1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
konstantin123 [22]
2 years ago
6

A time stamp indicates the date and time that a measurement was taken. A data scientist has a list containing 10,000 time stamps

, sorted in chronological order. Which of the following is closest to the maximum number of values that will need to be examined when performing a binary search for a value in the list?.
Computers and Technology
1 answer:
snow_tiger [21]2 years ago
3 0

Binary search involves searching a sorted list

The number of values that will be examined is 15

<h3>How to determine the number of examined values</h3>

The equation that calculates the number of values that will be examined is:

2^{n -1} = N

Where n represents the number of values to examine and N represents the number of time stamps

So, we have:

2^{n -1} = 10000

Take the log of both sides

\log(2^{n -1}) = \log(10000)

Apply the laws of logarithm

[n - 1]\log(2) = 4

Divide both sides y log(2)

n - 1 = 13.2

The next integer greater than 13.2 is 14.

So, we have:

n - 1 = 14

Add 1 to both sides

n = 15

Hence, the number of values that will be examined is 15

Read more about binary search at:

brainly.com/question/20411780

You might be interested in
Martha is a network monitoring technician working on a firewall for her company’s network. To filter traffic going through the f
tia_tia [17]

Answer:

D

Explanation:

Not much of a tech person, but protocol then firewall seems the most reasonable.

7 0
3 years ago
Read 2 more answers
What is the best java 3d modeler library?
LenaWriter [7]
I believe its "Thinking Universe"
5 0
3 years ago
What is Dailymotion Cloud on the Dailymotion site?
lana [24]
C, a video solution that is adaptable to the users storage space
4 0
3 years ago
Read 2 more answers
These operating systems were referred to as command-based.
Doss [256]

{\underline{\boxed{\bf{MS - DOS \:  and \:  UNIX}}}}

3 0
2 years ago
Read 2 more answers
A(n) ____________________ is a hardware device or software utility designed to intercept and prevent unauthorized access to a co
sesenic [268]

Answer:

hardware device

Explanation:

4 0
3 years ago
Other questions:
  • What are the pros and cons of editorial anonymity in Wikipedia
    10·2 answers
  • Cuales Son las características de la máquina analítica de Carlos Babbage ?
    11·1 answer
  • When a bank account pays compound interest, it pays interest not only on the principal amount that was deposited into the accoun
    15·1 answer
  • The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center v
    5·1 answer
  • The signature of a function is determined by
    5·1 answer
  • Given the following while() loop, which statement is true assuming A,B,C,D are int variables and A &gt; B? while ( ( A &gt;= B)
    8·1 answer
  • In addition to the decimal number system, the number systems used most often in PLC operationand programming are ________.
    9·1 answer
  • 3. Which swim_backwards method is called when sammy.swim_backwards() is executed? Why?
    8·1 answer
  • Use HTML and CSS, create a web page for the table shown below. Please copy (and paste) your code from your text editor (Replit).
    10·1 answer
  • Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!