1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
3 years ago
8

What are search tries? Why are they more efficient than usualsearching algorithms?

Computers and Technology
1 answer:
Sati [7]3 years ago
6 0

Answer:

Trie is a tree based data structure where the keys are strings.  

Search trees are a data structures in Computer Science in which they are based on trees.

Explanation:

Search trees are tree based data structures which are used to search elements in the tree as the names suggests (search tree). However, for a tree to perform as search tree the key it has to follow specific conditions. They are , the the key of any node has to be less than the all the keys present in the right sub trees and greater than all the keys present in the left subtree.

You might be interested in
One of the differences between a career and a job is that a career?
murzikaleks [220]
A job is more short-term oriented and tends to focus purely on earning money. ... On the other hand, a career is a series of related employment in one field that provides experience for your future and helps you earn a better paycheck and living status.
5 0
3 years ago
The components of hardware include:
zlopas [31]

Answer:

A

Explanation:

Monitor, CPU, Disk Drives, Printer, Keyboard/mouse

5 0
3 years ago
Read 2 more answers
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
4 years ago
To allow Hootsuite to reconnect to your LinkedIn account, you must first give authorization from the LinkedIn website
tekilochka [14]

Answer:

To allow Hoot suite to connect with my linked in account there are two ways.

  1. I just opened it in my browser.  If the browser is already signed in with linked in account then It directly access the account of linkedin.
  2. If there is no social media log in on browser then it requires authentication to login.
8 0
3 years ago
A file named "songs.txt" exists and has 70 lines of data. You open the file with the following line of code.
expeople1 [14]

Answer:

There will be 3 lines of data left

Explanation:

When you use "w" command it overwrites all lines that already exists, to avoid this use "a" instead to append lines of data onto the text file

3 0
3 years ago
Other questions:
  • A pizza cutter is a compound machine made up of what simple machines?
    7·1 answer
  • How does an ip address allow your computer to be reached
    7·1 answer
  • Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
    13·2 answers
  • The primary purpose of an operating system is: To provide a software interface between the hardware and the application programs
    11·1 answer
  • Technology deals with...
    12·1 answer
  • A Floppy Disk is an example of:
    9·1 answer
  • Which statement is true about hacking?
    11·2 answers
  • How to make a website
    15·2 answers
  • During an election year, why would a senator want to determine a mode?
    11·1 answer
  • Limitations of systems analysis and design​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!