Let's assume there are 500 items in a sorted list. In the worst case, about how many checks would Binary Search make to find a target value

Answers

Answer 1

Answer:

500?

Explanation:

I'm assuming the search will either check from the beginning or the end. If the the item is the 499 and the search starts at 0 than it will do 500 checks right? Same way if the item is at index 0 and the search starts from the 499.


Related Questions

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.

Answers

Employee monitoring software is sometimes used in smaller business networks, but it is impractical for use in large business networks due to numerous users and the potential for misuse by these users.

An employee refers to an individual who is employed in a business organization by an employer of labor, so that he or she can perform specific tasks, duties or functions within the business organization while being paid an agreed amount of money as wages.

On a related note, an employee monitoring software can be defined as a software application (program) that is designed and developed for the surveillance of a workplace, in order to gather information about the locations and activities of the employees working in a particular business organization.

However, employee monitoring software are ideal or better suited for smaller business networks, but it is impractical for use in large business networks due to higher number of users and the potential for misuse by these users.

Read more: https://brainly.com/question/23986526

True or false: Most Brainly users are saltier than the ocean. If false, explain why.

Answers

Explanation:

btw I'm not salty........

File names should be limited to 144 characters.

true or false

Answers

Answer:

True.

Explanation:

For easier recalling of file names and quicker accessibility...

A cheerful teen willing to help,

who listens to "ROAR,"

stay salty...

Which term refers to a very notable exception to the safeness of Bluetooth that was discovered by a security company called Armis and published in late 2017.

Answers

Bluetooth devices are widely used today. BlueBorne refers to a very notable exception to the safeness of Bluetooth that was discovered by a security company called Armis and published in late 2017.

BlueBorne is known to be an airborne attack vector that often makes use of Bluetooth to aid an attacker to breakthrough and take complete control over targeted devices.

The attack often do not need the targeted device to be paired to the attacker's device or even set to discoverable mode

Bluetooth devices are said to be not visible until they are manually set to discoverable mode.

Learn more from

https://brainly.com/question/13718919

which shortcut keys can be used to duplicate a slide?

Answers

Answer:

Ctrl + D used to duplicate a slide

What connection method eliminates the need to provide a bank user name and password after the initial setup process

Answers

Based on the internet and networking process, the connection method that eliminates the need to provide a bank user name and password after the initial setup process is known as "OAuth."

This is because OAuth is a type of connection that allows users not to provide their bank username and password after initial setup.

OAuth is a common internet protocol known as an open standard for access delegation.

OAuth is utilized on web applications to allow users to log in without passwords.

Hence, in this case, it is concluded that the correct answer is "OAuth."

Learn more here: https://brainly.com/question/17079128

A _________ attack is an attack on a computer system or network that causes a loss of service to users.

Answers

Answer: Denial of Service

Explanation:

the term is self-explanatory

You have a Windows Vista workstation with a built-in network card. The card is intermittently malfunctioning. You install a USB network card and want to permanently disable the internal card to avoid any conflicts. Which administrative tool should you use

Answers

Answer:

Device Manager

Explanation:

try it yourself

press windows key + X

then click device manager

here you can right click anything and disable it

its easy its cake

have fun

A(n) _____ contains software components that are well documented and have a proven track record of working well together.

Answers

Considering the computer analysis, a Solution stack contains software components that are well documented and have a proven track record of working well together.

What is a Solution Stack?

Generally, a solution stack in computer science is a combination of different applications which function to solve the problem. The problems designed to solve may either be related or unrelated.

Different types of the solution stack

Various types of solution stacks are available in the computing world. Some of the solution stacks are:

Application stackServer stackStorage stackVirtualization stackWeb stack

Hence, in this case, it is concluded that the correct answer is "Solution stack."

Learn more about solution stack here: https://brainly.com/question/13480036

true or false computers in a LAN are most likely to be connected using infra red

Answers

Answer: false

Explanation:

The number represented by 20 hundreds blocks is 2,000. How many thousand
blocks represent the same number?

A 2000) b 20) c 2) d 1)

Answers

Answer:

2

Explanation:

First, divide 2000 by 20.

For your answer, you will get 100.

For the question, it asks that we replace the 100 by 1000.

So, what we will do is 2,000 divided by 1000 and we will get 2.

Therefore, 2 will be our answer.

-kiniwih426

What is the difference between the ISO and the OSI?


The OSI created the ISO.

The ISO created the OSI.

The OSI exists one layer below the ISO.

The ISO exists one layer above the OSI.

Answers

The  difference between the ISO and the OSI is that ISO created the OSI. Option B is correct.

What is the difference between ISO and OSI?

ISO is an abbreviation for the International Organization for Standardization. This is known as an Open System Interconnection (OSI) model, or simply the OSI model.

The ISO-OSI model consists of seven layers. In a comprehensive communication system, it defines seven tiers or levels. ISO is an acronym for International Standards Organization, a multinational organization that works to standardize network communication protocols on a global scale. OSI (Open System Interconnection) is a networking communication paradigm developed by ISO.

The OSI Model includes a distinct layer for Data Link and Physical, but TCP/IP has a single Network Interface layer for both. Similarly, in OSI, there are Application, Presentation, and Session levels, which for TCP/IP are integrated into one layer (Application).

Therefore, option B is correct.

Learn more about ISO, refer to:

https://brainly.com/question/14957302

#SPJ2

You have production infrastructure sitting behind one DNS domain, and for disaster recovery purposes, you have parallel infrastructure on standby behind a second domain hosted in a second AWS region. Which routing policy will automate the switchover in the event of a failure in the production system

Answers

Answer:

Failover

Explanation:

A failover is required when one set of infrastructure fails then traffic is redirected to the second set of backup infrastructure.

Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC).

Answers

Answer:

analysis

Explanation:

The Discovery of user requirements, existing system evaluation, and logical system design are part of the analysis phase of the Systems Development Life Cycle (SDLC).

What is the System Development Life cycle?

The systems development life cycle (SDLC) is a project management conceptual model that defines the processes involved in an information system development project, from early feasibility studies to application maintenance. SDLC is applicable to both technical and non-technical systems.

The phase of the system development life cycle whose parts involve the discovery of user requirements, existing system evaluation, and logical system design is the Analysis phase.

Hence, the phase is the Analysis Phase.

Learn more about the System Development Life cycle here:

https://brainly.com/question/28498601

#SPJ2

__________ may be defined as the application of methods and means to ensure that test results are reliable and valid, and errors that may interfere with obtaining accurate test results are detected and eliminated.

Answers

Answer:

Quality assurance

Explanation:

large carriers like sprint, at&t, and xo communications exchange internet traffic freely at physical locations called ________.

Answers

The answer is Internet Exchange

how is technology moving the business world forward?

Answers

Answer: It can help businesses develop new products, experiences, markets and business models

Explanation:

URGENT HTML5 can support videos and audio playback, but not 2D and 3D graphics.

A. True
B. False

Answers

Answer:

False I think.

Explanation:

WORTH 15 POINTS
Yo, Quick question in the movie Into The Woods 2014 version. What character would you want to be in the movie. Give me a good reason too
DUE 11/17/2021 10:00 PM

LOOKING FOR PEOPLE WHO KNOW THE ANSWER.

Answers

Answer:

didnt watch it

Explanation:

i dont watch furry movies

During an internship, a client requests that her database application be moved to a separate network drive. What kind of architecture is this an example of

Answers

Since the client requested that her database application be moved to a separate network drive, this an example of: Local network hosted.

In Computers and Technology, cloud computing refers to a type of computing that requires the use of the following shared computing resources over the internet:

Network (web) servers.Computer power.Cloud storage (data storage).  Software programs (applications).

A hosted software can be defined as a software program (application) that is installed, hosted and accessed by end users (clients) entirely from a remote  location, network drive or server.

Read more: https://brainly.com/question/18369405

Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system. (1pts) Question 14 - Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system. system definition component design system maintenance system implementation

Answers

Answer:

system implementation

Explanation:


2. What is an operating system? Describe any three functions of
operating system.

Answers

Answer:What is an operating system?

An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware.

2) A ________ uses electronic memory and has no motors or moving parts. A) mechanical hard drive B) solid-state drive C) Blu-ray disc D) digital video disc

Answers

Answer:

A.mechanical hard

Explanation:

brainliest me and follow ty

What do you think is the best horror game BATIM FNAF or Baldi's Basics?

Answers

Answer:

FNAF

Explanation:

its goated

Answer:

fnaf

Explanation:

A(n) __________ structure is a structure that causes a statement or a set of statements to execute repeatedly.

Answers

Answer:

you cant do anything with the start of the question unless you explained more about it

Explanation:

Give at least five examples of both types of ciphers.? ​

Answers

Answer:

Examples include Porta cipher, Vigenere, Gronsfeld, Beaufort, Autokey, Running key cipher, and even ciphers such as Enigma. Polygraphic Substitution ciphers - groups of characters are replaced. Examples include Hill cipher, playfair, foursquare etc.

Explanation:

follow me please

Walk around your house and locate at least ten hazards. Classify them according to type. Explain why these things that you have identified or listed pose danger to the members of your family.

Answers

Answer:

1. Falls

2. Poisoning

3. Carbon Monoxide

4. Fire Hazards

5. Drowning

6. Choking

7. Sharp Objects

8. Stoves

9. Dishwashers

10. Suffocation

  Examples :

What will be the result of this line of code: print("I am amazing!")
a syntax error
a tool error
"I am amazing"
I am amazing

Answers

Answer:

I am amazing!

Explanation:

you forget this symbol ( ! )

Answer:

I´m pretty sure its I am Amazing. So D

Explanation:

¨I am amazing" is like you talking sarcastically.

I could be wrong, but this is my opinion. Do what you want with it and run I guess, haha.

what can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time?

Answers

Answer:

Infographics can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time.

Explanation:

As part of the communication element, many websites use sophisticated computer programs called ______ which mimic human conversation using artificial intelligence.

Answers

Answer:

ai based learing i think

Explanation:

Other Questions
The _______ of 1054 led to the formation of the Eastern Orthodox Church and the Roman Catholic Church. A square has an area of 9 cm. What is its side length? the inheritance pattern of one gene will not affect the inheritance pattern of another gene. this is known as what is 2:110 simplified what happened to the bodies that jumped from the world trade center 3Question 3 (1 point)Brian wants to take on more of the sales responsibilities. Which activity might hefocus on? Choose the answer.making business cardsposting social media adsgiving service estimates to customersmowing yards himself Which ABO blood type has the A antigens on the surface of red blood cells?A)Type A blood onlyB)Type O blood onlyC)Type A and type B bloodD)Type A and type AB blood 3^8*__^8 = 12^__ Please help!!!!! I need urgent help!! Please!! I'll give you brainliest!!!! Less than 0. 1% of the energy in a food chain generally makes it from the sun to quaternary consumers. Please select the best answer from the choices provided T F. 4. The worst thing about learning about homelessness is I have been told that several political meetings have been broken up by armed men, using threats, intimidation, and, in some cases, actual violence; that in other cases property has been actually destroyed, and citizens fired on, that several citizens have been taken from their homes at night and whipped; that in several counties peaceful citizens have been intimidated and terrorized by threats of violence to their persons and their property, until they remove their names from the voter registration.Therefore, I, Daniel L. Russell, Governor of the State of North Carolina, by virtue of authority vested in me by the Constitution and laws, will use all lawful efforts to preserve the peace; and to secure to all the people the quiet enjoyment of all their rights of free citizenship.And I do further commend and require that all persons who may have entered this State from other states, to leave this State upon pain of being arrested and dealt with according to law.By the Governor,DANIEL L. RUSSELL.Source: The speech above was published in a Populist newspaper on October 26, 1898. Johnny was a child that went into foster care at birth and lived with three different foster families by the end of his first year of life. Johnny was very fortunate that each of the three foster homes he was placed in had warm and attentive caregivers. Johnny was placed with his 4th foster family at age 1.5 and was then adopted by that family . Given what we know about the factors that affect attachment security, which statement about Johnny's attachment style is most likely to be true ? a. Johnny will develop a secure attachment to his adoptive parents by age 2, given they provide warm and attentive caregiving. b Johnny may have a harder time forming secure attachments to his adoptive parents , but may over time given they provide warm and attentive caregiving . Oc Johnny will not form secure attachments to his adoptive parents regardless of their parenting practices . d. Johnny will form secure attachments with each of the foster families and his adoptive parents given they all provided warm and attentive caregiving . From 1928 until 1934, the unemployment rate was:O A. constant.O B. falling sharply.O C. decreasing slightly.O D. rising sharply. Besides protecting china from foreign armies, what other purpose could the great wall have served? PLLZZZZZ HELP ME!!!!!! I AM IN NEED OF ASSISTANCE!!!!!!!! I AM DESPERATE!!!!!!!!!!! 3. slope - 4; (2, 8) is on the line The human body is organized into organs that carry out different functions. Which organ or organs filter blood to remove excess waste and water? A. heart B. kidneys C. lungs D. stomach Evaluate whether this source is strong or weak:a Wikipedia article on solar energyStrongWeak 42/19 as a decimal rounded to the nearest tenth. -5x=5 solve for x plssss help