The Binary Search algorithm works by testing a mid-point, then eliminating half of the list.

a. True
b. False

Answers

Answer 1

Answer:

a. True

Explanation:

The Binary Search algorithm works by testing a mid-point, then eliminating half of the list.


Related Questions

please answer in python language​

Answers

print("Choose an option: ")
print(" [1] $1,000,000")
print(" [2] 0.01 x2/day")
answer = int(input("> "))

if answer == 1:
print("Here's your $1,000,000")
elif answer == 2:
initial = .1 # initial investment of a penny
final = ( initial * 2**30 ) - initial
print('A penny will be $' + format(final, '.2f'), 'in 30 days.')
else:
print(" - invalid option.. exiting")
exit(0)

Kyla, a business analyst uses test scripts while testing an application before it is released to the client. Why do business analysts use test scripts?
A.
to perform acceptance testing
B.
to code functions correctly
C.
to write a test plan
D.
to create a test environment
E.
to review and update test cases

Answers

Answer:

D. to create a test environment

Explanation:

After releasing it will be "production"

yes how many poly pockets if I had 10 and gave 2 to esmeraldas father who died and left 1 to his cat, sir whisker?

Answers

Answer:

Total 13 poly packets are there

Explanation:

Total number of poly packets = 10

Number of poly packets given to esmeraldas father = 2

Number of poly packets left with his cat = 1

Total remaining poly packets = 10 + 2 + 1 = 10 + 3 = 13

13. Which statement is valid?
1 KB = 1024 bytes.
1 MB = 2048 bytes
1 MB = 1000 kilobytes
1 KB = 1000 bytes​

Answers

Answer:

1 KB = 1024 bytes is correct

Explanation:

Answer:

1 KB = 1000 bytes

Is valid.

Hope it will help :)❤

Use the provided MS-Excel template to note entries for each .pcap file in Wireshark that are of interest, as well as your assessment of potential vulnerabilities. Such vulnerabilities might be due to plaintext data exchange between two machines, which might be exploitable by session hijacking, man-in-the-middle attacks, exploitation of commands/user accounts/passwords, or capture and replay of the data packets later to control devices or access remote connections.

Answers

Answer:You should note entries for each PCAP file in Wireshark that are of interest as from ENCM 369 at ... file in Wireshark that are of interest, as well as your assessment of potential vulnerabilities. Such vulnerabilities might be due to plaintext data exchange between two machines, which might be exploitable by session hijacking, ...

Explanation:

What is the data type of the following expression?
5/1

a) bool

b) str

c) float

d) int

Answers

Answer:

What do u mean by 5/1... And Sry for disturbing

D Integer

Since 5/1 = 5 that’s no float. Maybe if it was 5/1.0 then it would be 5.0 which is a float. So int is the answer.

PLEASE HELP IM STUCK!!!!!!!!!!!!!!!!!!!!! Which of the following terms is described as "the art and design of using text”?
O typography
O elements of design
O typos
O graphic design

Answers

typography is the correct answer

Information Technology




Answers

Answer:

whats the question

Explanation:

Answer:   The study or use of systems. Especially computers and telecommunications for storing, retrieving, and sending information.

Explanation: I don't know what you're asking buddy. If you're asking for the definition then there you go. Next time add the question :)

Which term best describes these lines?

count = 0

loop through list

if “basketball” is found

add one to count

output count

Python 3 code
selection program
pseudocode
sequential program

Answers

The term best describing these lines is called pseudocode. Essentially a “text-based” detail (algorithmic) design tool.

Amelia is home alone, and her tablet will not turn on. How can she approach solving this problem?

Throw the tablet away because it's junk.
Try plugging the tablet in to see if it needs to charge.
Call her Dad and ask him to come home early.
Watch a movie instead.

Answers

Answer:

plug it in. sjjssjjsnsjsjsjsjs

Answer:

Try plugging the tablet in to see if it needs to charge.

Explanation: it’s the most logical approach that won’t cause any unnecessary promblems. If it doesn’t turn on then she can try something else.

a farmer cultivates 1/4 of his farm with ground nuts and 2/5 of it with maize what is the total landnarea that is cultivated​

Answers

Answer:

13/20

egeringioerngierngineriogneirognoernogenroiernonoirenogneogneiong

Which wizard is a tool provided by Access that is used to scan the table's structure for duplicate?

O Query Design Wizard
O Table Design Wizard
O Table Analyzer Wizard
O Performance Analyzer Wizard

Answers

Answer:

The tool provided by access that’s used to scan the table’s structure for duplicate is “Table Analyzer Wizard”.

The function below takes two parameters: a string parameter: csv_string and an integer index. This string parameter will hold a comma-separated collection of integers: ‘111, 22,3333,4’. Complete the function to return the indexth value (counting from zero) from the comma-separated values as an integer. For example, your code should return 3333 (not ‘3333 *) if the example string is provided with an index value of 2. Hints you should consider using the split() method and the int() function. print.py 1 – def get_nth_int_from_CSV(CSV_string, index): Show transcribed image text The function below takes two parameters: a string parameter: csv_string and an integer index. This string parameter will hold a comma-separated collection of integers: ‘111, 22,3333,4’. Complete the function to return the indexth value (counting from zero) from the comma-separated values as an integer. For example, your code should return 3333 (not ‘3333 *) if the example string is provided with an index value of 2. Hints you should consider using the split() method and the int() function. print.py 1 – def get_nth_int_from_CSV(CSV_string, index):

Answers

Answer:

The complete function is as follows:

def get_nth_int_from_CSV(CSV_string, index):

   splitstring = CSV_string.split(",")

   print(int(splitstring[index]))

Explanation:

This defines the function

def get_nth_int_from_CSV(CSV_string, index):

This splits the string by comma (,)

   splitstring = CSV_string.split(",")

This gets the string at the index position, converts it to an integer and print the converted integer

   print(int(splitstring[index]))

What element of art does this photograph show? A. shape B. space C. form D. tone E. line

Answers

I would for sure say form because it doesn't look like a flat surface, instead it looks 3-D, but If it is multiple choice then I say do C,D, and E.

Here is some advice tho, this question seems like an opinion question, soo, that means that you pick one that stands out to you and escribe why you think so in a descriptive way... if that is not the case then go ahead and use whatever i gave you. Just in case you may want to add a little more to the bolded answer I gave you, just to be professional, in case you do want to add more here is the defintion of form in case you need it

In addition to form, they include line, shape, value, color, texture, and space. As an Element of Art, form connotes something that is three-dimensional and encloses volume, having length, width, and height, versus shape, which is two-dimensional, or flat.

If this helps, I would like brainliest, when possible

Solving Systems of Equations by Substitution
pdf

Answers

Bro look on photo math cjjdjsj

I need them on this question

Answers

Answer:

Extended wear contacts. ...

Toric contacts. ...

Colored (tinted) contacts

Explanation: hope this helps

The set of three integer values for the lengths of the sides of a right triangle is called a Pythagorean triple. These three sides must satisfy the relationship that the sum of the two sides is equal to the square of the hypotenuse. Find all integer Pythagorean triples for side1, side2, and the hypotenuse, all no larger than 500. Use a triple-nested for loop that tries all possibilities. This program is an example of brute force computing. You will learn in more advanced computer science courses that there are many interesting problems for which there is no algorithmic approach other than using sheer brute force. This program does not need any input from the user. Write at least one bool function that takes the 3 sides of the triangle and returns true or false based on if it is a right triangle or not.

Answers

Answer:

In Python:

def  Pythagorean_triple(hyp,side1,side2):

   if hyp**2 == side1**2 + side2*2:

       return True

   else:

       return False

               

print("Hypotenuse\tSide 1\t Side 2\t Return Value")

for i in range(1,501):

   for j in range(1,501):

       for k in range(1,501):

           print(str(i)+"\t"+str(j)+"\t"+str(k)+"\t"+str(Pythagorean_triple(i,j,k)))

Explanation:

This defines the function

def  Pythagorean_triple(hyp,side1,side2):

This checks for pythagorean triple

   if hyp**2 == side1**2 + side2*2:

Returns True, if true

       return True

   else:

Returns False, if otherwise

       return False

               

The main method begins

This prints the header

print("Hypotenuse\tSide 1\t Side 2\t Return Value")

The following is a triple-nested loop [Each of the loop is from 1 to 500]

for i in range(1,501): -->The hypotenuse

   for j in range(1,501): -->Side 1

       for k in range(1,501):-->Side 2

This calls the function and prints the required output i.e. the sides of the triangle and True or False

           print(str(i)+"\t"+str(j)+"\t"+str(k)+"\t"+str(Pythagorean_triple(i,j,k)))

The Zoom feature allows you to either increase or decrease the size of your document on the screen,
Please select the best answer from the choices provided
True or false

Answers

The answer will be (True) hope this helps!


Have a wonderful day!

how many pieces can be connected on to a to an SPS​

Answers

Answer:

i dont know

Explanation:

____ occurs when weaker companies are eliminated and the strong companies survive

Answers

Answer:

sounds like a monopoly but is there a word bank?

Explanation:

"the exclusive possession or control of the supply of or trade in a commodity or service."-Oxford dictionary

there is a structure called employee that holds information like employee code, name, date of joining. Write a program to create an array of the structure and enter some data into it. Then ask the user to enter current date. Display the names of those employees whose service is 15 or more than 15 years according to the given current date.

Answers

Answer:

The program in C is as follows:

#include<stdio.h>

#include<conio.h>

struct employee{

char empname[50]; int empcode, day,mon,yr;

}employees[30];

int main(){

int total;

printf("Numbers of Employees : "); scanf("%d",&total);

for(int kt=0;kt<total;kt++){

printf("Employee Code : "); scanf("%d",&employees[kt].empcode);

printf("Name: "); scanf("%s",employees[kt].empname);

printf("Date of Joining [dd mm yyyy]: "); scanf("%d%d%d",&employees[kt].day,&employees[kt].mon,&employees[kt].yr); }

int year;

printf("\nCurrent Date [Year only]: "); scanf("%d", &year);

printf("Code\t\t\t Name\t\t\t Date of Joining\n");

for(int kt=0;kt<total;kt++)

if((year - employees[kt].yr) >= 15)

printf("%d\t\t\t %s\t\t\t %d/%d/%d\n",employees[kt].empcode,employees[kt].empname, employees[kt].day,employees[kt].mon,employees[kt].yr);

}

Explanation:

See attachment for explanation where comments were used to explain some lines

convert 128 GB into KB​

Answers

Answer:

1,073,741,274  KB

Explanation:

Use an unit convertor or an calculator.

Select the correct answer.
Kelly is trying to access her company fashion website through the wireless network. Even after repeated attempts, she is unable to access the
website. What must have probably happened?
ОА.
ОВ.
The network is under a war driving attack.
The network is under an eavesdropping attack.
The network is under a denial of service attack.
Ос.
OD
The network is under a frame injection attack.
The network is under a domain name cracking attack.
ОЕ.
Reset
Next
1 Edmentum. All rights reserved.

Answers

The network is under a denial of service attack

An electronic tool that allows information to be input processed and output? A, operating system B.motherboard C.cpu D.computer

Answers

Answer:

This would be considered a CPU in that case.

Explanation:

A CPU does basic arithmetic, logic, controlling, input AND the output. It would be stated in the program's instructions.

Consider we have n pointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we swizzle all pointers automatically, we can perform the swizzling in half the time it would take to swizzle each separately. If the probability that a pointer in main memory will be followed at least once is p, for what values of p is it more efficient to swizzle automatically than on demand?

Answers

Answer:Considerwehavenpointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we swizzle all pointers automatically, we can perform the swizzling in half the time it would take to swizzle each separately. If the probability that a pointer in main memory will be followed at least once is p, for what values of p is it more efficient to swizzle automatically than on demand?

Explanation:

what is the structure of an HTML document. pls answer I don't want any links pls explain too  ​

Answers

Answer:

What is a HTML document?

It's a text document saved with the extension . html or . htm that contains texts and some tags written between "< >" which give the instructions needed to configure the web page. These tags are fixed and definite and will be currently explained in the tutorials when applied and needed.

What is HTML structure?

An HTML Document is mainly divided into two parts: HEAD: This contains the information about the HTML document. For Example, Title of the page, version of HTML, Meta Data etc. BODY: This contains everything you want to display on the Web Page.

What is the basic structure of HTML template?

An HTML document has two* main parts: head. The head element contains title and meta data of a web document.

How is an HTML document structured?

An HTML 4 document is composed of three parts: a line containing HTML version information, a declarative header section (delimited by the HEAD element), a body, which contains the document's actual content.

Explanation :

HELLOOOO ARMY! HOPE U HAVE A WONDERFUL DAY! MAY NAMJESUS BLESS U !

Stream life goes on and dynamite we are about o reach 1B!

And trend these hashtags:

#Westankings

#scammys

AND FINALLY , SARANGAE BOROHAEEE!!!

Explanation:

An HTML Document is mainly divided into two parts: HEAD: This contains the information about the HTML document. For Example, Title of the page, version of HTML, Meta Data etc. BODY: This contains everything you want to display on the Web Page.

Helllp me you will git 16 points

Answers

Answer:

False

Hope it helps...

Have a great day :P

Answer is false.................

Should you let your computer scan email attachments before opening them? Why?

Answers

Jjsjskskiakskskakksjakakoa

no you shouldn't

Explanation:

you should just block them and report them

Which entry by the user will cause the program to halt with an error statement?
#Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10:")
guess = int(guess)

A two
B 100
C 3
D -1

Answers

Answer:

A

Explanation:

what is Windows software​

Answers

Answer:

window software is a platform made by windows that is written in JavaScript and visual basic ,c

Explanation:

window software is a platform made by windows that is written in JavaScript and visual basic ,c .

Microsoft Windows, commonly referred to as Windows, is a group of several proprietary graphical operating system families, all of which are developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry

Other Questions
What is consumerism, and how did it influence postwar culture?Question 2 options:Consumerism is the cultural attitude that places value primarily in possessions.Consumerism is the misplaced attitude that places value on possessions.Consumerism is defined as possessions that belong to others. Ms. M wants A LOT of tropical fish, so Mr. M must buy the biggest tank. Which tank should he buy, A or B? How much greater is the volume of the bigger tank than the smaller tank? Tank A is 65.625Tank B is 61.875 PLEASE HELP I WILL GIVE U BRAINLIEST Read the excerpt from Infinite Jest.My applications not bought, I am telling them, calling into the darkness of the red cave that opens out before closed eyes. I am not just a boy who plays tennis. I have an intricate history. Experiences and feelings. Im complex.I read, I say. I study and read. I bet Ive read everything youve read. Dont think I havent. I consume libraries. I wear out spines and ROM-drives. I do things like get in a taxi and say, The library, and step on it. My instincts concerning syntax and mechanics are better than your own, I can tell, with due respect.What conclusion can readers draw about this character vs. society conflict?The narrator is uncomfortable and defensive.The narrator has destroyed school property.The narrator earns good grades in school.The narrator is being punished for his behavior. v-FLIPs are viral proteins that were first identified as modulators of apoptosis; they contain two death effector domains, which are also found in some initiator caspases such as procaspase-8. These v-FLIP proteins can be recruited to the DISC through the binding of the death effector domain to similar domains in the adaptor proteins but are otherwise catalytically inactive. What do you think is the effect of v-FLIP expression in the host cell?A. It promotes apoptosis mainly via the extrinsic pathway.B. It inhibits the extrinsic pathway of apoptosis.C. It activates only the mitochondrial pathway of apoptosis.D. It inhibits the intrinsic pathway of apoptosis.E. It enhances the caspase cascades in both the intrinsic and extrinsic pathways. Trump was right when he was quoted as saying that India and China do not border one another.TrueFalse how many cookies will Tina have if she bakes 7 more batches more than the maximum number of batches in the table Cookies baked (y) is a function of number of batches (x).Number of batches___total number of cookies5__1806__1987__2168__2349__252 Monica worked 3.5 hours and is paid $10 per hour. How much did she make in 3.5 hours? What happens after the respiratory system moves oxygen into the blood? Can you help me with this one to Write the equation of the line in fully simplifoed slope intercept form Which of the following choices would complete the sentence correctly? "Harold liked to sit ___________ the door and the bookcase because that seat allowed him to see ___________ ."A) among, wellB) among, goodC) between, wellD) between, good need help ASAP !!![tex] \sqrt{6854 \times 6854} [/tex] To get more speed, your driven gear needs to be ________________ the drive gear. alarger than bsmaller than cthe same size as 12y2/3, 14a^3a ,b^5c a monomial or not 1. Which best explains why the author begins the text by talking about magical garbage fairies?a. He is putting a common misconception to rest.b. He is trying to get the reader's attention.c. He is addressing his concern in a serious way.d. He is supporting his argument with evidence. What is the relationship between radius and diameter Chace scored 7, 9, 5, 3, 15 and 15 points in 6 basketball games. What is the mode of the number of points he scored in those games? Easy question What is the answer?? How is this effect of dissolvedsubstances important in nature?