A sequential search of an n-element list takes ____ key comparisons if the item is not in the list.
A. 0
B. n/2
C. n
D. n2
Answer: C
Computer Science & Information Technology
You might also like to view...
Action
a) method, parameters. b) name, params. c) label, names. d) None of the above.
Computer Science & Information Technology
Forms are created using the ____ element.
A.
Computer Science & Information Technology
Layer ____ are snapshots of layer visibility, position, and appearance settings.
a. mockups b. indices c. prototypes d. comps
Computer Science & Information Technology
Which of the following protocols is often used for data compression, digital signing, encryption and decryption of messages, emails, files, and directories as well as to enhance the privacy of email communications?
A. EAP B. PGP C. CHAP D. HMAC
Computer Science & Information Technology