What is the maximum number of guesses it will take to find a number between 1 and 1000? Explain your answer.
Answer:
The maximum number of guesses without binary search is 999 since we would be going sequentially and guessing the numbers. When we reach number 999 and find that is not the answer, we know it has to be 1000, and don't have to guess, so the number of max guesses is 999.
The maximum number of guesses to find a number between 1 and 1000 is 10, using a binary search algorithm. Each guess divides the search range in half until the number is found.
Given that,
The number we are trying to find is between 1 and 1000.
We are trying to determine the maximum number of guesses it would take to find this number.
To find the maximum number of guesses it would take to find a number between 1 and 1000, we can use a binary search algorithm.
In a binary search, we start by guessing the middle number, which in this case would be 500.
If the number we are looking for is higher than 500, we then guess the middle number between 501 and 1000, and so on.
If it's lower, we guess the middle number is between 1 and 499, and so on.
Using this approach,
As dividing the problem in half with each guess. Since we have 1000 possible numbers and we divide by 2 with each guess,
It would take a maximum of log base 2 of 1000 (or approximately 9.97) guesses to find the number.
Therefore, we can conclude that the maximum number of guesses it would take to find a number between 1 and 1000 using this binary search algorithm is 10.
To learn more about number system visit:
https://brainly.com/question/33311228
#SPJ3
import pickle
def enter():
f1=open("c:\\xics\\data.dat","wb")
n=int(input("Enter ni of students."))
for i in range(n):
rno=int(input("Enter roll no."))
name=input("Enter name")
marks=int(input("enter marks"))
d={"rno":rno,"name":name,"marks":marks}
pickle.dump(d,f1)
f1.close()
Answer:
Export ariana grande fort nite skin
Answer:
I M P O R T P I C K L E
Explanation:
how can a robot differentiate between positive or negative product reviews?
Answer:
Some of the sites have the rating system for example 3 stars, or the bot has a feature that can capture keywords that include a list of possible indicator that it is a negative review. For example if a user review includes a word "bad" or "horrible" the bot will flag that as a negative review.
Please give brainliest.
how to generate random numbers in excel without duplicates
Answer:
Generate Random Number List With No Duplicates in Excel:1. Select cell B3 and click on it.
2. Insert the formula: =RANDBETWEEN(10,30)
3. Press enter.
4. Drag the formula down to the other cells in the column by clicking and dragging the little “+” icon at the bottom-right of the cell.
Explanation:
Hope it helps you..
Your welcome in advance..
(ㆁωㆁ)
qbasic program to check whether the given number is odd or even
Answer:
CLS
INPUT "Enter a Number: ", n
IF n MOD 2 = 0 THEN
PRINT "Input Number is Even"
END IF
IF n MOD 2 = 1 THEN
PRINT "Input Number is Odd"
END IF
END
Explanation:
CLS
INPUT "Enter a number:",N
IF N MOD 2=0 THEN
PRINT "given number is even"
ELSE
PRINT"given number is odd"
END IF
END
the fast speed of _______ available today enable computers to work very fast
Answer:
main hardware components such as:
1. CPU
2. RAM
3. Motherboard (bus speed)
4. Hard drive
5. Video Card
6. Cache
7. Latest operating system (Windows XP, Windows 10, etc.)
Individuals may restructure their investment portfolios because
Answer:
the results are below expectations
Dữ liệu trong 1CSDL được lưu trong
Answer:
ha ano daww??
Explanation:
??? btw thanks for the points
PLS HELP ASAP ILL GIVE THANKS AND BRAINLIEST IF YOU GET THEM ALL RIGHT:
1. Software used to search a database using keywords or phrases entered by the user.
A) Navigation Tracking
B) Network
C) Search Engine
D) Ethernet Cable
2. This is used to mark a web pages structure using tags so that the web browser displays the content correctly.
A) Antivirus application
B) Ethernet cable
C) Computer virus
D) HTML
3. this is used to connect devices like printers, keyboards, external storage, and digital cameras to computers.
A) Modem
B) USB
C) Intranet
D) Desktop Interface
4. software that the owner maintains exclusive control over how it is modified and distributed
A) proprietary
B) navigation tracking
C) Spyware
D) operating system
5. set of principles that help users determine what is right or wrong in regards to computers.
A) modem
B) HTML
C) navigation tracking
D) Computer ethics
6. spyware that manages all of the installed applications and hardware on a computer or device.
A) Computer virus
B) operating system
C) citation
D) HTML
7. physical components of a computer system such as computer, mouse, or modem.
A) software
B) Network
C) browser
D) hardware
8. A malicious software program that spies on the user and share the information with a third-party.
A) antivirus application
B) malware
C) spyware
D) Desktop interface
9. icons and menus on the computer that allow the user to interact with the operating system.
A) Desktop interface
B) intranet
C) navigation tracking
D) Computer ethics
10. A tool that provides directions using satellites
A) asynchronous communication
B) navigation tracking
C) Ethernet cable
D) HTML
11. A restricted private network used by organizations to communicate.
A) asynchronous communication
B) navigation tracking
C) intranet
D) browser
12. content that is not owned by any individual or company that is free to use.
A) network
B) proprietary
C) Desktop interface
D) public domain
13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer
A) Cable Internet
B) Computer virus
C) public domain
D) operating system
12. content that is not owned by any individual or company that is free to use.
A) network
B) proprietary
C) Desktop interface
D) public domain
13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer
A) Cable Internet
B) Computer virus
C) public domain
D) operating system
This is a lot, but here goes!
1. C
2. D
3. B
4. A
5. D
6. B
7. D (these are technically peripherals or input devices.)
8. C
9. A
10. B
11. A
12. D
13. B
Just as a note, spyware is malware.
what are the unique ICT needs for casinos?
Answer:
This is one of those slot game developers that not only create games, but it also creates entire platforms for online casinos and they have to pay for the games.
Explanation:
PLEASE HELP PLEAAASSSSSEEEE!
When search engines republish content, it refers to _____.
a leaking data exhaust
an active data exhaust
an active digital footprint
a passive digital footprint
Answer:
a passive digital footprint
Explanation:
When search engines republish content, it was not information that was intentionally re-released by the owner. This makes it a passive digital footprint.
Answer:
D. a passive digital footprint.
Explanation: got it right
2
2. When designing a kitchen to be handicapped acces-
sible, toe space of deep and 8" to 11" high is
needed under the cabinets for wheelchair footrests.
Answer:
ok.... ..............
a file extension of .xlsx means that the file contains what?
A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).
Answer:
Explanation:
A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).
what is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?
Answer:
Proprietary Software
Explanation:
Two structural members that cross each other when strengthening structures A. Triangulation B.cross bracing C.Lintel D.cantilever
Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?
Answer:
Left-click each message, and move it to the Trash folder.
Right-click the Deleted Items folder, and click Empty Folder.
Click the Folder tab, and click the Empty Folder in Clean Up group.
Right-click the Deleted Items folder, and click Mark All as Read.
ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!
1. A means of giving credit to a source when their information is used.
A) Citation
B) Wi-Fi
C) Asynchronous Communication
D) Malware
2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
A) Spyware
B) Phishing
C) Malware
D) Wi-Fi
3. A device that translates analog carrier signals to encode and decode digital information.
A) USB
B) Computer Virus
C) Intranet
D) Modem
4. A virus or Trojan horse designed to cause harm to computer or device.
A) Hardware
B) Malware
C) Modem
D) Antivirus Application
5. Software that is used to detect and eliminate computer viruses.
A) Wi-Fi
B) Cable Internet
C) Antivirus Application
D) Browser
6. Transmits data through a cable television network as a means to connect a computer to the internet.
A) Desktop Interface
B) Cable Internet
C) Operating System
D) USB
7. An application used to access websites on the internet.
A) Malware
B) Internet
C) Proprietary
D) Browser
8. Communication that does not happen in real time.
A) Asynchronous Communication
B) Wi-Fi
C) Ethernet Cable
D) Malware
9. A network of computers that provides access to information on the web.
A) Phishing
B) Internet
C) Antivirus Application
D) Modem
10. The cable used to connect computers in a network.
A) Computer Virus
B) Ethernet Cable
C) Intranet
D) Hardware
Easy Peasy Lemon Squeezy
1. A means of giving credit to a source when their information is used.
A.) Citation
2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
B.) Phishing
3. A device that translates analog carrier signals to encode and decode digital information.
D.) Modem
4. A virus or Trojan horse designed to cause harm to computer or device
B.) Malware
5. Software that is used to detect and eliminate computer viruses.
C.) Antivirus Application
6. Transmits data through a cable television network as a means to connect a computer to the internet.
B.) Cable Internet
7. An application used to access websites on the internet.
D.) Browser
8. Communication that does not happen in real time.
A.) Asynchronous Communication
9. A network of computers that provides access to information on the web.
B.) Internet
10. The cable used to connect computers in a network.
B) Ethernet Cable
Answer:
your mom
Explanation:
what is the answer ?????
Answer:
1) Driver or option D
2) Kindle or option C
explain on what you did and give on how problems as such can be avoid inthe future
what type of malware prevents you from accessing files
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.
Certificate authority (CA) is simply known as a firm (entity) that has the sole aim for digital certificates.Certificates often uses centralized third parties called certificate authorities such as x.509 certificates. There are several fields in x.509 and these certificates consist of several characteristics that is perculiar to them.From the above, we can say that Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.
Learn more from
https://brainly.com/question/17956104
the date of creation can be added to a slide using the
Answer:
On the Insert tab, in the Text group, click Date & Time. In the Header and Footer box, do one of the following: If you want to add the date and time to your slides, click the Slide tab. If you want to add the date and time to your notes pages, click the Notes and Handouts tab.
Explanation:
The date of creation can be added to a slide by making use of the: "Insert" tab, "Text" group.
What is a slide?A slide can be defined as a single page of a presentation that contains text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic.
In Microsoft Powerpoint, an end user can add the date of creation to a slide by making use of the "Insert" tab and "Text" group.
Read more on slides here: brainly.com/question/11741377
#SPJ9
Use the drop-down menus to complete statements about safe and blocked senders lists.
*Safe *Blocked *repeatedly
Answer:
it already has an answer and it's right so i don't see the point to needing to answer this
what did the person using the windows command prompt do during round 1
The windows command prompt is a an interpreter found in Microsoft computers that executes lines of code or commands given by the user if they are valid.
As a result of this, there are different commands which can be given by the user administrator to the windows command prompt which enables them to:
List the hardware information in the computerShow/Check Networking informationScan for viruses or repair bad system files, etcPlease note that your question is incomplete, so I gave a general overview which should help you get the right answer.
Read more here:
https://brainly.com/question/12787942
which type of chart is preferable when you are dealing with a timeframe?
The type of chart that is preferable when you are dealing with a timeframe is a LINE CHART.
A line chart is a graphical representation that indicates how some variable changes over time.A line chart can connect a data series of data with a continuous line of time. This type of chart (line chart) can be very useful to visualize trends in data over intervals of time (i.e., time series).
In conclusion, the type of chart that is preferable when you are dealing with a timeframe is a LINE CHART.
Learn more in:
https://brainly.com/question/5866790
In conclusion, when dealing with a timeframe, a line chart is the most suitable chart type to use. It effectively displays trends and patterns in the data over time and can be used to compare the performance of multiple data sets over the same time period.
The preferable chart type when dealing with a timeframe would be a line chart. A line chart is a type of chart that displays data as a series of points connected by a line, which makes it an ideal chart type to display data over time.
Line charts are effective for showing trends and patterns in the data, as well as identifying outliers and anomalies. This is because the lines in a line chart are continuous, making it easy to see how the data is changing over time. Line charts are also useful for comparing the performance of multiple data sets over the same time period.
In summary, when dealing with a timeframe, a line chart is the most suitable chart type to use. This is because it can effectively display trends and patterns in the data over time. Clustered column charts or column charts are more suitable for comparing different categories of data, and pie charts are better suited for showing the proportion of data in different categories.
It's worth noting that there are different types of charts that can be used depending on the specific context and the type of data being displayed. It's important to consider the purpose of the chart and the message you want to convey when choosing the appropriate chart type. In addition, it's important to ensure that the chart is easy to read and understand by using appropriate labeling, colors, and scales.
When using a line chart to display data over time, there are several best practices that can help make the chart more effective:
Use a clear and concise title that accurately reflects the data being displayed.Label the x-axis (horizontal axis) with the time period being displayed (e.g., months, years, etc.) and the y-axis (vertical axis) with the units of measurement being used.Choose a scale that allows for easy comparison between data points. Avoid using a scale that compresses or distorts the data.Use different colors or styles to differentiate between multiple data sets on the same chart.Include a legend that clearly identifies each data set.Consider adding annotations or callouts to highlight significant events or changes in the data.By following these best practices, you can create a line chart that effectively displays data over time and helps communicate your message to your audience.
Another important consideration when using a line chart is the frequency of the data points. Depending on the timeframe being displayed, the data may be aggregated into daily, weekly, monthly, or yearly intervals. It's important to choose the appropriate interval based on the context and the level of detail needed. For example, if you're displaying data over a year, daily intervals may be too detailed, and weekly or monthly intervals may be more appropriate.
In addition, it's important to ensure that the data is presented accurately and honestly. The y-axis should start at zero to avoid distorting the data and to provide an accurate representation of the scale of the data. The labels on the x-axis should be evenly spaced and labeled appropriately to provide a clear understanding of the time period being displayed.
In conclusion, when dealing with a timeframe, a line chart is the most suitable chart type to use. It effectively displays trends and patterns in the data over time and can be used to compare the performance of multiple data sets over the same time period.
Learn more about the line chart here:
https://brainly.com/question/29359235.
#SPJ3
Questions: What memory modules are needed if the customer wants 3 GB of RAM? What capacities and how many modules of each capacity are required?​
Answer:
You could use three 1 GB modules.
Help Digital photo class
Answer: i think the answer is c
Explanation:
Answer:
Here’s your answer!
Explanation:
I believe the answer to be D however if the camera still doesn’t work visit a camera shop for help.
Hope this helped
Brainliest please?
Dont forget to smash that heart at the bottom <3
Have a great day,you’re amazing!
Cual es de las siguientes pertenece al software de una computadora
A bocina
B teclado
C messenger
D monitor
Explanation:
a sjsjsjsijdjdnjjjjururueu
Easy Question I will make you brainless Just answer this 10 question!!
Answer:
B
Sc
B
Sc
B
B
Sc
B
Sc
Sc
Explanation:
Not positive sorry if its not 100% correct
Imagine that over the past few weeks, you have experienced an abundance of pop-up ads
appearing when you are using the Internet. You'll also noticed that your computer is
working more slowly than usual.
In a 200 - 300 word essay, diagnose the problem with your computer and explain what can be done to remedy the issue. In your essay, use information from the lesson to justify your
diagnosis and solution.
I
Answer:
Look below
Explanation:
You open the computer that you recently purchased and it is running slower than usual and your experiencing popups
What most people would think is that a virus has infected their computer. This can be diagnosed via a free online (REPUTABLE) tool such as Malwarebytes. If the tool detects a virus it can remove it and this will 99% of the time fix the problem.
Now after you have solved the problem there is another thing to learn, viruses don't just catch computers like a real virus so its User Error either by the owner of the computer or someone with access, If you are the only one who uses the computer you should learn some online safety such as not visiting websites people wouldn't consider reputable and don't run sketchy files (EXE, JAR, etc) don't download anything from a source you don't trust.
If it was a family member or friend's fault explain internet safety to them and how sometimes a simple mistake of not double-checking the website can lead to a virus. One time I was installing java on a friend's computer and just clicked the first link (an ad) not Javas website and it ended up in me getting in some trouble.
However, if you have solved the virus issue and your computer is still being slow you should check if Windows has been damaged, you can do this via Command Prompt a program that comes with your Windows Machine. Just type "sfc /verifyonly" and it will find if your windows files have been damaged.
-END
256 words
Pls mark me Brainliest i worked hard on this. Your assignment asks for information on the lesson however i used some complicated solutions to make up for that so your teacher/professor thinks your smart