1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
10

A computer is performing a binary search on the sorted list of 7 numbers below.

Computers and Technology
2 answers:
suter [353]3 years ago
6 0

Answer:

The answer is "Option D".

Explanation:

Binary search is also an efficient mechanism for only a sorted item list. It separates the element into one half of the checklist repeatedly, till you have narrowed it down to the only single place.

In this search, the number of comparisons is much more efficient than in the series to use the binary search approach, the items also should be shown, that's why the last choice is correct.

zhenek [66]3 years ago
6 0

Answer:

B

Explanation:

Binary search will start in the middle of the list, find which side the value is at, then look at the middle of those values.  This is incredibly efficient for larger values (Although it needs to be sorted) and practical in many instances.  Let's say that the desired number is 1, the binary search would look at "50" first, then proceed to compare with "5" and finally on it's third iteration, pick 1.

You might be interested in
An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the req
Ronch [10]

Answer:

applications

Explanation:

In an information system, applications or software are indispensable. This is because the entire data/info processing pipeline running on daily basis have been digitized. Users are heavily rely on the applications to gain and store new data, to manage and process the data and to deliver the necessary output. The applications enable the entire data processing work become more efficient, systematic and also more secure.

7 0
3 years ago
Two fingers are assigned to six letters each. What fingers are they?
Lena [83]

Answer:

The left and right index finger

Explanation:

Left index finger: R, T, F, G, C, V

Right index finger: Y, U, H, J, B, N

8 0
3 years ago
A spreadsheet is an interactive computer program used for
aksik [14]
Making charts, files that need complicated calculations
5 0
3 years ago
Various types of mouse pointer<br>​
g100num [7]

Answer:

Text Pointer

Busy Pointer

Link Pointer

Precision Pointer

Standard Pointer

Help Pointer

Background Busy Pointer

4 0
2 years ago
Ranges of IP address that anyone can use for their internal networks are known as ______.
Rama09 [41]
Since no answer choices, have to deduce it is Private Networks
8 0
3 years ago
Read 2 more answers
Other questions:
  • Helllllp: Virtual private networks require a secure remote connection.<br> True or False?
    10·2 answers
  • . String literals are surrounded by _____ quotes
    14·1 answer
  • Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.
    11·1 answer
  • a(n) ___ loop allows you to cycle through an array without specifying the starting and ending points for the loop
    14·1 answer
  • What does it mean when a computer can't break the rules
    10·2 answers
  • BUURTAIS
    7·1 answer
  • Please help it’s timed
    5·1 answer
  • Which one is the result of the output given by a compute
    15·2 answers
  • WILL GIVE BRAINLIEST!!! Danielle is warehouse supervisor for a large shipping company. Most shipments need to leave the warehous
    7·1 answer
  • True or false. The send e-mail feature, listed under tools, will allow you to send an e-mail to your instructor and to fellow st
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!