Assume that inputList is an ArrayList of Integer objects that contains the following values. [0, 10, 30, 40, 50, 70, 70, 70, 70] What value will be returned by the call binarySearch(inputList, 0, 8, 70)

Answers

Answer 1

Based on the inputList and the binarySearch, the value that will be returned by the call binarySearch above is 6.

What value will be returned?

With inputList =  [0, 10, 30, 40, 50, 70, 70, 70, 70], the first call would be:

1st call = binarySearch(inputList, 0, 8, 70)

mid = 8 + (0/2)

= 4

if (70 is less then 50)

A second call would yield:

2nd call = binarySearch(inputList, 5, 8, 70)

mid = 13/2

= 6

if (70 = (70))

Return is 6 is the above holds so output is 6.

Find out more on Binary searches at https://brainly.com/question/21475482.


Related Questions

Packet-switching was advanced by which of the following people?
Sergey Brin
Leonard Kleinrock
Tim Berners Lee
Bill Gates
DONE

Answers

Answer:

Leonard Kleinrock

Explanation:

Choose the correct color to complete the sentence. Colors have different meanings in different cultures. In western cultures the color generally represents purity cleanliness. In many Asian cultures, it is associated with death and mourning,​

Answers

white

i really do hope this helps

A mid-sized company's IT security engineer is attempting to make it more difficult for their wireless network to be compromised. She is using techniques such as using a random challenge-response dialogue for authentication, timestamps on authentication exchanges, and one-time pad or session-based encryption. What form of wireless attacks is she defending against

Answers

The form of wireless attacks is she defending against is Hijack .

Hijack attack on a system?

Cyber hijacking is a term that is also called  computer hijacking. This is known to be a  type of network security attack where  the attacker often have full control of computer systems, software programs and others.

Due to the attack, the company or firm cannot have control over their system and as such the engineer  in the above firm is defending against is Hijack.

The options are below

What form of wireless attack is she defending against?

Eavesdropping Insertion Hijack Replay

Learn more about Hijack from

https://brainly.com/question/23294592

Write a C program to perform simple C arithmetic calculations. The user is to enter a simple expression (integer operator integer) such as
15 + 30
The program is to extract the 2 operands and the operator, perform the indicated calculation and display the result. For example
15 + 30 = 45
Operators should include + , - , * , / , and %
Operands are positive integers , no sign
Use getchar to input the expression
Allow for variable spacing before the first operands and between operators and operands ( 0, 1, or more spaces)

Allow the user the option of entering another expression
Code a function for each operator to do the appropriate arithmetic operations (5 functions)
No global variables
No string handling functions
No arrays
May only use input and output functions such as getchar and putchar

Answers

Answer:

Input example:

select the funcion: 1                                                                                                                  

write the 1sd number2                                                                                                                  

write the 2nd number1                                                                                                                  

value is 2.000000                                                                                                                      

Explanation:

#include <stdio.h>

main()

{

//define the variables as float

float a, b, c, e;

char d;

while (1)  

{      

//input values

printf("select the function: ");

scanf("%c",&d);

printf("write the 1sd number");

scanf("%f",&a);

getchar();

printf("write the 2nd number");

scanf("%f",&b);

getchar();

if (d=='%')

{

    a=a*b/100;

}

if (d=='*')

{

    a=a*b;

}

if (d=='+')

{

    a=a+b;

}

if (d=='/')

{

    a=a/b;

}

if (d=='-')

{

    a=a-b;

}

printf("value is %f \n",a);

}

printf("final value is %f",a);

getchar();

}

Help me with this plzz

Answers

Answer:

the 1st one I believe

Explanation:

because plagiarism means to copy someone else work without permission. Example- if you are writing an essay and copy something off the internet and call it your own that's plagiarism

Answer:

Yeap you are right. The correct ans is the 1st one.

Plagiarism is the representation of another author's language, thoughts, ideas, or expressions as one's own original work.

Submit your interview questions in preparation for your interview

Answers

Answer:

Preparing for an interview...Get my certifications, TWIC card, Certificates, diplomas together.

Carefully examine the job description. ... chemical plant project manager requirements- experience and education

Consider why you are interviewing and your qualifications. ... 10+ years of experience, education requirements, location, certificates, enjoying this kind of work

Perform research on the company and role. ... The company is respectful and they are very good to their employees and their employee's families.  The company even has a charity in which it helps its employees in times of need. I make sure I know my role and responsibilities as in I keep track of the crew that works under me and their work and safety. Also, in knowing my job, I make sure we make it to deadlines we are given and keep the companies we work for happy with following their rules also.  I need to be respectful and responsible at all times.

Consider your answers to common interview questions. ... I will come to the interview reviewing my job duties and studying the type of chemical plant I want to work in and the hazards I may have to be aware of.

Practice your speaking voice and body language... I will come dressed appropriately and not in flip flops. I will have my shoulders raised and speak clearly.  I will chose my words wisely. I will show respect and determination. I will not cross my arms nor put my hands in my pockets.  I will not use vulgar or offensive language. I will answer all questions truthfully and to the best of my knowledge.

Explanation:

The interview questions preparation for interview are that common questions to asked for the candidate.

What is interview?

The term interview refers to a formal meeting with the involvement of two people as interviewer and interviewee. The interviewer is one who asks questions and the interviewee is one who answers questions. The conversion is related to the skills, knowledge, and experience related to the job.

According to the preparation for interview are the common question was the based on the interview. The portfolio contains information related to achievements, skills, knowledge, working experiences, and some personal details. The portfolio has a significant role to play in job interviews. The portfolio related question are the mainly prepared.

As a result, the interview questions preparation for interview are that common questions to asked for the candidate.

Learn more about on interview, here:

https://brainly.com/question/13073622

#SPJ2

Select the correct answer. The color wheel can be a useful tool for finding colors that go well together. A. True B. False

Answers

Answer:

A. True

......................

Which type of document is not likely to print well on a laser printer?
Select one:
a. report with numerous high-glossy photographs
b. report with text and basic geometric shapes
c. report with text and some pie charts

Answers

probably C since pie charts aren't really used for laser printers from my knowledge.

Fill in the blank with the correct response.
Fast Ethernet is ______times faster than Ethernet.

Answers

Answer: 100 Mbps

Explanation: Fast Ethernet runs 100 Mbps and Ethernet offers up to 1 Gbps.

Fast Ethernet is 10 times faster than Ethernet.

What is Ethernet?

Metcalfe modified the name to "Ethernet" in 1973. He did this to demonstrate that any computer, not just Alto's, would be supported by the technology he had developed.

He chose the term "Ether" to refer to the physical medium that carries bits to stations, which is a crucial aspect of the system. Fast Ethernet transmission, which is at least 10 times faster than standard Ethernet, helps maintain compatible connections to high-speed servers.

It reduces bandwidth bottlenecks for network systems running multiple IP video cameras and the Internet of Things and supports seamlessly complex networks that simultaneously run a number of bandwidth-hungry software programs.

Therefore, fast Ethernet is 10 times faster than Ethernet.

To learn more about Ethernet, refer to the link:

https://brainly.com/question/13441312

#SPJ2

use the __________ to measure small amount of liguid

Answers

The volumetric flask is use to measure

you can increase the resonant frequency of a series-tuned RLC circuit by

Answers

you need to increase l.

Answer:

  decreasing the inductance or capacitance or both

Explanation:

The frequency of a resonant LC circuit is inversely proportional to the square root of the product of L and C. Thus increasing the resonant frequency requires decreasing the product of L and C. This can be done by decreasing L, decreasing C, or both.

CHALLENGE ACTIVITY 5.2.3: Basic while loop expression. Write a while loop that prints userNum divided by 4 (integer division) until reaching 2 or less. Follow each number by a space. Example output for userNum = 160: 40 10 2 Note: These activities may test code with different test values. This activity will perform four tests, with userNum = 160, then with userNum = 8, then with userNum = 0, then with userNum = -1. See "How to Use zyBooks". Also note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds, and report "Programend never reached." The system doesn't print the test case that caused the reported message.

Answers

Answer:

input with 160

output: 40 10 2

Explanation:

import java.util.Scanner;

//Define the class divideFour

public class divideFour

{

  public static void main(String[] args)

  {

      //Declaration of variables as integer

      int userNum;

      //set an input

      userNum = 160;

      //Run the while loop until the conditions are not satisfied.

      while(userNum>2)

      {

          //Divide userNum by 4 and store it in the same.

          userNum = userNum/4;

          //Print the new value of the userNum

          System.out.print(userNum+" ");

      }

      System.out.print("");

  }

}

When you create a calculated item for a field in a PivotTable, it appears as a new item within the field. Question 4 options: True False

Answers

When you create a calculated item for a field in a PivotTable, it appears as a new item within the field is a false statement.

What is a calculated item in a pivot table?

A Calculated Item is known to be a kind of custom formula that is seen in an Excel pivot table.

It is known to be one that can use the sum of other items in the same field. For example, when a person calculate the sum of 2 other items in a field. Note that Calculated items are not depicted or shown in the PivotTable Field List.

Learn more about PivotTable from

https://brainly.com/question/15214258

How are images added to a website? CODING

Answers

Answer:

Depends

Explanation:

This is what I know and I researched some years back

Copy the URL of the image you wish to insert.

Next, open your index. html file and insert it into the img code. Example: <img src=”(your image URL here)”>

Save the HTML file. The next time you open it, you'll see the webpage with your newly added image.

Explanation:

Hi! I also don't know how to add images since im new to the app too, I've read some of the comments from the other answer and i found it really helpful too! Im just answering so that he can get brainliest! And im sorry if im not supposed to answer if i dont know the answer,,

In not more than 3 pages discuss the concept of digital literacy

Answers

I don’t know if you want me something to

Which of the following hardware devices could you install without having to hire an experienced professional? Check all of the boxes that apply.

external hard drive

internal hard drive

external speakers

RAM

video card

MP3 player

Answers

The hardware devices that can be installed without hiring an experienced professional are as follows:

external hard driveexternal speakersMP3 player

What are hardware devices?

The hardware devices is the external device that is connected to the computer system. It helps to either give inputs or take outputs from the computer system.

The examples of hardware devices are external hard drive, external speaker, and MP3 player that does not require any technical person for their connection.

Learn more about hardware devices, here:

https://brainly.com/question/26475462

#SPJ2

Use python
def exec_2(f):
f()
f()
any function that is passed into exec_2() will be executed twice without parameters. Your task is to write a function exec_4(f) that takes in a function f as a parameter and executes the function f 4 times using the function exec_2. The function f in this case will draw a cute koala bear, and, in conjunction with, exec_4(), you will draw 4 koalas on the same tree! Suppress the newline in the print statement for the koala, this can be done using print's end argument
def exec_2(f):
f()
f()
def exec_4(f):
# define this function using exec_2
# define a new function here that prints out the koala once
# use your function and exec_4 to draw 4 koala bears!

Answers

Answer:

Here is the Python program:

def exec_2(f):

    f()

    f()

   

def exec_4(f):

    exec_2(f)

    exec_2(f)

   

def print_koala():

    print("koala")    

exec_4(print_koala)

Explanation:

The program works as follows:

First method:

def exec_2(f):

f()

f()

any function that is passed into exec_2() will be executed twice without parameters.

Second method:

def exec_4(f):

    exec_2(f)

    exec_2(f)

function exec_4(f) takes in a function f as a parameter and executes the function f 4 times using the function exec_2. At first exec_2(f) call the function f is executed twice and and second exec_2(f) call the function f is again executed twice so the function f executes 4 times in total.

Third method:

def print_koala():

    print("koala")  

a function that prints out the koala once

This function has a print statement which is passed the string koala to print on output screen.

exec_4(print_koala)

function exec_4 is used to print koala four times. This function exec_4 takes as argument the function print_koala() So this works as follows:

exec_4(print_koala)

The body of exec_4 executes as:

exec_2(print_koala)

exec_2(print_koala)

Now at first call to exec_2(print_koala) the program moves to the function exec_2 which executes print_koala()  method twice. Since print_koala() method has a print statement print("koala") so this is executed twice:

koala                                                                                                                                           koala

Now at second call exec_2(print_koala) the program moves to the function exec_2 which executes print_koala()  method twice again. Since print_koala() method has a print statement print("koala") so this is executed again twice:

koala                                                                                                                                           koala

So the output of the entire above program is:

koala                                                                                                                                           koala                                                                                                                                           koala                                                                                                                                           koala

The screenshot of program along with its output is attached.

if i press the home button of the phone so it opens but how it opens?
Please answer with explanation ​

Answers

Answer:

by its system software

Explanation:

it is programmes by programmers like that its language is binary (0,1) so thats y when we switch it it gets to on just because that button is programmed like that if the home button wasn't on the mobile the mobile would not work it would be useless...

identify and state the value of hardware components​

Answers

Answer:

Explanation:

Hardware is the most visible part of any information system: the equipment such as computers, scanners and printers that is used to capture data, transform it and present it to the user as output. Although we will focus mainly on the personal

If a user inserts a piece of clip art over some text but does not want the art to block the text, the user should select
the piece of clip art and click which option?
OBring Forward
OSend Backward
O Align
ORotate

Answers

Answer:

send backward

Explanation:

Answer:

Send Backwards

(1 point)
5. Which of the following types of professionals are most likely to perform administrative tasks
during training?
O Market research analysts
O Public relations specialists
O Advertising sales agents
O Advertising, marketing, and promotions managers

Answers

Answer: b public relations specialist

Explanation: took the quiz on edge, got 100%

With respect to computer hardware, what is a major difference between Mac OS and Windows or Linux?

Answers

Answer:

Key Differences Between Linux and MAC and Windows

Windows is dominant over the other two as 90% of users prefer Windows. Linux is the least used operating system with users accounting for 1%. ... MAC is costlier than Windows and the user is forced to buy a MAC system built by Apple.

What can be done in order to secure a WLAN/wireless access point?

Answers

Answer:

this may help "Change default passwords. ...

Restrict access. ...

Encrypt the data on your network. ...

Protect your Service Set Identifier (SSID). ...

Install a firewall. ...

Maintain antivirus software. ...

Use file sharing with caution. ...

Keep your access point software patched and up to date."

Explanation:

1. What is a program? Please answer properly it doesnt matter how long it takes. ill give brainliest if you want just ask! :3

Answers

Answer:

A program is a type of app used for coding and programming. It is also a real-life term for a system that helps people with problems and issues they cannot fix by themselves.

what would players do in Mobile legends bang bang report you for while playing The game

Answers

Answer:

For being Annoying

Explanation: because that game sucks.

When James added a date field to a PivotTable, Excel grouped the date values into quarters, months, and years. He does not want to group the data this way, so he clicks the Remove button on the PivotTable Tools Analyze tab.

a. True
b. False

Answers

When James clicks the Remove button on the PivotTable Tools Analyze tab is a true statement.

What is PivotTable?

A PivotTable is known to be a kind of interactive method that is used to quickly make a summary of large amounts of data.

Note that this table is one that a person can use to analyze numerical data thoroughly and it is known to be one that answer quick and unplanned questions about one's data.

Note that one can  remove the set date field without having any effect on the year or quarter fields.

Learn more about PivotTable from

https://brainly.com/question/15214258

=SUM(A2:A19,013,855,19)
What is the meaning of sum

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The meaning of the sum is to add the value of the given cells. Basically,the meaning of the sum is the addition of numbers.

For example, in excel write in the formula bar, "=Sum()" its meaning is to add the value of all the given reference cells. As given in the question, "=Sum()" will add the value of the cells A2,A19, O13 and then add into 855 and 19. After all this, show the addition result in the cells where this formula is written.

Which step do you think is most useful from big data life cycle and why?

Answers

Answer:

Big data lifecycle consists of four phases: data collection, data storage, data analysis, and knowledge creation. Data collection phase consists of collecting data from different sources. In this phase, it is important to collect data from trusted data sources.

I think business cases analysis is useful step because (BCA) provides a best-value analysis that considers not only cost but other quantifiable and non-quantifiable factors supporting an investment decision. This can include but is not limited to, performance, producibility, reliability, maintainability, and supportability enhancements

Explanation:

mark me brainliest

TRUE or FALSE.

2.2 Connectivity is the term used to describe the ability to connect to the internet by using a device
such as a computer or cell phone

Answers

Answer:

True

Explanation:

Because it is the very best way to get it done

Write the following functions. Each function needs function comments that describes function and its parameters double sphereVolume( double radius) double sphereSuface( double radius) double cylinderVolume( double radius, double height) double coneSurface( double radius, double height) double coneVolume( double radius, double height) That computes the volume and surface of the sphere with radius, a cylinder with a circular base with radius radius , and height height , and a cone with a circular base with radius radius , and height height . Then write a test program to prompt user to enter values of radius and height, call six functions and display the results c++

Answers

Answer:

Output

height: 10

radius: 2

Cylinder volume: 125.6

Cone Surface: 76.6037

Cone Volume: 41.8667

Sphere volume: 33.4933

Sphere surface: 50.24

Cylinder volume: 125.6

Explanation:

//Declaring variables

#include <iostream>

#include <cmath>

using namespace std;

//Defining Pi value

const double PI=3.14;

//Decliring the functions

//volume function for cone

double volumeCone(double r,double h){

       return  PI * r * r  * (h/3);

}

//volume function for sphere surface

double surfaceSphere(double r){

       return 4 * PI  * r * r;

}

//volume function for cylinderVol

double cylinderVol(double r,double h){

       return  PI * r * r * h;

}

//volume function for sphere volume

double sphereVol(double r){

       return 4/3.0 * PI * r * r * r;

}

//volume function for cone surface

double surfaceCone(double r,double h){

       return  PI * r * (r+sqrt(h *h + r  * r));

}

int main(){

       double r,h;

//print the values of height and radius

       cout<<"height: ";

       cin>>h;

       cout<<"radius: ";

       cin>>r;

//print the values of geometric forms

       cout<<"Cylinder volume: "<<cylinderVol(r,h)<<endl;

       cout<<"Cone Surface: "<<surfaceCone(r,h)<<endl;

       cout<<"Cone Volume: "<<volumeCone(r,h)<<endl;

       cout<<"Sphere volume: "<<sphereVol(r)<<endl;

       cout<<"Sphere surface: "<<surfaceSphere(r)<<endl;

       cout<<"Cylinder volume: "<<cylinderVol(r,h)<<endl;

       

       

}

Other Questions
how are clouds and fog related to precipitation? Simple, short answer. 6th grade. Please reply fast, i will give a brainliest. What is Plaths key idea in this poem? What languge does she use to convey this to her audience? A summer camp wants to buy some new boats. It costs $381 to buy a new canoe and $354 to buy a new rowboat. How much more does it cost to buy a canoe than a rowboat? Use the drop-down menus to answer the questions.What does Paul say likely motivates him to let Mitchell ride Ghost Wind?Is Pauls motivation intrinsic or extrinsic? How many times greateris 1.837 X 10^9 than3.6x10^5 factor: a^2+b^2c^2+2ab what the answer and how you got it -2x/7=3x-46 what is life? I need THIS QUESTION AS SOON AS POSSIBLE PQRS is a parallelogram, mP=106 , and mQ=(11x14) .What is the value of x? How did Hammurabis Code change Babylonian society?PLS HELP A taxi ride cost a flat fee of of $5.00 plus an additional $1.75 per mile. How many miles would a persontravel if they paid $15.50? Half of the students in Maxs class volunteer at the local community center.Fifteen students do not volunteer.If there is 12 boys in Maxs class,how many girls are in his class What is 1 3/4 divided by 3? The Paleolithic Period began when humans first started doing which of the following? ; the boy to girl ratio is 10 to 8. If there are 16 girls in the class, how many boys are there? I need help dont know what to put in the blank space it about the tener + que y deber plz help What is the kind of clothing men like to wear the most?jackets and coatshatsrobessuits for a scientist, assessing the validity of information requires...A . specific knowledge B. a hypothesis C. experimentation D. questions If the police arrive at Larry's office without probable cause or a warrant and demand to search the premises, whichamendment protects him from this type of search?the Fourth AmendmentO the Fifth AmendmentO the Sixth AmendmentO the Eighth Amendment A battery provides a potential difference of 14V. What size current will flow through a 10 ohm resistor in this circuit?