1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lisa [10]
3 years ago
11

This search compares the target value with the middle element in the collection, then ignores the half of the collection in whic

h the target cannot exist a) Linear b) Exponential c) Interpolation d) Binary
Engineering
1 answer:
love history [14]3 years ago
7 0

Answer:

d) Binary

Explanation:

Binary search is a search algorithm that finds the position of a value in an ordered array. It compares the value with the element in the middle of the array, if they are not equal, half in which the value cannot be eliminated and the search continues in the remaining half until the value is found.

You might be interested in
What are the characteristic features of stress corrosion cracks?
Oduvanchick [21]

Answer and Explanation:

The crack formation growth that takes place in an environment corrosive.

Stress corrosion cracks can be defined as the spontaneous failures of the metal alloy as a result of the combined action of corrosion and high tensile stress.

Some of the characteristic features of stress corrosion cracks are:

  • These occur at high temperatures.
  • Occurrence of failures in metals mechanically.
  • Occurrence of sudden and unexpected failures under tensile stress.
  • The rate of work hardening of the metal alloy is high.
  • Time
  • An environment that is specific for stress corrosion cracking.
5 0
3 years ago
When handling chemicals and solvents, technicians are recommended to
Luda [366]

Answer:

  1. To wear PPE
  2. Have prior knowledge of explosive levels and elemental properties
  3. Know procedure to eliminate any threat
7 0
3 years ago
Read 2 more answers
An engineer is working with archeologists to create a realistic Roman village in a museum. The plan for a balance in a marketpla
NeTakaya

Answer:

The minimum volume requirement for the granite stones is 1543.64 cm³

Explanation:

1 granite stone weighs 10 denarium

100 granted stones will weigh 1000 denarium

1 denarium = 3.396g

1000 denarium = 3396g.

But we're told that 20% of material is lost during the making of these stones.

This means the mass calculated represents 80% of the original mass requirement, m.

80% of m = 3396

m = 3396/0.8 = 4425 g

This mass represents the minimum mass requirement for making the stones.

To now obtain the corresponding minimum volume requirement

Density = mass/volume

Volume = mass/density = 4425/2.75 = 1543.64 cm³

Hope this helps!!!

3 0
3 years ago
Can I get an answer to this question please
crimeas [40]

Answer:

  (i) 12 V in series with 18 Ω.

  (ii) 0.4 A; 1.92 W

  (iii) 1,152 J

  (iv) 18Ω — maximum power transfer theorem

Explanation:

<h3>(i)</h3>

As seen by the load, the equivalent source impedance is ...

  10 Ω + (24 Ω || 12 Ω) = (10 +(24·12)/(24+12)) Ω = 18 Ω

The open-circuit voltage seen by the load is ...

  (36 V)(12/(24 +12)) = 12 V

The Thevenin's equivalent source seen by the load is 12 V in series with 18 Ω.

__

<h3>(ii)</h3>

The load current is ...

  (12 V)/(18 Ω +12 Ω) = 12/30 A = 0.4 A . . . . load current

The load power is ...

  P = I^2·R = (0.4 A)^2·(12 Ω) = 1.92 W . . . . load power

__

<h3>(iii)</h3>

10 minutes is 600 seconds. At the rate of 1.92 J/s, the electrical energy delivered is ...

  (600 s)(1.92 J/s) = 1,152 J

__

<h3>(iv)</h3>

The load resistance that will draw maximum power is equal to the source resistance: 18 Ω. This is the conclusion of the Maximum Power Transfer theorem.

The power transferred to 18 Ω is ...

  ((12 V)/(18 Ω +18 Ω))^2·(18 Ω) = 144/72 W = 2 W

7 0
2 years ago
section 10.1 describes a man in the middle attack on the diffie-hellman key exhange protocal in which the adversary generates tw
nika2105 [10]

Answer:

1. James will attack by generating a random private key XD and a corresponding public key YD.

2. Jane transmit YA to another person called Alex.

3. James intercept YA and transmit YD to jane.

4. Jane receive YD and calculate K1

At this point james and jane thinks they share a secret key but instead james has a secret key k1 to Jane and k2 to alex.

5. Alex transmit another key XA to alex for example.

6. James intercept and calculate k2 and vice versa.

6 0
3 years ago
Other questions:
  • 4.71 A full-wave rectifier circuit with a 1-kΩ operates from a 120-V (rms) 60-Hz household supply through a 6-to-1 transformer h
    10·1 answer
  • Explain in detail the difference between the microstructures of a cold worked sample and Recrystallized sample ?
    15·1 answer
  • A metallic material with yield stress of 140 MPa and cross section of 300 mm x 100 mm, is subjected to a tensile force of 8.00 M
    12·1 answer
  • Nitrogen can be liquefied using a Joule-Thomson expansioni process. This is done by rapidlyl and adiabatically expandign cold ni
    15·1 answer
  • What are the weight restrictions for a small UAS, including everything onboard at the time
    12·1 answer
  • Barry wants to convert mechanical energy into electric energy. What can he use?
    5·2 answers
  • An experimental arrangement for measuring the thermal conductivity of solid materials involves the use of two long rods that are
    8·1 answer
  • What is the most likely reason the rover won't travel in a straight line?
    9·1 answer
  • Can someone please help!
    8·1 answer
  • Help please i will give brainlist
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!