1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
5

A large number of genetic codes are stored as binary values in a list. Which one of the following conditions must be true in ord

er for a researcher to obtain the correct result when using a binary search algorithm to determine if a given genetic code is in the list?
A. The genetic codes must be converted from binary to decimal numbers.
B. The list must be sorted based on the genetic code values.
C. The number of genetic code values in the list must be a power of 2.
D. The number of genetic code values in the list must be even.
Computers and Technology
2 answers:
Bad White [126]3 years ago
3 0

Answer:

D

Explanation:

grandymaker [24]3 years ago
3 0

Answer:

D

Explanation:

You might be interested in
Write a recursive method called lengthOfLongestSubsequence(a, b) that calculates the length of the longest common subsequence (l
kompoz [17]

Answer:

Explanation:

The following code is written in Java and creates the recursive function to find the longest common substring as requested.

 static int lengthOfLongestSubsequence(String X, String Y) {

       int m = X.length();

       int n = Y.length();

       if (m == 0 || n == 0) {

           return 0;

       }

       if (X.charAt(m - 1) == Y.charAt(n - 1)) {

           return 1 + lengthOfLongestSubsequence(X, Y);

       } else {

           return Math.max(lengthOfLongestSubsequence(X, Y),

                   lengthOfLongestSubsequence(X, Y));

       }

   }

4 0
3 years ago
The Mark Table of Contents Entry option is used for marking nonheading text for the table of contents. the options are manually
enyata [817]

Answer:number 1

Explanation:asian culture

5 0
3 years ago
Read 2 more answers
Two fingers are assigned to six letters each. What fingers are they?
Lena [83]

Answer:

The left and right index finger

Explanation:

Left index finger: R, T, F, G, C, V

Right index finger: Y, U, H, J, B, N

8 0
3 years ago
You open a web page and log into your email. The traffic travels over many routers. What protocol will the routers use to determ
exis [7]

Answer:

Border Gateway Protocol is a protocol the routers use to determine the most optimal path to forward the traffic.

Explanation:

BGP is a path vector protocol which chooses the most optimal path. The protocol decides core routing decisions based on path, configuration and network.

This protocol gives all the notification about the status of the connection and router.

It is used to routing in an autonomous system and provides ways to measure the effectiveness of configuration.

6 0
3 years ago
Who is the father of computer ethics?​
IRINA_888 [86]

Answer:

<h3>Donn Parker Of SRI is the father of computer ethics.</h3>

Explanation:

Donn Parker of SRI, who is credited with being the "father of computer ethics" due to his interest during the 1960's with ethical concerns related to the newly emerging information technologies, defines computer ethics as the application of classical ethical prin- ciples to the use of computer technology 

3 0
3 years ago
Other questions:
  • Jason is creating a webpage on the basic parts of a camera. He has to use a mix of both images and content for the web page to h
    11·1 answer
  • If you press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter
    10·1 answer
  • If a website ends with .gov does it mean that its written by the government or?
    11·2 answers
  • Create a program that includes a function called toUpperCamelCase that takes a string (consisting of lowercase words and spaces)
    9·1 answer
  • Microsoft’s SharePoint server product dramatically altered the content and records management (RM) markets. Crocker (2015), edit
    6·1 answer
  • Why was Apple the best company of 2019??
    15·2 answers
  • BADM-Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this cou
    7·1 answer
  • What is the cpu used for
    6·1 answer
  • What is the role of computer in modern problem solving​
    13·1 answer
  • I have a top-secret recipe for the greatest cookie dough I have made and I want to keep the recipe a secret so I apply for a? *
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!