index of x
  8.           }
  9.          else
  10.          {
  11.              if( B[mid] < x)      //takes only right half of the array
  12.               {
  13.                 low=mid+1
  14.               }
  15.              else               // takes only the left half of the array
  16.               {
  17.                high=mid-1
  18.               }
  19.           }
  20.  }
  21. return( 0 )

Explanation:

For each iteration the line number 11 or line number 15 will be executed.

Both lines, cut the array size to half of it and takes as the input for next iteration.

You might be interested in
Whats the name of the windows 10 nucleus
stepan [7]

Answer:

motheboard

Explanation:

7 0
3 years ago
What are benefits of using scenarios? check all that apply
barxatty [35]

Answer:

The benefit will be to "Reduce income volatility". The further explanation is given below.

Explanation:

  • The scenario could become theoretical, linear, or non-linear historical or conceptual.
  • Eventually, through the utilization of scenario analysis which helps shareholders avoiding looking for someone to blame and find investment opportunities which might improve equity returns and rising income fluctuations.

So that the above will be the right answer.

8 0
3 years ago
What type of ospf packet is used to actually send lsas between neighbors?
Marrrta [24]
<span>LSU OSPF packets are used to send LSAs between neighbors. </span>
<span /><span>
</span><span>Adjacencies are first formed by the OSPF neighbors before the LSAs are shared. When two OSPF neighbors exchange their known LSAs with the OSPF Database Description packets, the device does not know the actual LSAs. These are sent using Link Status Update pockets.</span>



3 0
3 years ago
What specialized network device is commonly used to load balance traffic across multiple servers in a group?
mylen [45]

A content switch is a specialized network device that's commonly used by network engineers to load balance network traffic across multiple servers in a group.

<h3>What is a content switch?</h3>

A content switch can be defined as a class of switch which is designed and developed for the programmatic redirection of request traffic of a client from one server, which was initially selected by load balancing to another server selected based on the content of the request or header.

Thus, a content switch is a specialized network device that's commonly used by network engineers to load balance network traffic across multiple servers in a group.

Read more on switches here: brainly.com/question/14850209

#SPJ12

5 0
2 years ago
Explain how work can impact<br> family life.
Ivanshal [37]

Answer:

Conflict due to tension between roles results when stress generated while performing one role affects the way a person fulfills the demands of other roles. For example, the effects of fatigue and stress experienced at work can affect family life at home, and vice versa.

Explanation:

8 0
3 years ago
Other questions:
  • You are running an application in Google App Engine that is serving production traffic. You want to deploy a risky but necessary
    9·1 answer
  • What are examples of some Exotic currencies?
    14·1 answer
  • In which phase of the software development process would probing questions be used to verify the problem definition?
    12·1 answer
  • What are two type of physicals connection
    14·1 answer
  • Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
    8·1 answer
  • Which of the following is a category of authorization tools
    5·1 answer
  • Eun-Joo is working on a circuit board. There is no electrical current flowing through a certain switch on the circuit board.
    9·2 answers
  • Characteristics of the printer​
    6·1 answer
  • A computer _________________ is a text file that a computer can understand
    12·1 answer
  • les agrees to install a new hard drive and software on marilee's computer in exchange for four of her used textbooks. after he i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!