1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr Goodwill [35]
3 years ago
8

If you have an array of 100 sorted elements, and you search for a value that does not exist in the array using a binary search,

approximately how many comparisons will have to be done?
a)7


b)100


c)50
Computers and Technology
1 answer:
Juli2301 [7.4K]3 years ago
7 0

Answer:

50

Explanation:

as binary search will search the array by dividing it into two halves till it find the value.

You might be interested in
A location in memory used for storing data and given a name in a computer program is called a because the data in the location c
Gekata [30.6K]
Variable

----------------------------------
6 0
4 years ago
When advertising on search engines, if you bid the same as your competitor, having a higher quality score will mean you appear w
Ksju [112]
Higher than your competitors
7 0
2 years ago
11. What are the two DFS models?12.When you move a file from the Spreadsheets folder to the Corp Documents folder on a Windows S
Vesnalui [34]

Answer/Explanation:

11. Standalone and Domain-based models

12. The moved file takes with it the permission it had in the Spreadsheets folder.

Cheers.

7 0
3 years ago
The sum of these 9 numbers is 36. 2, 2, 6, 2, 1, 8, 7, 5, 3 What is the mean of these 9 numbers?
fiasKO [112]

Answer:

4

Explanation:

The mean is the sum divided by the count of numbers, so 36/9 = 4

6 0
2 years ago
Read 2 more answers
Which of the following forces all traffic, communications, and activities through a single pathway or channel that can be used t
Ad libitum [116K]

Answer:

Option b. Choke point

Explanation:

In firewall, a choke point can be defined as a single point which allows all of the network traffic including incoming and outgoing to be funneled. As the passage of the whole traffic through the choke point regulates the flow as it focus monitoring  and controls bandwidth consumption, provides authentication, control efforts like Internet firewalls.

7 0
3 years ago
Other questions:
  • 2. You have classes to represent different shapes (see below). You realize you can benefit from inheritance and polymorphism by
    13·1 answer
  • How to revert a dismissed javascript popup alert box in chrome?
    5·1 answer
  • A collection of information stored in an electronic format that can be searched by a computer.
    14·1 answer
  • Unix is called a(n) ___________ operating system because it can run on a desktop pc or a server. operating systems installed on
    7·1 answer
  • Let’s say you’re publishing a message with the Hootsuite Composer. The message contains a link to a landing page, and you want t
    9·1 answer
  • Give an O(log m + log n)-time algorithm that takes two sorted lists of sizes m and n, respectively, as input and returns the ith
    7·1 answer
  • Write the definition of a function named fscopy. This function can be safely passed two fstream objects, one opened for reading,
    11·1 answer
  • Question # 5
    6·1 answer
  • Assume the user responds with a 3 for the first number and a 4 for the second number.
    13·1 answer
  • What is the difference between turn-based game mode and point-based game mode?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!