What is the worst case time complexity of insertion sort where position of the data to be inserted is calculated using binary search

Answers

Answer 1

Answer:

O(n²)

Explanation:

The worse case time complexity of insertion sort using binary search for positioning of data would be O(n²).

This is due to the fact that there are quite a number of series of swapping operations that are needed to handle each insertion.


Related Questions

7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.

Answers

Answer:

True.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of trademarks, copyright and patents.

Hence, a patent is an example of a rare and valuable resource because it protects the intellectual property of an individual or business entity and as such serves as a medium for gaining royalties or valuable economic benefits.

True or false = the order of cannot be changed in slide shorter view ,true or false =menu bar is located just below the title bar plz solve thisss​

Answers

Answer:

True or false = the order of cannot be changed in slide shorter view ,true or false =menu bar is located just below the title bar plz solve thisss

True
Bbbhjhhhcghnbfyujvff

Write a pseudocode statement that declares the variable total so it can hold integers. Initialize the variable with the value 0

Answers

Answer:

Declare total = 0

Explanation:

Given

Variable name: total

Variable type: integer

Variable value: 0

Required

Write a pseudocode statement

Because total is meant to hold integer values, it can be initialized as:

total = 0

Using total = 0.0 means that total is meant to hold floating values. So, we make use of

total = 0

However, this variable must be declared before being initialized.

So, we make use of the following statement to declare the variable:

Declare total

"Declare total" and "total = 0" gives:

Declare total = 0

The marketing team at Universal Containers wants to send an email to each lead received from its website. The country of the incoming lead should determine the language of the email that will be sent to the lead. How can system administrator automate this process

Answers

Complete Question:

The marketing team at Universal Containers wants to send an email to each lead received from its website. The country of the incoming lead should determine the language of the email that will be sent to the lead. How can system administrator automate this process?

Group of answer choices.

A. Create an email template for each language and an assignment rule to send the appropriate template.

B. Create an email template for each language and an auto-response rule to send the appropriate template.

C. Create an email template for each language and a workflow rule to send the appropriate template

D. Create a single email template and use the translation workbench to translate and send the appropriate template

Answer:

B. Create an email template for each language and an auto-response rule to send the appropriate template

Explanation:

Workflow management systems can be defined as a strategic software application or program designed to avail companies the infrastructure to setup, define, create and manage the performance or execution of series of sequential tasks, as well as respond to workflow participants.

Basically, workflow management systems facilitates the automation and management of business processes and controls the movement of work through the business process.

Some examples of workflow management systems used around the world are YAWL, Windows Workflow Foundation, Apache ODE, Collective Knowledge, Workflow Gen, PRPC, Salesforce.com, jBPM, Bonita BPM etc.

In this scenario, the marketing team at Universal Containers wants to send an email to each lead received from its website.

Hence, the system administrator can automate this process by creating an email template for each language representing the leads received from various countries and an auto-response rule to send the appropriate template that match a specific lead.

Which of the following rights is NOT guaranteed by copyright?
Right to avoid criticism
Right to make derivatives
Right to reproduce a work
Right to sell, rent, or lend
Mark this question for review

Answers

Answer:

A. Right to avoid criticism

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Hence, the right that is not guaranteed by copyright laws is the right to avoid criticism because as an author or writer your literary work is subject to criticism from the readers and by extension the general public.

Match the appropriate words to complete the paragraph.Wireless networks have no clear boundaries, therefore securing communications requires strong (a)_____, (b)_____, and (c)_____ protocols. One of the most common wireless security threats is the presence of (d)_____ access points (APs). Rogue points can be set up for the benign purpose of free wireless access or for malicious purposes, such as gaining access to confidential data. Using an (e)_____ wireless hotspot, like so many found in public settings, leaves you vulnerable to become the victim of (f)_____.

Answers

Answer:

a. Encryption.

b. Authentication.

c. Strong.

d. Rogue.

e. Insecure.

f. Hacking.

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Wireless networks have no clear boundaries, therefore securing communications requires strong encryption, authentication, and strong protocols. One of the most common wireless security threats is the presence of rogue access points (APs). Rogue points can be set up for the benign purpose of free wireless access or for malicious purposes, such as gaining access to confidential data. Using an insecure wireless hotspot, like so many found in public settings, leaves you vulnerable to become the victim of hacking.

Which sensitivity level is not a default available in Outlook 2016?


Normal

Personal

Confidential

Company Only

Answers

Answer:

Company only

Explanation: The sensitivity levels available for Outlook 2016 are Normal, personal,private and confidential, this sensitivity levels helps users to the intentions of the user of the product and it will help to give their plan on what and how to utilize the product. It is very important to make use of the sensitivity levels in your Outlook for better usage of the Microsoft Outlook.

Answer:

company only

Explanation:

because i took the test edge2020

An application team plans to follow the 10-phase SDLC model. After the team identifies both functionality and security requirements, they begin coding. However, after a few weeks, confusion sets in between team members. What is the most logical reason for the confusion

Answers

Answer:

The team did not adequately formalize the software's design

Explanation:

The most logical reason for this confusion is the fact that the team did not adequately formalize the the software design.

The design approach has to do with clearly defining the architectural modules of the application. The requirements in the software requirement specification document would serve as input for the next phase. The documents are prepared and they give a definition of the overall system architecture.

The team got confused because they did not go through this phase of the 10-phase SDLC model.

Assume the names variable references a list of strings. Write code that determines whether 'Ruby' is in the names list. If it is, display the message 'Hello Ruby'. Otherwise, display the message 'No Ruby'. starting out with python

Answers

names = []

if "Ruby" in names:

   print("Hello Ruby")

else:

   print("No Ruby")

Just populate the names variable with whatever strings you want.

The code to display 'Hello Ruby' is shown below:

if 'Ruby' in names:

 print(' Hello Ruby')

else:

 print(' No Ruby')

What is If- else Statement?

The true and false parts of a given condition are both executed using the if-else statement. If the condition is true, the code in the if block is executed; if it is false, the code in the else block is executed.

In Python, the if statement is a conditional statement that determines whether or not a block of code will be performed. Meaning that the code block inside the if statement will be executed if the programme determines that the condition defined in the if statement is true.

Given:

We write an if- else statement  code using the 'Ruby' in names will True if 'Ruby' is in names as our condition

if 'Ruby' in names:

 print(' Hello Ruby')

else:

 print(' No Ruby')

Learn more about if- else statement here:

https://brainly.com/question/14003644

#SPJ5

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. What technologies should the IT manager use when implementing MFA?

Answers

Answer:

Push notifications.

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Multi-factor authentication is a security system process that requires a user to verify his or her identity by providing two categories of credentials. First of all, the user is required to provide his or her login credentials (username and password) and lastly, a unique PIN known as One Time Password (OTP) that was sent sequel to logging in.

In this scenario, a company is implementing multi-factor authentication (MFA) for all applications that store sensitive data. The information technology (IT) manager wants MFA to be non-disruptive and user friendly.

Hence, the technology the IT manager should use when implementing MFA is push notifications.

Push notifications refers to an internet-based communication system used for generating or creating messages that are sent automatically to the mobile phone of an end user even when the particular application is not in use or open. Push notifications are user-friendly because they can either be approved or denied by a user.

How many steps are in the SECRET to keyboarding success video?
4
5
6
7

Answers

Answer:

5

Explanation:

Answer:

there is 6 secrets

Explanation:

1. sit up straight

2.keep eyes on the txt

3.use the correct finger

4. keep a reasonable rhythm

5.erase your errors

6.tap the keys quickly

The East Coast sales division of a company generates 62 percent of total sales. Based on that percentage, write a Python program that will predict how much the East Coast division will generate if the company has $4.6 million in sales this year. You should not perform the calculation by hand and put the result into the program; instead, your program would write a formula to do the computation and display the result.

Answers

Answer:

def prediction(sales):

print(0.62 * sales)

prediction(4600000)

Explanation:

Code written in python :

We could write it out has a function :

The code is written has a function ;

'def' starts the function which is named prediction. The function takes in a single argument which is the amount of sales made. Since the percentage of sales generated is a constant pegged at 62%. The expression print( 0.62 * sales) outputs the amount generated by east coast. The function call; prediction(4600000) prints the amount generated if a sales of $4600000 is made.

There may be up to three types of security algorithms to enforce encryption and integrity in TLS. These relate to

Answers

Answer:

key exchange, encryption and secure hash.

Explanation:

TLS is an acronym for Transport Layer Security and it is a cryptographic protocol that provides authentication, privacy and data integrity on a network, usually over the internet.

Simply stated, TLS is used for providing authentication and encryption of data between two communicating systems on a network.

This ultimately implies that, TLS is a standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. TLS is an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.

There are three (3) types of security algorithms to enforce encryption and integrity in TLS. This includes;

I. Key exchange.

II. Encryption.

III. Secure hash.

The term technology includes: Group of answer choices Artifacts, machines, and physical products Information systems Institutional frameworks All of the above

Answers

Answer:

All of the above

Explanation:

Technology can be explained as the the application of science as well as knowledge to practically solve problems, and invention of tools. It can be regarded as knowledge that deals with engineering as well as applied sciences. Through technology alot of

machinery and equipment has been developed as a result of the application of scientific knowledge. One of the examples of technology is invention of internet. It should be noted that the term technology includes Artifacts, machines, and physical products as well as Information systems Institutional frameworks.

On early computers, every byte of data read or written was handled by the CPU (i.e., there was no DMA). What implications does this have for multiprogramming

Answers

Answer:

Multiprogramming will be extremely difficult to be achieved.

Explanation:

If every byte of data read or written is handled by the CPU the implications this will have for multiprogramming are not going to be satisfactory.

This is because, unlike before, after the successful completion of the input and output process, the CPU of a computer is not entirely free to work on other instructions or processes.

when you heat a pot on a stove, the handle gets warm. which type of heat transfer is possible

Answers

Answer:

conduction

Explanation:

The handle will warm up until it's total heat losses equal the total heat coming in. Heat comes in mostly by conduction from the body of the pot.

Answer:

Conduction, I think

Explanation:

Conduction is the heat transfer through objects touching.

Hope this helps :)

Complete the rest of this statement:
In computer science, a computer is a tool a computer scientist uses, but computer science is not
about the tools.
instead, computer science is about _____

Answers

Answer:

Computer science is about how computers work, in terms of programming, design and data processing.

Explanation:

Computer science is a discipline that studies issues related to information technology and its use, including the storage, processing, presentation, and transfer of information.

The fringes of computer science extend to many other sciences: for example, usability research is closely related to psychology and bioinformatics to biology, among others. Digital media research, on the other hand, has links to media science and communications research. Computer science also has a strong interaction with computational science and information society research examining the wider effects of data processing in different areas.

Computer science is about the operation of computers in aspects of programmingdata processing and analytics, and designs area.

What is computer science?

Computer science is concerned with the operation of computers in aspects of programming, data processing and analytics, and designs area.

Computer science is a field that investigates challenges connected to information technology and its applications, such as data storage, analysis, presentation, and data transmission.

The periphery of computer science expands to many other fields, such as its user interface usability, which is strongly connected to bioinformatics, a field tied to biological analysis, psychology, etc.

Learn more about computer science here:
https://brainly.com/question/22654163

Since JavaScript is case sensitive, one of the variables below needs to be
fixed: *
O var isGood = true
var isGood = "true"
O var isGood = false
var is Good = FALSE
,,, can someone answer the bottom one lol?

Answers

Answer:

var is Good = FALSE needs to be fixed

bottom answer is method.

Explanation:

var is Good = FALSE because you are assigning a boolean and in js booleans are all lower case.

Functions that are stored in object properties are called “methods”

In the lab, you experimented with three different antivirus software applications: AVG, Windows Defender, and MalwareBytes. Why might someone use more than one application to protect their computer

Answers

Answer:

Explanation:

Different antivirus softwares use different techniques for analyzing data on a computer in order to find malware or any harmful data. This can provide extra layers of security to your computer and hopefully prevent harmful software from causing serious damage if they enter the system. Also every antivirus software has their own database of virus signatures which they use to compare and detect these viruses. Some may have info on these harmful viruses that others do not. Regardless it is not smart to have various antivirus software because they consume lost of computer resources and will ultimately slow down your computer.

Choose the type of error described.

_____occurs when the result is wrong because of the programmer's mistake, such as multiplying two numbers when they should have been added

_____occurs when you use the wrong punctuation, such as print 'hello' without parentheses

_____occurs when the program starts running, but encounters an error such as trying to divide by zero


DUE TONIGHT!!!

Answers

Answer:

1. Logical error.

2. Syntax error.

3. Runtime error.

Explanation:

A compiler can be defined as a software program or application designed to read sets of sequential instructions written by programmers and to translate these set of instructions into binary digits for the execution of commands on the central processing unit (CPU) of a computer system.

The three (3) main types of error experienced by a compiler are;

1. Logical error: occurs when the result is wrong because of the programmer's mistake, such as multiplying two numbers when they should have been added

2. Syntax error: occurs when you use the wrong punctuation, such as print 'hello' without parentheses

3. Runtime error: occurs when the program starts running, but encounters an error such as trying to divide by zero

Which of the following are thin, lightweight laptops that possess strong processing
power and are more expensive than typical laptops?

Answers

Answer:

apple laptops

Explanation:

Suppose you want to find a specific piece of hardware at the lowest price, and you don't mind if it's used. Which type of purchase would be most likely

to meet that criteria?

large online retailer

local computer store

small online retailer

O consumer-to-consumer auction site

Answers

Answer:

consumer-to-consumer auction site

Explanation:

The best type of purchase for this scenario would be a consumer-to-consumer auction site. These sites allow anyone to make a publication selling their product. This publication can be seen by anyone around the world. It is the best way of finding the cheapest prices for a specific item. The condition of the items on these sites can vary. The majority of the time they are used items in good conditions, but can also be new items or very worn out items being sold for parts.

Consider an array of integers consisting of the numbers: 8 12 19 32 45 55 67 72 89 90 92. Suppose the binary search algorithm is applied to this list to search for the key 56 ( not in the list). Answer the following questions: What is the index of the first element in the array that is compared with the key and how is this index evaluated

Answers

Answer:

Answered below

Explanation:

Index of the first element compared to the key is 5. The element itself is 55.

This index is evaluated by the addition of the index of the first element which is 0(zero) and the the index of the last element which is 10.

( Index of the last element is determined by subtracting the one from the total number of elements)

After the addition, the result is divided by 2 to get the first index from which the binary search begins.

firstIndex = 0

lastIndex = array.length - 1

midpoint = (firstIndex + lastIndex) / 2

A circle is represented as a set of x and y coordinates of the screen pixel, where the shape of the circle is drawn, and an integer represent the diameter of the circle. Please design and implement the Circle class with. A constructor that take in parameter to initialize the member data fields of the class A method to set the coordinates of the Circle to a different location Give code to create a Circle object

Answers

Answer:

Answered below

Explanation:

//Program is written in Kotlin programming language

Class Circle(xCoordinate: Double, yCoordinate: Double, diameter: Int){

var coordinateX = xCoordinate

var coordinateY = yCoordinate

var circleDiameter = diameter

fun diffLocation(x1: Double, y1: Double){

coordinateX = x1

coordinateY = y1

print (coordinateX, coordinateY)

}

}

//Tester class

Class Main{

fun main( ){

val circle = Circle(2.34, 4.56, 10)

print(circle.coordinateX)

print (circle.coordinateY)

circle.diffLocation( 3.4, 2.8)

}

}

Sarah is having a hard time finding a template for her advertising business that she may be able to use at a later
date and also make it available to her colleagues.
What is her best option?

Answers

Answer:

Making a custom template.

Answer:

Creating a custom template

Explanation:

Hope that helped.

What is software piracy? Check all of the boxes that apply.


copying computer software or programs illegally


using someone’s ideas without giving them credit


making lots of copies and sharing with friends


breaking the security on software so it can be used illegally


knowing the laws regarding copyright and intellectual property

Answers

Answer:

Explanation:

Software Piracy includes all of the following:

copying computer software or programs illegallymaking lots of copies and sharing with friendsbreaking the security on software so it can be used illegally

All of these acts provide ways of individuals gaining access to the software illegally and without paying for it. Doing so ultimately prevents the software developers from making any money on the idea and all of the hard work that they have put into making that software.

Answer:

A C D

Explanation:

which of the following is an example of personal writing ​

Answers

Where are the choices?

this term describes a box opens up to provide additional options for working with a file

Answers

Answer:

Dialog box.

Explanation:

Dialog box describes a box that opens up to provide additional options for working with a file.

In Computer programming, software developers usually designed and develop a box-like area attached to all software applications or programs and file explorer for the completion of various tasks by the end users such as requesting for additional information or presentation of extra informations.

Some examples of the additional options made available by the dialog box are save as, rename, delete, copy etc.

Before you buy something you want, you should buy ___ ?

Answers

Answer:

The things you need.

Explanation:

People, today, are immersed in a capitalist and consumerist world that is constantly inducing the individual to acquire goods and services, that is, it transforms the individual into a consumer, being the fundamental link for the functioning of consumer societies .

Now, it is necessary that the individual, as a consumer, interprets his own needs and does not get carried away by the constant and overwhelming advertisements that companies launch on the market. In this way, he can cover his basic needs and then consume products that do not have that primary need.

Answer:

a microwave

Explanation:

3. Assuming that this incident took place in the United States, what law or laws has Henry violated?

Answers

Answer:

not enough info

Explanation:

who is Henry fdddd

Other Questions
Chong thinks of a Number adds 10 and then multiplies the number so obtained by 3, and get 42. If the number is n then write an equation for this Find the perimeter of the figure to the nearest hundredth. Which equation represents a line parallel to the lines whose equation is y= 2x-7 Can you please tell me the answer Two resistors are connected in parallel to a 12 V battery. The potential difference across one of the resistors is 12 v . Calculate the potential difference across the other resistor Convert 50,000 ML to mL1. 5 x 10^5 mL2. 5 x 10^-5 mL3. 5 x 10^13 mL4. 5 x 10^-13 mL The Miranda warning insures that the criminal suspects understand their constitutional rights relating to: how do you think Uncle Toms Cabin affected Abolitionists? Use a quote and explain in 3 sentences. * A jug is filled with 1 litre of orange juice. Four 200ml glasses are poured from the jug. How much orange juice is left in the jug? Which orbital diagram represents nitrogen (atomic number = 7 ) what are 5 notice and wonders about the poem at the Inauguration 2021 Simplify the rational expression: 4a-36/24-8a(__/2) so its test day and my teacher wants us to turn our cameras on in z0om in case we cheat or something. im trying to connect to her class in z0om but it keeps saying "connecting".class already started and im trying to log in. i've given up and decided to the test without being on z0om. do you guys think she will let me? would it be graded/? What is the slope of a line that is perpendicular to the line with equation 12x+3y=9? The speed of a water wave is 6.2 meters/sec. Its wave length is 0.50 meters. What is its frequency, cycles/see? a. 0.080 b. 12.0 c. 3.10 d. 4.60 e. 0.0806 What is the reference angle for 192?A 22B. 68C. 12D. 78 Robin invests $3,210 in an account that is compounded annually and paysan interest of 3.4% each year. By what factor is the investmentincreasing every year? Who negotiated with rights groups for a more peaceful march?A. the vice presidentB. the popec. Martin Luther King Jr. Find the value of x that makes A || B.1243522 = 2x + 10 and 24 = 4x + 80x= [?]Enter Please HELP PLEASE ITS A BIG GRADE