1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
2 years ago
6

How many passes will it take to find 30 using a binary search?

Computers and Technology
1 answer:
dimulka [17.4K]2 years ago
7 0
Just wanna let you know I could be wrong but I think 4 passes
You might be interested in
An initialization expression may be omitted from the for loop if no initialization is required.
stealth61 [152]

Answer:

True

Explanation:

for loop is used to repeat the process again and again until the condition not failed.

syntax:

for(initialize; condition; increment/decrement)

{

    Statement

}

But we can omit the initialize or condition or increment/decrement as well

the syntax after omit the initialization,

for( ; condition; increment/decrement)

{

    Statement

}

The above for loop is valid, it has no error.

Note: don't remove the semicolon.

You can omit the condition and  increment/decrement.

and place the semicolon as it is. If you remove the semicolon, then the compiler show syntax error.

5 0
3 years ago
When creating a user generated function, what procedure is followed?
marin [14]

When creating a user-generated function, what procedure is followed d) all of the above.

<h3>What are the three factors of user-described characteristic?</h3>

A user-described characteristic has 3 essential additives which might be characteristic declarations, characteristic definition and characteristic called.

The characteristic prototypes are used to inform the compiler approximately the variety of arguments and approximately the specified datatypes of a characteristic parameter, it additionally tells approximately the go-back kind of the characteristic. By this information, the compiler cross-assessments the characteristic signatures earlier than calling.

Read more about the prototype :

brainly.com/question/7509258

#SPJ1

6 0
2 years ago
Answer the following Python Interview questions • How is Python an interpreted language? • What is the difference between Python
8_murik_8 [283]

Answer:

1. Python is called as interpreted language. However as a programming language it is not fully compiled nor interpreted language. Python program runs from direct source code which makes it byte code interpreted.

An Interpreter is the one which takes the code and performs the actions specified in the code. It turns the code into intermediate language which is again translated to machine language understood by the processor. Interpreted or compiled are the property of the implementation and not of the language.

2. Array : It is a collection of same data type elements stored at contagious memory location. It is handled in python with module array. All the elements of array must be of same data type. In order to manipulate same data types arrays are used.

Ex: array1 = a.array ('i', [10, 20, 30]) this is a array of integer type.

Lists : Python lists are ordered data structure and are like non homogeneous dynamic sized arrays. It may contain integers, strings, boolean, or objects.

Ex: List1 = [70, 89, 98] , List2 = ["Rose", "Lilly", "Jasmine"]

List3 = [1, 10, 100, 'Test', 'Test1']

Tuple : It is a collection of objects separated by commas and they are immutable. It is static which makes them faster.

Ex: tupule1 = ('element1', 'element2')

List and Tuple in Python are the class of data structure. The list is dynamic, whereas tuple has static characteristics.

Lists are mutable but tuples are not.

tuples are mainly used to access the elements where as lists are used in operations like insertion and deletion.

Iterations are time consuming in list where as it is faster in tuples.

tuples don't have inbuilt methods but list has many builtin methods.

tuples takes slightly less memory that lists in Python

Records: Records data structure will have fixed number of fields and each field may have a name and different type. Immutable records are implemented using named tuple.

3. Syntax of slice in python is list[<start>:<stop>:<step>] and it can be used on tuples and lists.

so X [::-1] means that it will start from the end towards the first element by taking each of the elements.

for ex: X = '9876'

X [::-1] will result in '6789'.

Means it will reverse all the elements in the array.

4. Items of list can be shuffled with the random.shuffle() function of a random module.

Syntax is : random.shuffle(x, random)

x- It is a sequence to shuffle and can be list or tuple.

random- it is a optional argument which returns random float number between 0.1 to 1.0.

5. range() – Range function returns a range object which is a type of iterable object.

xrange() – xrange function returns the generator object that can be used to display numbers only by looping. Only particular range is displayed on demand and hence called “lazy evaluation“.

• Return type of range () is range object whereas that of xrange() is xrange object.

• Variable to store the range using range () takes more memory but xrange takes comparative less memory.

• Range returns the list but xrange returns the xrange object. Hence operations on list can be applied for range but not on xrange.

• Xrange is faster to implement than range as xrange evaluates only generator objects.

• Xrange is depreciated in Python 3 and above.

For ex :

x = range (10, 100)

y= xrange (10, 100)

#To know the return type we can print it

print ( return type of range () is : “)

print (type (x))

print ( return type of xrange () is : “)

print (type (y))

Output will be list and xrange respectively.

6. NumPy's arrays are more compact than Python lists

reading and writing items is also faster with NumPy.

Memory taken by python lists are way higher than NumPy arrays.

Python lists don’t support vectorized operation.

Since lists can contain objects of different types its type information must be stored and executed every time operation is performed on it.

Memory taken by python lists are a lot higher than that of NumPy Arrays.

Reading and writing of elements in NumPy arrays are faster than lists.

NumPy arrays are compact and accumulate lesser storage.

Numpy is convenient and efficient.

For ex :

Metrics operations are easy in NumPy.

Checkerboard pattern can be done using NumPy.

7. Attached as Image

8. split() method returns a list of strings after breaking the given string by the specified separator. It is splitting of string into list with each word is a list item.

Syntax : str.split ( separator, maxsplit)

Separator : its is delimiter used and by default whitespace is used as separator.

Maxsplit : Maximum number of times to split the string. By default it has no limit.

For ex:

text = 'apples and oranges are different '

print(text.split())

output will be : ['apples', 'and', 'oranges', 'are', 'different' ]

Explanation:

7 0
3 years ago
Overview: For the final project in this course, you will assume the role of a training manager at a cybersecurity firm needing t
Free_Kalibri [48]

<u>Solution and Explanation:</u>

<u>INTRODUCTION </u>

A) Introduction Cybersecurity should be a priority for all businesses so that they can protect their information systems and data assets. Organizations all over the world have been experiencing cyber-attacks. Types of cybercrime include identity theft, ransomware, denial of service attacks, botnets, phishing and social engineering (Khanse, 2014).

Cybersecurity threats exist from both external sources and from within a company. Cybersecurity issues will have impacted businesses financially to the tune of $6 trillion dollars per year worldwide, which is double the amount since 2013. Cybercrime is projected to be more profitable than the global illegal drug trade (Morgan, 2017). CyberLeet Technologies can safeguard businesses against these threats by strictly adhering to the core tenets of cybersecurity which are confidentiality, availability and integrity. CyberLeet will ensure these tenets by identifying vulnerabilities in client systems, implementing data security policies and utilizing threat detection monitoring.

B) Your Role at CyberLeet The role of an information security analyst at CyberLeet Technologies is to enforce the cybersecurity tenets of confidentiality, integrity and availability. This will be accomplished by performing risk assessments of its client’s software, hardware and networks. The analyst must plan and implement security measures to protect client systems, networks and data. Finally, the role includes helping the client engage in security awareness training for its employees (New England College, 2017). The CyberLeet information security analyst will perform job functions which uphold the basic tenets of cybersecurity. The analyst will perform vulnerability assessments of the client systems to ensure the cybersecurity principle of availability. He or she will monitor the client network and systems to safeguard the cybersecurity tenet of confidentiality. Also, the analyst will safeguard the cybersecurity tenet of integrity by protecting client data through the use of data encryption. Other tasks that will be performed include malware analysis, enhancement of security standards, and investigation and documentation of any security breaches. The ultimate goal of an information security analyst at CyberLeet Technologies is to uphold the cybersecurity tenets of confidentiality, integrity and availability by protecting its client systems’ assets, networks and data from cyberattacks.

C) Purpose of This Manual The purpose of this manual is to train new CyberLeet information security analyst recruits about their job duties. These duties include understanding that their client’s organization is subject to information security issues and the fundamental core cybersecurity tenets of confidentiality, integrity and availability must be applied to develop security measures (Henderson, 2017). These threat mitigation security measures include the development of cybersecurity policies including password policies, acceptable use policies, employee training policies, and basic user polices. It is imperative that information security analysts apply the principles and practices outlined in this manual and provide high-quality services to the client. Failure to do so could result in the client experiencing cyber-attacks ranging from malware, phishing, denial of service and ransomware (Khanse, 2014).

CORE TENENTS OF CYBER SECURITY

A) Confidentiality One of the core tenets of cybersecurity is confidentiality. Confidentiality is the preservation of private and proprietary information, such as customer data or health records. Only authorized users should be able access protected information, while unauthorized users should be blocked. Information security requires control on access to protected information (Henderson, 2017). An example of enforcing confidentiality includes the restriction of access to company assets and information via the use authentication and authorization techniques.

B) Integrity The core tenet of integrity is the guarding against improper modification of data or system information. Data integrity is maintained when information remains unchanged during storage, transmission and usage (Henderson, 2017). An example of maintaining system integrity is the prevention of malware which can corrupt computer files. An example of maintain data integrity is the proper encryption of data prior to transmission between systems, to prevent unauthorized access and manipulation.

C) Availability The core tenet of availability is the accessibility of users to systems and data. Availability is maintained when all components of the information system are working properly. Problems in the information system could make it impossible to access information, thereby making the information unavailable (Henderson, 2017).

 

8 0
3 years ago
Help please if you know answer like these I’ll provide my discord.
Natasha_Volkova [10]

ins can insert a time and date.

5 0
3 years ago
Other questions:
  • How do i protect my computer from electrical spikes
    14·2 answers
  • Class 00 rubber gloves are used when working with voltages less than​ _____.
    15·1 answer
  • Clicking on the sheet tab with the _______ adds another worksheet to an Excel file.
    9·1 answer
  • The major objective of this lab is to practice class and object-oriented programming (OOP), and separate files: 1. We will reuse
    5·1 answer
  • How is a technical certificate like a computer-related associate degree?
    12·2 answers
  • 5. Which of the following views is used to run a PowerPoint presentation?
    11·2 answers
  • Could someone please help?​
    10·1 answer
  • What is polymerization1​
    11·1 answer
  • Five uses of the operating system​
    10·2 answers
  • (iii) ............ characters can be stored in memo field. (a) 50 (b) 64000 (c) 255 (d) 200 ​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!