1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
11

For a list to be binary search-able, we need the following thing to be true, because... a. The list must be sorted, because chec

king the half way point in binary search assumes that the elements to the early part of the list are less than each midpoint and the elements later in the list are greater. b. A list without any negative numbers. Binary search cannot find negative numbers. c. An unsorted list, because binary search will sort the list while it does the searching operation. d. A randomized list, since binary search will have the best chance of finding an element.
Computers and Technology
1 answer:
rusak2 [61]3 years ago
7 0

Answer:

The answer is option A.

Explanation:

Negative numbers can be found by binary search, this makes option B incorrect.

Unsorted and randomized lists are also not things that support a binary search, options C and D are incorrect.

Binary search uses a technique where the middle element of the list is located and used to determine whether the search should be done within the lower indexed part of the list or the higher. So for a list to be binary search-able, it should be sorted and not randomized.

The answer is A.

I hope this helps.

You might be interested in
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
Which one is the correct answer
STatiana [176]

the right anwser is d


3 0
3 years ago
What types of storage can be used to access data from another computer
Aleksandr-060686 [28]
<span>Hard disk drives
</span><span>RAM<span>Random access memory (RAM)
</span></span><span>External hard disks
<span>USB port
</span></span>CD and DVD drives
<span>Memory cards</span>
6 0
3 years ago
Read 2 more answers
You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
pashok25 [27]

Answer:

ECC RAM

Explanation:

ECC RAM is the most popular Random Access Memory out there that is used by most business servers. Dealing with big data for most huge businesses is crucial. The need to prevent loss of data requires that they purchase ECC RAM. ECC RAM automatically protects the systems from potential errors that occur in memory. Any abrupt changes in temporary data stored in ECC RAM are automatically corrected. This is achieved by an additional memory chip that acts as error detection for the other eight RAM chips.

8 0
3 years ago
The process of _____ determines what volume a system can handle by comparing its performance to standards in the industry? horiz
Alina [70]

BENCHMARKING

option C

5 0
3 years ago
Read 2 more answers
Other questions:
  • Question: A famous Disney Movie partially takes place in this city.
    15·2 answers
  • A user reports that nothing happens when he or she attempts to print from the computer at his desk. This points to a possible pr
    11·2 answers
  • Which player type focuses on level progression?
    13·1 answer
  • What is the left are if a slide in a presentation called
    15·1 answer
  • True or false A ClassB fire involves live electrical equipment
    5·1 answer
  • Of the following which would be the best data representation for this puzzle in a puzzle class?
    6·1 answer
  • Which two fields in an Ethernet frame help synchronize device communica- tions but are not counted toward the frame’s size?
    11·1 answer
  • ( Game Design) The companies who get video games out to consumers are called:
    12·1 answer
  • Probability can be used to determine the likelihood of specific __________
    6·2 answers
  • (True or False) The speed at which data travels on a bus is referred to as the word size.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!