1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
3 years ago
14

Consider the binary search tree constructed for the words oenology, phrenology, campanology, ornithology, ichthyology, limnology

, alchemy, and astrology using alphabetical order. Find the number of comparisons needed to locate or to add each of the following words in the search tree, starting fresh each time:
a. palmistry
b. etymology
c. paleontology
d. glaciology
Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
7 0

Explanation:

Binary Search Tree is also called ordered tree or sorted binary tree. In the tree each node contains smaller values in the left side of the subtree and larger values in the right side of  the subtree.

You might be interested in
How does a hard drive
stealth61 [152]
Your answer is incomplpete<span>Native Americans have lived there for thousands of years, long before ... On July 4, 1776, people from the thirteen colonies created the United States ... In the early 1800s, the new nation faced many controversial issues, such as slavery ..... the United Stateswould not become involved in a war the two countries were fighting ...</span>‎Pre-Columbian America - ‎Colonial America - ‎<span>American Revolution</span>
8 0
4 years ago
Explain how a message is transmitted from one computer to another using layers.
nevsk [136]
I need some answer chouices but they use iphones
7 0
3 years ago
Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
Margaret [11]

Explanation:

A.)

we have two machines M1 and M2

cpi stands for clocks per instruction.

to get cpi for machine 1:

= we multiply frequencies with their corresponding M1 cycles and add everything up

50/100 x 1 = 0.5

20/100 x 2 = 0.4

30/100 x 3 = 0.9

CPI for M1 = 0.5 + 0.4 + 0.9 = 1.8

We find CPI for machine 2

we use the same formula we used for 1 above

50/100 x 2 = 1

20/100 x 3 = 0.6

30/100 x 4 = 1.2

CPI for m2 =  1 + 0.6 + 1.2 = 2.8

B.)

CPU execution time for m1 and m2

this is calculated by using the formula;

I * CPI/clock cycle time

execution time for A:

= I * 1.8/60X10⁶

= I x 30 nsec

execution time b:

I x 2.8/80x10⁶

= I x 35 nsec

6 0
3 years ago
A _______ is smaller than a notebook or laptop and has a touchscreen and sometimes a pointing device.
inysia [295]
Tablet (such as iPad, surface), smart phone (such as iphone7 plus and samsung S8)
6 0
4 years ago
Late at night, some traffic signals change patterns and become _____.
Dimas [21]

Answer:

combined in color.

Explanation:

It's because the modern traffic signals are controlled by the computers, and they are programmed to display different signals for different times of day, night, days of week and holidays etc.

6 0
3 years ago
Read 2 more answers
Other questions:
  • You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
    6·1 answer
  • List and describe the issues that lead to making a successful website?​
    9·1 answer
  • If you want to add text in an area of a slide where a content placeholder is not located, you can insert a(n) _______________.
    7·1 answer
  • Which line of code will print I can code on the screen?
    13·1 answer
  • A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the contro
    9·1 answer
  • If the floating-point number representation on a certain system has a sign bit, a 3-bit exponent, and a 4-bit significand. What
    8·1 answer
  • The function of network switch is to _____.
    5·1 answer
  • Ok for whoever answers this, Ill wager 20 points...
    11·2 answers
  • Project: Design and Development Research Project
    14·1 answer
  • The packet storm web site includes a large collection of packaged shellcode, including code that can:_____.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!