1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
konstantin123 [22]
2 years ago
6

A time stamp indicates the date and time that a measurement was taken. A data scientist has a list containing 10,000 time stamps

, sorted in chronological order. Which of the following is closest to the maximum number of values that will need to be examined when performing a binary search for a value in the list?.
Computers and Technology
1 answer:
snow_tiger [21]2 years ago
3 0

Binary search involves searching a sorted list

The number of values that will be examined is 15

<h3>How to determine the number of examined values</h3>

The equation that calculates the number of values that will be examined is:

2^{n -1} = N

Where n represents the number of values to examine and N represents the number of time stamps

So, we have:

2^{n -1} = 10000

Take the log of both sides

\log(2^{n -1}) = \log(10000)

Apply the laws of logarithm

[n - 1]\log(2) = 4

Divide both sides y log(2)

n - 1 = 13.2

The next integer greater than 13.2 is 14.

So, we have:

n - 1 = 14

Add 1 to both sides

n = 15

Hence, the number of values that will be examined is 15

Read more about binary search at:

brainly.com/question/20411780

You might be interested in
Which of these tools stick to the edge of an image, thus making it easy to select the shape of an image (adobe Photoshop)
elena55 [62]

Answer:

Number 2 Polygonal lasso tool

Explanation:

5 0
3 years ago
Which architecture for deploying a firewall is most commonly used in businesses today? Why?
zmey [24]

Answer:Screened Subnet Firewall

Explanation:Screened Subnet Firewalls is the firewall deploying mechanism that is used at the present time in the organizational area.It is used as because it is supposed to be a good option as it protects the networks and DMZ operating system from any kind of virus that can damage the connection. It works as the security section and protects the system.

8 0
4 years ago
Set-In-Order includes making changes to the layout of the area.A) TrueB) False
Bogdan [553]

Answer:

A) True

Explanation:

Set-In-Order is part of a 5S system approach of making a workplace to be well arranged so there will be smooth operation of employees and working conditions.

Set-In-Order specifically deals with entities in the workplace apparently labeled after being well arranged in their respective places.

Hence, it is TRUE that Set-In-Order includes making changes to the layout of the area.

7 0
3 years ago
What type of software repairs or improves a larger application that is already installed on a system?
earnstyle [38]

Answer:

<h2>Mapping</h2>

Explanation:

<h2>Hope it helps you</h2>
7 0
3 years ago
Read 2 more answers
What is storage unit in computer and five examples of storage units.<br>​
Juliette [100K]

Answer:

the storage unit of a computer is known as the term which is used to indicate storage capacity.

Explanation:

Five units of storage units are:-

1) byte

2) kilobyte

3) megabyte

4) gigabyte

5) terabyte

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is something that all computer models use in their calculations?
    12·1 answer
  • What happens if you move unencrypted files into an encrypted folder?
    5·1 answer
  • Reggie has hired you to design a home network. The home network will share a printer but will mainly be used to stream movies to
    7·1 answer
  • Chat messages are most likely to be found where on a computer? firewall nic internet history ram
    7·1 answer
  • Plz help meeeeee QUICKLY!!! WORTH 15 POINTS!
    15·1 answer
  • There is an application which inputs hundred numbers from the user, if user enters a positive number it increments valid numbers
    6·1 answer
  • With the range E2:E30 selected, create a new conditional formatting rule that uses a formula to apply yellow fill and bold font
    10·1 answer
  • Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his ma
    7·1 answer
  • The different generation of computer explain in breif?​
    7·2 answers
  • 10. Two technicians are discussing recycling specifications for refrigerant. Technician A says that refrigerant oil with 5,000 p
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!