subject

The Binary Search algorithm works by testing a mid-point, then eliminating half of the list. In this exercise, you are going to take our binary search algorithm and add print statements so that you can track how the search executes. Inside of the recursive binary search function, add print statements to print out the starting, ending, and midpoint values each time. Then as you test a value, print out the results, either too high, too low, or a match. Sample OutputStarting value: 0Ending value: 9Testing midpoint value: 4Too high!Starting value: 0Ending value: 3Testing midpoint value: 1Too low!Starting value: 2Ending value: 3Testing midpoint value: 2Match!public class BinaryExplorer {public static void main(String[] args) {int[] testArray = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9};binaryRec(testArray, 8, 0, testArray. length - 1);}/*** Add Print statements to the binaryRec method:** Print Starting, ending, and midpoint values.** Print when you find a match** Print if you are too high or too low.***/public static int binaryRec(int[] array, int target, int begin, int end) {if (begin <= end){ int mid = (begin + end) / 2; // Base Case if (target == array[mid]) { return mid; } if (target < array[mid]) {return binaryRec(array, target, begin, mid - 1);} if (target > array[mid]) { return binaryRec(array, target, mid + 1, end);}} return -1; //Alternate Base Case - not found}}

ansver
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 00:00, amyeileen
11. is the ability to understand how another person is feeling. a. authority b. sympathy c. empathy d. taking a stand
Answers: 1
image
Computers and Technology, 22.06.2019 06:20, Masielovebug
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
image
Computers and Technology, 23.06.2019 09:30, nsjcbdhcb
Light travels at a speed of 186,000 miles a second. the distance light travels in a year is 5,865,690,000,000 miles/year 5,865,695,000,000 miles/year 58,656,950,000,000 miles/year 6,789,000,0000 miles/year
Answers: 1
image
Computers and Technology, 23.06.2019 21:20, nathanfletcher
In microsoft word, when you highlight existing text you want to replace, you're in              a.  advanced mode.    b.  automatic mode.    c.  basic mode.    d.  typeover mode
Answers: 1
You know the right answer?
The Binary Search algorithm works by testing a mid-point, then eliminating half of the list. In this...

Questions in other subjects:

Konu
Computers and Technology, 11.10.2021 19:50
Konu
Mathematics, 11.10.2021 19:50