1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
3 years ago
10

45, 78, 23, 12, 63, 90, 38, 56, 88, 15 Using the sequential search as described in this chapter, how many comparisons are requir

ed to find whether the following items are in the list? (Recall that by comparisons we mean item comparisons, not index comparisons.)
a. 90
b. 14
c. 45
d. 23
e. 5
Computers and Technology
1 answer:
Alecsey [184]3 years ago
8 0

Explanation:

By using the sequential search we find the following results.

  • The first key is 90 and its comparison number is 6.
  • The second key is 14 and its comparison number is 10.
  • The third key is 45 and its comparison number is 1.
  • The fourth key is 23 and its comparison number is 3.
  • The fifth key is 5 and its comparison number is 10.
You might be interested in
how to make assignment on power point plz cntct me and help me all about power point and my assignment is prime ministers of pak
masha68 [24]

i can help you make a power point but idk anything about prime ministers of pakistan

5 0
4 years ago
Use the Wrap Text icon to _____. modify which graphic appears in the front of layered images modify the picture effects change t
sergey [27]

I believe it's change the way text is wrapped around an object.

3 0
3 years ago
Read 2 more answers
What are benefits of using debugging tools? Check all that apply.
vivado [14]

Answer:

It's

A. Debugging tools help programmers catch errors they might otherwise miss.

B. Debugging tools can save time.

D. Debugging tools help programmers make methodical assessments of the problem.

Explanation:

got it right on edge.

6 0
3 years ago
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
Is www part of every url address?
melisa1 [442]
The correct answer is that WWW. is universal, meaning that any and all url addresses start and have www.

My reasoning is that if you were to look up, lets say google, do :

www.(google).com ( remove parentheses )

then

google.com 

You come up with the same results THUS YOUR CORRECT ANSWER IS YES! ALL URL ADDRESS HAVE AND CONTAIN WWW.!!!

5 0
4 years ago
Other questions:
  • One thing we might want to know, given an input to a chatbot, is if the input is a question.
    10·1 answer
  • Ok so sometimes when i do something i see a box with a question mark in it, how do i remove it, i am on a macOs High Sierra earl
    11·1 answer
  • The __________ determines whether coolant should be pumped back into the engine directly or cooled first.
    15·1 answer
  • Inserting a new value in the middle of a singly lnked list requires changing the pinter of the list node that follows the new no
    10·1 answer
  • What is the meaning of the word joystick
    6·2 answers
  • Which would a student most likely do in a digital laboratory?
    13·2 answers
  • In the ______ algorithm, the disk arm starts at one end of the disk and moves toward the other end, servicing requests till the
    11·1 answer
  • Who here would like to play among us with me? <br> Time: Friday, November 13
    14·1 answer
  • Why is storage and important part of the computing process? It must be atleast five sentences.
    11·1 answer
  • Which statements are true regarding mainframe computers? Mainframes are fast-performing computers that have large storage capaci
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!