1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
2 years ago
12

I need help. People who know computer science. I have selected a word from the first 1000 words in my dictionary. Using the bina

ry search algorithm, how many questions do you have to ask me to discover the word I have chosen?
a. 8 b. 10 c. 12 d. 14
Computers and Technology
1 answer:
Rudiy272 years ago
8 0

Answer:

14

Explanation:

You might be interested in
What does this say in morse code?
Furkat [3]

Answer:

That it is time for lunch?

Explanation:

4 0
3 years ago
Read 2 more answers
Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
Galina-37 [17]
<span>The statement that IPv6 includes a native information security framework (IPsec) that provides both data and control packets is false.
</span>IPSec is a mandatory component for IPv6, and is used to natively protect IPv6 data <span>as it is sent over the network,. and not control packets.
</span>The IPv6 IPSec is a set of Internet standards that uses cryptographic security services to provide confidentiality ,data origin authentication and data integrity<span>
</span>

5 0
2 years ago
When changing passwords, at least how many characters must be changed from the previous password?
frosja888 [35]

As we change password when

1. we forgot the previous password.

2. when the previous password is leaked due to some reasons.

In case 1 we can change the password to the same as well with no change the problem will be solved but for case 2 at least one or for more safety all characters should be changed.

8 0
3 years ago
Kayla is working on a document for her business meeting. She wants to save this document with another name. Which option should
Fittoniya [83]
Kayla could use “save as” to rename the document.
5 0
2 years ago
Which type of basic building blocks (constructs) is the following algorithm?
Ksju [112]

Answer:

Sequence

Explanation:

6 0
2 years ago
Other questions:
  • What is another name for “low-angle lighting”?
    7·1 answer
  • Assume that we would like to expand the MIPS register file to 128 and keep the size of all other fields as in the original MPIS
    7·2 answers
  • Mary, Tim, John, and Jenn each sold three million dollars worth of product within six months. Each month one of them was awarded
    12·2 answers
  • Short Essay on the history of Computer​
    6·2 answers
  • The process known as "bitmapping" is defined as information in _____. PLEASE HELP FAST
    11·1 answer
  • Which three techniques are used in this photo
    12·1 answer
  • About C header files of C programming
    8·1 answer
  • What is the full form of EPROM (CLASS-6)
    6·2 answers
  • HW2.24. Statement: Area of a Triangle The area of a triangle can be computed by knowing the base and height of the triangle usin
    11·1 answer
  • The _____ layer addresses how the software will execute on specific computers and networks.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!