1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erik [133]
3 years ago
12

HELP! Answer to question 2?

Computers and Technology
1 answer:
Vesnalui [34]3 years ago
4 0
One advantage of Binary Search Algorithm: 
Compared to Linear search it is much faster because linear search starts its searching right from the first value but binary searches for something by splitting the array in two again and again and again. 

One disadvantage of Binary Search Algorithm:
Have to be sorted, unlike linear search that doesn't have to be. 
You might be interested in
Please explain what steps you will take to prevent hackers from getting access to your personal information.
yuradex [85]
The steps I would take are 1. Making a strong password with symbols and numbers. 2. I will set up a 2 way authentication ther for if someone would be trying to hack me I would get an alert in order to stop the attempt. 3 I will not use the same password each time.
4 0
3 years ago
The chart shows an example of a study-time survey. Students can use the formula shown in the survey to figure out ways to track
LUCKY_DIMON [66]
<span>how many hours they can work on a project.</span>
3 0
3 years ago
15 POINTS! please help
Maksim231197 [3]

Answer:

1. Understand your audience

2. Add a header

3. Put a face to the name

4. Write a professional headline

5. Be contactable

6. Summarize your story

7. Showcase your experience

8. Let your network speak for you

Hoped this helped

8 0
3 years ago
Read 2 more answers
Layer 3 of the Transmission Control Protocol/Internet Protocol (TCP/IP) is called the Internet Layer. Describe the functions of
attashe74 [19]

Answer: Internet layer in TCP/IP stack is used for the transmitting and exchanging of information or message between the source and destination in computer systems.The main functions performed by this layer are as follows:-

  • It  transfers the message to the network interface layer
  • The correct information route and destination is established
  • Prefers intelligent routing technique by choosing the shortest route among all paths
  • If any error case of transmission arises then another alternate path for datagram transmission is used.

7 0
3 years ago
In linux ext file systems, a files data block addresses/numbers are stored in
MariettaO [177]
I think the answer is the superblock
4 0
3 years ago
Other questions:
  • What is an example of constructive criticism for an employee who frequently arrives late?
    10·2 answers
  • What component of a motherboard is not considered to be a field replaceable unit?
    12·1 answer
  • Pls help me!!!!!!!!!!!!!
    5·2 answers
  • man who is colorblind marries a woman who has normal color vision and is not a carrier of color blindness. If this couple has a
    15·1 answer
  • A _____ is usually a smaller version of a data warehouse
    7·1 answer
  • Write a summary of five things that you learned about CSS. Do not copy and paste the information. Summarize each point in your o
    5·1 answer
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
  • What is the main function of the output on a computer or what is it use for? ​
    15·2 answers
  • How do i unblock a website on a school computer if a school blocks it?
    5·1 answer
  • Disadvantages of the divisional organization structure are _____. each division is able to operate independently from the parent
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!