1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
konstantin123 [22]
4 years ago
10

Implements the sequential search method that takes and array of integers and the item to be search as parameters and returns tru

e if the item to be searched in the array, return false otherwise
Computers and Technology
1 answer:
Andrew [12]4 years ago
6 0

Answer:

// here is code in java.

import java.util.*;

// class definition

class Solution

{

   // function to perform sequential search

  public static boolean item_search(int [] arr,int k)

  {

      boolean flag=false;

      for(int a=0;a<arr.length;a++)

      {

       // if item found then return true,else false

          if (arr[a]==k)

          {

              flag=true;

              break;

          }

      }

      return flag;

  }

   // main method of the classs

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // variables

       int size,item;

 // scanner object to read input from user

Scanner scr=new Scanner(System.in);

//ask user to enter size

System.out.println("size of array:");

 // read the size of array

size=scr.nextInt();

 // create an array of given size

int inp_arr[]=new int[size];

System.out.println("enter the elements of array:");

 // read the elements of the array

for(int x=0;x<size;x++)

{

    inp_arr[x]=scr.nextInt();

}

System.out.println("enter the item to search:");

 // read the item to be searched

item=scr.nextInt();

 // call the function with array and item as arguments

System.out.println(item_search(inp_arr,item));

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read the size of array.Then create an array of the given size.Read the elements of the array.Then read the item to be searched.Call the method item_search() with array and item as arguments.Here check all the elements, whether the item is equal to any of the element of array or not.If any element is equal to item then method will return true otherwise return false.

Output:

size of array:5

enter the elements of array:3 6 1 8 9

enter the item to search:8

true

You might be interested in
A canister is released from a helicopter 500m above the ground. The canister is designed to withstand an impact speed of up to 1
Lisa [10]

Answer:

a) h = 1/2 gt² b) 99 m/s c) 14.1 m/s

Explanation:

a) As the only force acting on the canister once released is gravity, as it is constant, we can use one of the kinematic equations, as follows:

h = h₀ + v₀t + 1/2a t²

As we are told that the canister is simply released, it means that v₀ =0.

If we choose the direction of the acceleration (downward) as positive ,and we select the height at which it was released as our origin, so h₀ =0, the final expression for height is as follows:

h = 1/2 g t²

b) Combining this equation with the expression of t, from the definition of acceleration as the rate of change of velocity, we arrive to this expression:

vf² - v₀² = 2 g h  

As v₀ = 0, we have v₀ = √2.g.h = √2.9.8.500 m²/s² = 99 m/s

c) In order to be able to break the canister, impact speed must be larger than 100 m/s.

So, we can use the same equation as above, putting vf=100 m/s, and solving for v₀, as follows:

v₀² = vf² - 2.g.h = 100² m²/s² - 2.9.8.500 m²/s² = 200 m²/s²

v₀ = √200 m²/s² = 14.1 m/s

For any value of v₀ just barely larger than this, the canister will be broken.

7 0
3 years ago
Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. the server is run
polet [3.4K]
If an attacker can see transmitted packets, they will be able to see login credentials and be able to log in to the server. Additionally, the sensitive data in the file will be visible to the attacker. A better way would be to transfer the file using sftp or tftp.
4 0
3 years ago
NO THIS ISNT ANY HOMEWORK!
IRISSAK [1]

Answer:

you can run minecraft on virtually anything with the lowest settings and optifine, as long as you dont use shaders or beefy texture packs

Explanation:

4 0
3 years ago
Read 2 more answers
Which type of software is primarily used to organize a collection of information for easy access?
weeeeeb [17]
Database - you could also use a spreadsheet but you can't ask questions that you can with a database
4 0
3 years ago
David bought 5.2 pounds of oranges for $1.20 per pound . how much did david spend ..............................................
Tcecarenko [31]

Answer:

David spent $6.24.

Explanation:

5.2 times 1.2

3 0
3 years ago
Other questions:
  • What was the treaty of the Meter
    13·1 answer
  • Megan has written the following rough draft for her assignment. Choose the correct way to complete each sentence. Sarah is creat
    13·1 answer
  • Using computers in place of paper to design components, products, and processes is referred to as ______.
    11·1 answer
  • Which shape denotes a process to be carried out in a flowchart?
    7·2 answers
  • B. What is a window?​
    8·2 answers
  • Write a program in Cto define a structure Patient that has the following members
    12·1 answer
  • Draw any five (5) basic symbols used for flowcharting
    14·1 answer
  • A. Fill in the blanks:
    6·1 answer
  • Try my game? https://scratch.mit.edu/projects/589314237
    13·2 answers
  • Different the policies and protocols in the industry
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!