1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
3 years ago
6

We would say that Binary Search: a. Runs in O(lg(n)) time because it will cut the list size in half for each iteration. b. Runs

in O(n2 ) time, because for each element in the list we have to scan the rest of the list to ensure there are no duplicates. c. Runs in O(n) time since it has to scan the entire list. n is the length of the list, so it is the total runtime.
Computers and Technology
1 answer:
dimaraw [331]3 years ago
5 0

Answer:

The answer is "Option c".

Explanation:

A analyze the process which finds the location of the desired value within the same given list is also called a quarter, linear interpolation search.

  • Suppose the length of the array is = n
  • Search space is cut in half at every iterator, so array at the first iterative process is= 2
  • Size in second iteration is = 22
  • In the third iteration size = u 25
  • In Kth point iteration the size is = n2k  
  • divide the value by k the length of the array will be 1.

   => \frac{n}{2k} = 1\\ \\=> n= 2k \\\\\ Taking \ \log \ both \ side \\\\=> log n = log 2k \\\\=> log2 (n) = k log \frac{2}{2} \\\\=> k = log2 (n)  \ \ \ \ \ \ \ \sin log \frac{2}{2} = 1 \\\\=> O(lg(n))

You might be interested in
Named constants should be used when they serve to improve readability and understanding. T or F
prisoha [69]
The answer is true.

Let's say we are calculating the volume of a grain silo where the the width is a constant, but the height can be changed.

In our code we would calculate the volume using something like:

PI * (WIDTH / 2)^2 * height

The variables in all caps would be named constants. Using them makes the code more readable to other people than if we were to just use their values like:

3.14 * (145.75 / 2)^2 * height




8 0
3 years ago
Read 2 more answers
Sergio knows that to meet the project requirements, it is essential to have
zhenek [66]

Answer:

I need a better explanation??

4 0
3 years ago
Six security issues and six descriptions are shown below.
Trava [24]

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question contains six securities terms and definitions.

The goal of this question is to properly map the term to its correct description/definition.

You can find the complete mapping in the attached image.

7 0
3 years ago
What three values must be added to the ipv4 properties of a nic in order for a computer to have basic connectivity with the netw
Y_Kistochka [10]
1. The IP address

2. Subnet mask

3. Default gateway address

It’s values should be added to the NIC properties in order for the computer to have basic network connectivity. This can be done either statically or dynamically with DHCP. An additional value that should be present if the computer is to be used to connect to the Internet is the DNS server value. A computer automatically attempts to locate a DHCP server if configured to do so. A DHCP server address is not used. Finally, NAT is configured on a router, not on a computer host, and speed and duplex settings are NIC hardware settings and not IPv4 properties of the NIC.
8 0
2 years ago
Marlene is using context clues to better understand the book she is reading. After reading around unfamiliar words and checking
Zigmanuir [339]

Answer: The correct answer is to look up the unfamiliar words in a dictionary or online.

Explanation: When using context clues to better understand reading, Marlene will first read around the unfamiliar words, looking for clues before and after the unfamiliar words. If she still does not know the meaning of an unfamiliar word her next step is to look up the word in a dictionary or online.

5 0
3 years ago
Read 2 more answers
Other questions:
  • How would you describe enterprise computing
    12·1 answer
  • I would A lot of knowledge and education for computers and <br> Technology
    10·2 answers
  • You are going to be installing a videoconferencing system. One of the requirements of the system is that only workstations that
    10·1 answer
  • What appears in the document after you have inserted a video?
    14·2 answers
  • What is transaction model?
    9·2 answers
  • If none of the contacts of a manual switch change status when the operator is activated, what is the most probable cause?
    9·1 answer
  • How fast is light? person that answers this will get points ​
    12·1 answer
  • python (Business: check ISBN-10) An ISBN-10 (International Standard Book Number) consists of 10 digits: d1d2d3d4d5d6d7d8d9d10. T
    12·1 answer
  • How does white balancing affect the images recorded by a camera?
    15·1 answer
  • What is the purpose of heading tags?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!