1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
3 years ago
13

A company database consists of 10,000 sorted names, 40% of whom are known as good customers and who together account for 60% of

the accesses to the database. There are two data structure options to consider for representing the database: Put all the names in a single array and use binary search. Put the good customers in one array and the rest of them in a second array. Only if we do not find the query name on a binary search of the first array do we do a binary search of the second array. Demonstrate which option gives better expected performance. Does this change if linear search on an unsorted array is used instead of binary search for both options
Computers and Technology
1 answer:
vladimir2022 [97]3 years ago
7 0

Answer:

The answer is "binary search= 5.111 and Linear seacrch= 6400".

Explanation:

Following are the description of this question:

  • Binary Search-The performance with single arrays is log 10000 = 4, through the use of two arrays (60/100)*log4000 + (40/100)*(log4000 + log6000) = 5.111.  
  • In the linear search: while doing static searches, 10000 would be performed, and (60/100)*4000 + (40/100)*6000 = 6400 will be used with two arrays.  
  • It's a special case, that will be used in one of the arrays in a binary search. Whereas good case uses linear frames, two frames are used, as indicated above.
You might be interested in
Was LDAP version2 an internet standard in 1998? is it now?
mamaluj [8]

Answer Explanation:

LDAP stand for lightweight directory access protocol 389 is its port number it is an application layer protocol it was first invented in march 1998 and become very popular widespread  internet standard in august 1998 its authentication method is very simple the client send user name and password to LDAP server to access this.

4 0
3 years ago
What is the advantage of using a subject directory like the public internet library ?
Alexandra [31]
<span>Learn how to use search engines and subject directories</span>
7 0
4 years ago
Sidney works in the accounting department. His boss just assigned him a task that involves creating budget formulas for the comp
Molodets [167]
The answer is a A. - Excel performs operations based on the order of Precedence
4 0
3 years ago
Colby works as a shipping clerk for a major package delivery service. Some of his daily tasks include tracking shipments and ent
kramer

Answer: databases

Explanation:

The options include:

A. networking

B. databases

C. hardware

D. software

The aspect of the Information Technology cluster that he would most likely be trained in is the databases.

Database simply refers to a structured set of data which is being held in a computer. It helps in the storage of organized information.

Since some of his daily tasks include tracking shipments and entering orders, he'll be trained in database.

5 0
3 years ago
Read 2 more answers
Which type of classroom enables students to attend lectures without being physically present with the teacher?
Kisachek [45]
An online class? I think lol
5 0
3 years ago
Other questions:
  • Which mode can students use to ensure that their information is not saved in their Chrome browser
    15·1 answer
  • Whoevr answers this will be marked brainliest
    12·1 answer
  • what are the Technologies in regarding of communication technology? Please help me I'll rate you as brainliest!​
    13·1 answer
  • Write a function named word_count that accepts a string as its parameter and returns the number of words in the string. A word i
    10·1 answer
  • In the context of machine learning, an artificial neural network (ANN) is most likely used for:a.supplying explanations for solu
    9·1 answer
  • Which statement best describes fonts from a serif font family?
    14·1 answer
  • While num_printed != num_stars: print('*') Sample output with input: 3 * * *
    15·1 answer
  • What is a decryption key?​
    8·1 answer
  • You text file begins with the following rows. The pattern is a description of the item to be repaired, its color, and the issue.
    14·1 answer
  • In python please.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!