The efficiency of the sequential search is ____.

A. O(n)
B. O(n log n)
C. O(log n)
D. O(n/2)


Answer: A

Computer Science & Information Technology

You might also like to view...

Assume permissions on a file allow you to write to the file but not to delete it.

a. Give a command to empty the file without invoking an editor. b. Explain how you might have permission to modify a file that you cannot delete.

Computer Science & Information Technology

The extraction operator used with cin is ____.

A. << B. >> C. , D. <>

Computer Science & Information Technology

It is a(n) ________ step in the disaster planning process to gather information on all of the company's assets

A) unnecessary B) vital early C) vital last D) low priority

Computer Science & Information Technology

Why is it hard to know the tool selection of attackers?

A. Smart hackers out there that have their own homegrown tool or automated robots B. Vendors make them by the dozen C. APIs and white papers take a long time to read D. One person cannot know all tools

Computer Science & Information Technology