1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
3 years ago
12

After class a student asked why you would ever use a heap instead of a binary search tree. Provide a good explanation for why an

d when you would.
Computers and Technology
1 answer:
sertanlavr [38]3 years ago
5 0

Answer:

Heap is useful when you want to find max/min element in the given list

BinarySearchTree is used if you need sorted elements of the list

Explanation:

Heap is Good at finding Min/Max and it's time complexity is  (O(1)), while BST is good at all finds (O(logN)). Insert is O(logN) for Heap and BSTstructures..

Max Heap ensures that elements on higher levels are greater than elements at lower level

MinHeap ensures that elements on higher levels are lesser than elements at lower level

BST gives sorted elements by following order (left,root,right).If we want sorted elements we can go with BST

You might be interested in
Help...! Why might you trace an image<br> A. To edit an image<br> B. To make drawing easier
pav-90 [236]

Answer:

the answer is b

5 0
4 years ago
What can help you best learn about appearance, habitats and behaviors of birds in your area
Korvikt [17]

c microbiology textbook

8 0
3 years ago
you want to be able to restrict values allowed in a cell and need to create a drop-down list of values from which users can choo
STALIN [3.7K]

The  feature to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose in the above scenario is data validation.

<h3>What is data validation?</h3>

Data validation is a term that connote the act of monitoring the truthfulness and quality of source data before one can make use of it, importing or even  process data with it.

Note that The  feature to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose in the above scenario is data validation as it ensure that users can make their own choice.

Learn more about data validation from

brainly.com/question/27138101

#SPJ1

8 0
3 years ago
what are the two capabilities of the internet that promote and sustain customer relationships? multiple choice question. anywher
nika2105 [10]

The two capabilities of the internet that promote and sustain customer relationships is option C: interactivity and individuality.

<h3>What can the internet do and how does it function?</h3>

A global computer network called the internet transmits many types of data and media between linked devices. It functions by utilizing a packet-routing network that complies with Transport Control Protocol (TCP) and Internet Protocol (IP).

Therefore, Note that Web interactivity describes interactive elements that are integrated into websites and allow for the exchange of information between users of technology or between users of communication technology.

Learn more about internet  from

brainly.com/question/2780939
#SPJ1

5 0
2 years ago
18) choose which article title would most likely be described by the database subject headings victims of famine, ireland, histo
Lunna [17]
I think the correct answer from the choices listed above is option B. The <span>article title that would most likely be described by the database subject headings victims of famine, ireland, history would be </span><span>''how many irish potato famine deaths? towards coherence of the evidence" Hope this answers the question.</span>
5 0
3 years ago
Other questions:
  • A host sends a packet to a local server on the company's wired ethernet lan via an access point. how many frames are necessary f
    6·1 answer
  • IN YOUR OWN WORDS, create a new thread and compare and contrast paraphrasing, summarizing, and quoting and how to do each succes
    14·1 answer
  • You have just replaced the motherboard in your computer. now your computer will not start. you press the power button on the sys
    6·1 answer
  • Which of the following is defined in terms of their activities related to denial-of-service attacks? Cracker Script kiddie White
    6·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • Raj needs to apply sorting to a current list in his Word document.
    9·2 answers
  • Describe the operation of IPv6 Neighbor Discovery. ​
    7·1 answer
  • Write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs the smalle
    12·1 answer
  • What is the full form of ARPANet, WAN,FTP,DCP,HTML,ISP and last WWW​
    12·2 answers
  • Which protocol makes a connection, checks whether the data is received, and resends it if it is not?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!