SlideShare uma empresa Scribd logo
1 de 35
Baixar para ler offline
Binary Search
Illustrated walk through
Iterative binary search
int begin = 0;
int last = array.Length - 1;
int mid = 0;
while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

Part #1 Initialize pointers

Part #2 Search
begin

last

mid
x

4

This is what we
search for

[0]

[1]

[2]

[3]

2

4

5

6

Let’s look for 4
begin

0

x
last

mid

3

0
[0]

[1]

[2]

[3]

2

4

5

6

int begin = 0;
int last = array.Length - 1;
int mid = 0;

4
begin

0

x

0 <= 3
is true
mid

last

3

0
[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

4
begin

0

x
last

(0+3)/2 = 1

mid

3

1

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

4
begin

0

x
last
mid

4

3

1

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

4<4
is false
begin

0

x
last
mid

4

3

1

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if ( array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

4>4
is false
begin

0

x
last
mid

4

3

1

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}

We found x=4 at
index 1!

return -1;
begin

last

mid
x

5

This is what we
search for

[0]

[1]

[2]

[3]

2

4

5

6

Let’s look for 5
begin

0

x
last

mid

3

0
[0]

[1]

[2]

[3]

2

4

5

6

int begin = 0;
int last = array.Length - 1;
int mid = 0;

5
begin

0

x

0 <= 3
is true
mid

last

3

0
[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

5
begin

0

x
last

(0+3)/2 = 1

mid

3

1

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

5
begin

0

x
last
mid

5

3

1

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

4<5
is true
begin

2

x
last

mid

3

1

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

5
begin

2 <= 3
is true

2

x
last

mid

3

1

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

5
begin

2

x
last

(2+3)/2 =2

mid

3

2

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

5
begin

2

x
last

mid

3

2

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

5

5<5
is false
begin

2

x
last

mid

3

2

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if ( array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

5

5>5
is false
begin

2

x
last

mid

5

3

2

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}

We found x=5 at
index 2!

return -1;
begin

last

mid
x

6

This is what we
search for

[0]

[1]

[2]

[3]

2

4

5

6

Let’s look for 6
begin

0

x
last

mid

3

0
[0]

[1]

[2]

[3]

2

4

5

6

int begin = 0;
int last = array.Length - 1;
int mid = 0;

6
begin

0

x

0 <= 3
is true
mid

last

3

0
[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

6
begin

0

x
last

(0+3)/2 = 1

mid

3

1

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

6
begin

0

x
last
mid

6

3

1

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

4<6
is true
begin

2

x
last

mid

3

1

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

6
begin

2 <= 3
is true

2

x
last

mid

3

1

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

6
begin

2

x
last

(2+3)/2 =2

mid

3

2

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

6
begin

2

x
last

mid

3

2

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

6

5<6
is true
begin
last
mid

3
3

2

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

x

6
begin
last

3 <= 3
is true
mid

3
3

2

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

x

6
begin
last

3

mid

(3+3)/2 = 3

3

3

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

x

6
begin

3

last

3

mid

3

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

x

6

6<6
is false
begin

3

last

3

mid

3

[0]

[1]

[2]

[3]

2

4

5

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if ( array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}
return -1;

x

6

6>6
is false
begin

3

last

3

mid

3

[0]

[1]

[2]

4

5

6

[3]

2

x

6

while (begin <= last) {
mid = (begin + last) / 2;
if (array[mid] < x) {
begin = mid + 1;
}
else if (array[mid] > x) {
last = mid - 1;
}
else {
return mid;
}
}

We found x=6 at
index 3!

return -1;

Mais conteúdo relacionado

Mais procurados

ゲーム理論BASIC 演習4 -交渉集合を求める-
ゲーム理論BASIC 演習4 -交渉集合を求める-ゲーム理論BASIC 演習4 -交渉集合を求める-
ゲーム理論BASIC 演習4 -交渉集合を求める-ssusere0a682
 
ゲーム理論BASIC 演習6 -仁を求める-
ゲーム理論BASIC 演習6 -仁を求める-ゲーム理論BASIC 演習6 -仁を求める-
ゲーム理論BASIC 演習6 -仁を求める-ssusere0a682
 
The Ring programming language version 1.5.3 book - Part 69 of 184
The Ring programming language version 1.5.3 book - Part 69 of 184The Ring programming language version 1.5.3 book - Part 69 of 184
The Ring programming language version 1.5.3 book - Part 69 of 184Mahmoud Samir Fayed
 
Grouping (MOTM 2010.02)
Grouping (MOTM 2010.02)Grouping (MOTM 2010.02)
Grouping (MOTM 2010.02)Kevin Munc
 
Maths vegas functions_review
Maths vegas functions_reviewMaths vegas functions_review
Maths vegas functions_reviewJJkedst
 
A Course in Fuzzy Systems and Control Matlab Chapter two
A Course in Fuzzy Systems and Control Matlab Chapter twoA Course in Fuzzy Systems and Control Matlab Chapter two
A Course in Fuzzy Systems and Control Matlab Chapter twoChung Hua Universit
 
4 order of operations 125s
4 order of operations 125s4 order of operations 125s
4 order of operations 125sTzenma
 
23 order of operations
23 order of operations23 order of operations
23 order of operationsalg1testreview
 
Program Language - Fall 2013
Program Language - Fall 2013 Program Language - Fall 2013
Program Language - Fall 2013 Yun-Yan Chi
 
solucionario de purcell 1
solucionario de purcell 1solucionario de purcell 1
solucionario de purcell 1José Encalada
 
11 x1 t09 03 rules for differentiation (2013)
11 x1 t09 03 rules for differentiation (2013)11 x1 t09 03 rules for differentiation (2013)
11 x1 t09 03 rules for differentiation (2013)Nigel Simmons
 
6.1 & 6.4 an overview of the area problem area
6.1 & 6.4 an overview of the area problem area6.1 & 6.4 an overview of the area problem area
6.1 & 6.4 an overview of the area problem areadicosmo178
 
ゲーム理論BASIC 第19回 -有限回繰り返しゲーム-
ゲーム理論BASIC 第19回 -有限回繰り返しゲーム-ゲーム理論BASIC 第19回 -有限回繰り返しゲーム-
ゲーム理論BASIC 第19回 -有限回繰り返しゲーム-ssusere0a682
 
Basic operations by novi reandy sasmita
Basic operations by novi reandy sasmitaBasic operations by novi reandy sasmita
Basic operations by novi reandy sasmitabeasiswa
 

Mais procurados (17)

ゲーム理論BASIC 演習4 -交渉集合を求める-
ゲーム理論BASIC 演習4 -交渉集合を求める-ゲーム理論BASIC 演習4 -交渉集合を求める-
ゲーム理論BASIC 演習4 -交渉集合を求める-
 
ゲーム理論BASIC 演習6 -仁を求める-
ゲーム理論BASIC 演習6 -仁を求める-ゲーム理論BASIC 演習6 -仁を求める-
ゲーム理論BASIC 演習6 -仁を求める-
 
The Ring programming language version 1.5.3 book - Part 69 of 184
The Ring programming language version 1.5.3 book - Part 69 of 184The Ring programming language version 1.5.3 book - Part 69 of 184
The Ring programming language version 1.5.3 book - Part 69 of 184
 
Grouping (MOTM 2010.02)
Grouping (MOTM 2010.02)Grouping (MOTM 2010.02)
Grouping (MOTM 2010.02)
 
24 order of operations
24 order of operations24 order of operations
24 order of operations
 
Maths vegas functions_review
Maths vegas functions_reviewMaths vegas functions_review
Maths vegas functions_review
 
A Course in Fuzzy Systems and Control Matlab Chapter two
A Course in Fuzzy Systems and Control Matlab Chapter twoA Course in Fuzzy Systems and Control Matlab Chapter two
A Course in Fuzzy Systems and Control Matlab Chapter two
 
4 order of operations 125s
4 order of operations 125s4 order of operations 125s
4 order of operations 125s
 
23 order of operations
23 order of operations23 order of operations
23 order of operations
 
Ken20150417
Ken20150417Ken20150417
Ken20150417
 
Program Language - Fall 2013
Program Language - Fall 2013 Program Language - Fall 2013
Program Language - Fall 2013
 
solucionario de purcell 1
solucionario de purcell 1solucionario de purcell 1
solucionario de purcell 1
 
Algebra 6
Algebra 6Algebra 6
Algebra 6
 
11 x1 t09 03 rules for differentiation (2013)
11 x1 t09 03 rules for differentiation (2013)11 x1 t09 03 rules for differentiation (2013)
11 x1 t09 03 rules for differentiation (2013)
 
6.1 & 6.4 an overview of the area problem area
6.1 & 6.4 an overview of the area problem area6.1 & 6.4 an overview of the area problem area
6.1 & 6.4 an overview of the area problem area
 
ゲーム理論BASIC 第19回 -有限回繰り返しゲーム-
ゲーム理論BASIC 第19回 -有限回繰り返しゲーム-ゲーム理論BASIC 第19回 -有限回繰り返しゲーム-
ゲーム理論BASIC 第19回 -有限回繰り返しゲーム-
 
Basic operations by novi reandy sasmita
Basic operations by novi reandy sasmitaBasic operations by novi reandy sasmita
Basic operations by novi reandy sasmita
 

Semelhante a Binary search: illustrated step-by-step walk through

AI CHALLENGE ADMIN
AI CHALLENGE ADMINAI CHALLENGE ADMIN
AI CHALLENGE ADMINAnkit Gupta
 
Prefix Sum Algorithm | Prefix Sum Array Implementation | EP2
Prefix Sum Algorithm | Prefix Sum Array Implementation | EP2Prefix Sum Algorithm | Prefix Sum Array Implementation | EP2
Prefix Sum Algorithm | Prefix Sum Array Implementation | EP2Kanahaiya Gupta
 
Question 1,2,4 ------------------------------------Please check.pdf
Question 1,2,4 ------------------------------------Please check.pdfQuestion 1,2,4 ------------------------------------Please check.pdf
Question 1,2,4 ------------------------------------Please check.pdfanandhomeneeds
 

Semelhante a Binary search: illustrated step-by-step walk through (6)

Sorting techniques
Sorting techniques Sorting techniques
Sorting techniques
 
AI CHALLENGE ADMIN
AI CHALLENGE ADMINAI CHALLENGE ADMIN
AI CHALLENGE ADMIN
 
Ds sorting
Ds sortingDs sorting
Ds sorting
 
Coordinates-Midpoint-Bingo-M.pptx
Coordinates-Midpoint-Bingo-M.pptxCoordinates-Midpoint-Bingo-M.pptx
Coordinates-Midpoint-Bingo-M.pptx
 
Prefix Sum Algorithm | Prefix Sum Array Implementation | EP2
Prefix Sum Algorithm | Prefix Sum Array Implementation | EP2Prefix Sum Algorithm | Prefix Sum Array Implementation | EP2
Prefix Sum Algorithm | Prefix Sum Array Implementation | EP2
 
Question 1,2,4 ------------------------------------Please check.pdf
Question 1,2,4 ------------------------------------Please check.pdfQuestion 1,2,4 ------------------------------------Please check.pdf
Question 1,2,4 ------------------------------------Please check.pdf
 

Mais de Yoshi Watanabe

Create images with AI models.pptx
Create images with AI models.pptxCreate images with AI models.pptx
Create images with AI models.pptxYoshi Watanabe
 
Git コンフリクト
Git コンフリクトGit コンフリクト
Git コンフリクトYoshi Watanabe
 
Find n th fibonacci iteratively - illustrated walkthrough
Find n th fibonacci iteratively - illustrated walkthroughFind n th fibonacci iteratively - illustrated walkthrough
Find n th fibonacci iteratively - illustrated walkthroughYoshi Watanabe
 
Binary search tree exact match - illustrated walkthrough
Binary search tree   exact match - illustrated walkthroughBinary search tree   exact match - illustrated walkthrough
Binary search tree exact match - illustrated walkthroughYoshi Watanabe
 
Quicksort: illustrated step-by-step walk through
Quicksort: illustrated step-by-step walk throughQuicksort: illustrated step-by-step walk through
Quicksort: illustrated step-by-step walk throughYoshi Watanabe
 

Mais de Yoshi Watanabe (7)

Create images with AI models.pptx
Create images with AI models.pptxCreate images with AI models.pptx
Create images with AI models.pptx
 
Git フェッチ
Git フェッチGit フェッチ
Git フェッチ
 
Git リベース
Git リベースGit リベース
Git リベース
 
Git コンフリクト
Git コンフリクトGit コンフリクト
Git コンフリクト
 
Find n th fibonacci iteratively - illustrated walkthrough
Find n th fibonacci iteratively - illustrated walkthroughFind n th fibonacci iteratively - illustrated walkthrough
Find n th fibonacci iteratively - illustrated walkthrough
 
Binary search tree exact match - illustrated walkthrough
Binary search tree   exact match - illustrated walkthroughBinary search tree   exact match - illustrated walkthrough
Binary search tree exact match - illustrated walkthrough
 
Quicksort: illustrated step-by-step walk through
Quicksort: illustrated step-by-step walk throughQuicksort: illustrated step-by-step walk through
Quicksort: illustrated step-by-step walk through
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Binary search: illustrated step-by-step walk through