Answers

Answer 1

Answer:

I think ...............


Related Questions

What is the maximum number of guesses it will take to find a number between 1 and 1000? Explain your answer.

Answers

Answer:

The maximum number of guesses without binary search is 999 since we would be going sequentially and guessing the numbers. When we reach number 999 and find that is not the answer, we know it has to be 1000, and don't have to guess, so the number of max guesses is 999.

The maximum number of guesses to find a number between 1 and 1000 is 10, using a binary search algorithm. Each guess divides the search range in half until the number is found.

Given that,

The number we are trying to find is between 1 and 1000.

We are trying to determine the maximum number of guesses it would take to find this number.

To find the maximum number of guesses it would take to find a number between 1 and 1000, we can use a binary search algorithm.

In a binary search, we start by guessing the middle number, which in this case would be 500.

If the number we are looking for is higher than 500, we then guess the middle number between 501 and 1000, and so on.

If it's lower, we guess the middle number is between 1 and 499, and so on.

Using this approach,

As dividing the problem in half with each guess. Since we have 1000 possible numbers and we divide by 2 with each guess,

It would take a maximum of log base 2 of 1000 (or approximately 9.97) guesses to find the number.

Therefore, we can conclude that the maximum number of guesses it would take to find a number between 1 and 1000 using this binary search algorithm is 10.

To learn more about number system visit:

https://brainly.com/question/33311228

#SPJ3

algorithm to convert Fahrenheit temperature into celsius temperature​

Answers

Lets use python

[tex]\\ \tt F=(float(input("Enter\:temperature\:in\:Fahrenheit:")))[/tex]

[tex]\tt C=(F-32)*5/9[/tex]

[tex]\tt print("Temperature\:in\:Celsius\:is",C°C)[/tex]

Output:-

[tex]\tt Enter\:temperature\;in\:Fahrenheit:32[/tex]

[tex]\tt Temperature\:in\:Celsius\:is\:0°C[/tex]

Answer:

Using c++ variable names

double c;

double f;

//set f to some temperature value or pass the value to the function

c=f-32;

c=f*(5/9);

//c is now the temp in celcius

What refers to the place you drag and drop blocks to create instructions in Scratch?

A.
playground

B.
sprite

C.
editor

D.
environment

Answers

Answer:

It is called the editor script area, hence the name is where you create and edit code.

Hope this help please give the brainliest award.

your motherboard has sockets for 184-pin dimm ram. which type of ram should you install?

Answers

Answer:

DDR

Explanation:

DDR is the only type of RAM that runs on 184 pins, its successor DDR2 was upgraded to run on 240 pins.

Hope this helps!

what is bitcoin??????​

Answers

Answer:

a digital or virtual currency created in 2009 that uses peer-to-peer technology to facilitate instant payments.

Explanation:

qbasic program to check whether an entered number is positive or negative or neutral​

Answers

Answer:

CLS

INPUT "Enter a number: ",N

IF N > 0 THEN

PRINT "The number is Positive."

ELSEIF N < 0 THEN

PRINT "The number is Negative."

ELSE

PRINT "The number is Zero."

END IF

END

how much did netflix pay dave chappelle for the closer

Answers

$24.1 million dollars

in this code how many times will it repeat? for(i = 0; i < 8; i++) {forward();}

Answers

Answer:

It will repeat 8 times. because in the statement above the variable i has to be more then 8, so until the variable i has the value of it it will repeat. So it will repeat 8 times .

what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Answers

Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.

Certificate authority (CA) is simply known as a firm (entity) that has the sole aim for digital certificates.

Certificates often uses centralized third parties called certificate authorities such as x.509 certificates. There are several fields in x.509 and these certificates consist of several characteristics that is perculiar to them.

From the above, we can say that Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.

Learn more from

https://brainly.com/question/17956104

how to generate random numbers in excel without duplicates

Answers

Answer:

Generate Random Number List With No Duplicates in Excel:

1. Select cell B3 and click on it.

2. Insert the formula: =RANDBETWEEN(10,30)

3. Press enter.

4. Drag the formula down to the other cells in the column by clicking and dragging the little “+” icon at the bottom-right of the cell.

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

Please please help ASAP please

Answers

Answer:

he say yes would i do so way 2 be hey i oh peepo

Explanation:

which device allows you to convert sounds into digital format to be used on the computer​

Answers

the correct anwser is ADC

Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional or inappropriate way? Check all of the boxes that apply.

checking social media networks during working hours

surfing the Internet during working hours for what to do on the weekend

downloading a favorite band’s latest album from a file-sharing service

Answers

Answer:

All of the above.

Explanation:

You shouldn't be doing any of these things using your employer's computer networks, even if there aren't any explicit rules against them. For one thing, your usage of company systems and networks is being continuously monitored, so you can forget about trying to get away with it. Checking social media and surfing the internet can expose parts of your personal life that you don't want anyone else to see, and downloading anything from anywhere is dangerous, especially if you're pirating music from some backwater site where adult sites and survey scams are waiting to bombard the whole network with pop-up ads. You should always do these things on your personal devices while connected to your personal home network.

You can open an HTML document only in ________.
A. Internet Explorer
B. M.S Excel
C. Note Pad
D. None of these
please solve it fast its urgent ​

Answers

Answer:

You can open a HTML document in internet explorer usually browsers can open HTML files.

_____ selling is used when a product is sold from one business to another .

Answers

Answer: cross-selling

Explanation: is the action or practice of selling an additional product or service to an existing customer. In practice, businesses define cross-selling in many different ways.

When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________. When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________.

Answers

Answer:

It is called a driver.

Explanation:

You have a computer that has four DDR2 memory slots. Currently, there are two 512 MB memory modules installed. You check the motherboard documentation and find that the system has a 4 GB memory limitation. You want to add more memory to this system. By adding new memory modules, and without replacing the existing memory modules, what is the maximum total amount of usable RAM you can have in this system

Answers

Answer:

2048 MB / 2 GB.

Explanation:

Without removing the other modules you can add two more 512 MB modules for a total of 2048 MB.

A color image is made up of red green and blue color combinations 8 bits are used to represent each of the color components how many possible variations of red are there?

Answers

Answer: The three RGB colors are each 8-bits (possible values [0..255], 2 8 = 256) of each of Red, Green, and Blue. The three 8-bit RGB components can create up to 256×256×256 = 16.7 million possible RGB color combinations, called 24-bit "color". Of course, any one real photo image will not use most of these possible colors.

There is possible is the variation of the red color. The RGB is a combination of color. The 8 bit are the division of the 256 are equal to the 16 million.  

What is color?

The term “color” refers to the element of light. Color is part of communication. There are different colors that have different meanings, such as red, which represents love and danger. Colors are divided into different categories such as primary, secondary, and tertiary.

The color is the combination of the RGB colors. The letters R, G, and B stand for Red, Green, and Blue, respectively. The 8 bits for 256 shades of the RGB This means R = 256, G = 256, and B = 256 (256 × 256 × 256) are producing the 16 million colors. The variation of the red is possible to achieve an equal color.

As a result, the variation of the red color are possible are 256.

Learn more about on color, here:

https://brainly.com/question/19580247

#SPJ2

which type of malware typically displays, automatically plays, or downloads advertisements to your computer?

Answers

Answer:

Adware

Explanation: Adware displays pop-up advertisements when you are online.

Match the letter with the corresponding Workspace Area

Options :

-workspace settings

-options bar

-menu bar

-toolbar

Answers

The workspace areas described are editing tools of the photoshop program

The options described below are part of the Adobe Photoshop program for image and photo editing.

Workspace settings: It is a bar to configure the general aspects of the workspace in which an image is going to be edited or created.

Options bar: It is a bar located in the upper part (second row) of the document in which we have different options depending on the tool of the toolbar that we choose.

Menu bar: It is the bar located at the top (first row) in which we find different options such as:

FileEditionImageCapTextSelectionFilter3DViewWindowHelp

Toolbar: It is the bar located on the left side of the screen where we find different editing tools for our file, such as:

MoveMagnetic loopTrimDropperBrushDraftDegradedFeather

Note: This question is incomplete because the information is incomplete. However, I can answer based on my previous knowledge.

Learn more in: https://brainly.com/question/24964958

what is the answer ??​

Answers

= Option b Minicomputer ..........

Answer:

Minicomputer answer The HP 2100 is a series of 16-bit minicomputers that were produced by Hewlett-Packard (HP) from the mid-1960s to early 1990s. Bro please follow me we should help each other

you can use view the ______ file to view the hard drive details.

Answers

Answer:

/proc/partitions

which email attachments are generally safe to open

Answers

Answer:

i would suggest not opening ones that start with bit . ly

Explanation:

pls mark brainliest

Anything starting in https://

aaron has started a food blog on which he wants to post his recipes. he wants to place a high-quality image next to each cooking step. which file format should he use so that users do not experience a lag when loading the high-quality images on the website?

Answers

The picture format which should be embraced on Aaron's blog in other to ensure that customers have smooth viewing experience while also preserving the quality of uploaded images is the JPEG format.

File format refers to the manner in which files are encoded. Picture files have several encoding types such as JPEG, JPG, GIF, PNG and so on.

Since, Aaron is considering images which loads quickly without lagging, then he'll need to compress the size of the uploaded images so that they have smaller file sizes.

In other to preserve image quality while working down the size of the image, the JPEG image format, produced good quality images with smaller file sizes compared to other file formats.

Therefore, the file format which should be adopted by Aaron ls the JPEG picture format.

Learn more :https://brainly.com/question/24941137

Which is the most protective and secure anti virus software?

Answers

Answer:

In most cases you should just use an anti virus software that comes with that operating system. But if you would like a third party application try using kaspersky anti virus in my opinion it is simple and user friendly. It can most probably block any malware expect for ones that are new like one day old, it will take somwhile to add it to the database.

a modem is required for ________________ internet access.

Answers

Broadband I believe!

rocks created from compaction and cementation of sediments are called:

Answers

Answer:

Sedimentary Rocks

Explanation:

Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.

Answer:

A  sedimentary

Explanation:

hope this helps please mark as brainliest

Why would you put money into a savings account? *
To make frequent withdrawals at ATM’s
To access the money from this account with personal checks
To easily access money from this account with a debit card
To earn interest on your money

Answers

Answer:

Most probably option 4, it has nice to earn interest from the bank.

which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Answers

The kind of system software that tells the computer how to communicate with peripherals, such as a printer or scanner, is known as "device driver."

A device driver is a set of computer programs or software files that run specific devices or gadgets to perform their designed functions while connected to the computer system.

A device driver is a form of software file that ensures hardware device functions as designed.

Several types of device drivers include:

BIOS;Motherboard Drivers;Hardware Drivers;Virtual Device Drivers.

Hence, in this case, it is concluded that the correct answer is Device Driver.

Learn more here: https://brainly.com/question/19473613

Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they view the bright images on the page. Which design principle is Cathy using?

Answers

Answer:

dominance

Explanation:

i just took it and got it right

Other Questions
what figurative devices are used in parrot in the oven 1 of 12Solve for Xx + 15 = 21X ==0 Are Americans paid fairly based on the work jobs they perform and the skills they must have to complete the work? Spanish colonization of the new world Short summary What is the sum of the first 7 terms for the geometric sequence with first term 3, seventh term 46,875, and common ratio 5A. 35,154B. 58,593C. 19,531D. 11,718 Which of the following correctly compares run-of-the-river dams and storage dams?Select one:of.Run of the river dams are less damaging to the environment.O b. Storage dams can serve several purposes in addition to creating electricity.O c. Storage dams are better built.d. Run of the river dams are more efficient.Dus pageFinish attempt How did you get 99 after that Write the equation of the line that passes through the points (7, 2) and (4, -9). Putyour answer in fully reduced point-slope form, unless it is a vertical or horizontal line. Marjorie needs to cut 5 yards of fabric into sections that are of a yard long. How many sections will she be able to cut from the fabric? Which of the following did not help lead to Hitler's rise in Germany?Blaming German problems on communistsArguing that only the Nazis could keep German safeBanning of the philosophical book Mein KampfHitler leading a failed but popular uprising that gained him fame 3When worldbuilding, what must an author do with every reality-challenging concept they introduce?.Surround it with other reality-challenging concepts.OB. Juxtapose it with a realistic concept.OC. Fully explain it.D.Treat it as if it was the reader's reality.ResetNext how does dna control the traits of living organism? sleepwalking is most likely to be associated with ________ sleep. How did beliefs about the nature of government and human freedom lead to the colonies break with Britain? Convert standard form to vertex form y=2+3x ^2 Of the two types of free speech described by the author, which is protected by the government and which is subject to the will of the people? ExplainSpringboard: ELA English 3The two clashing meanings of free speech what is the source of oxygen produced during photosynthesis? study the table listing the numbers of enslaved poeple in the colonies from 1650 to 1710. what do these numbers suggest about africulture im the various regions of the american colonies during these years Which words are missing? what is the primary function of c6h12o6 in animals?