What is optimal strategy if n is known

Assignment Help Basic Computer Science
Reference no: EM1358657

Q1) Consider the numerical 20 questions game. In this game, player 1 thinks of a number in the range 1 to n. Player 2 has to figure out this number by asking the fewest number of true/false questions. Assume that nobody cheats.

(a). What is an optimal strategy if n in known?

(b). What is a good strategy is n is not known?

Reference no: EM1358657

Questions Cloud

Explain how has american express leveraged its brand : Explain how has American Express Leveraged its brand into customer segments and created value through different card and program offerings.
Leaders as agents of social change : Leaders as agents of social change - Can you provide an analysis of the role of leaders and managers as agents of social change.
Make the journal entry : Brennan Steel Corporation as lessee signed a lease agreement for equipment for five years, starting December 31, 2007. yearly rental payments of $32,000 are to be made at the beginning of each lease year.
Autism spectrum disorders : Many people do not know that Autism is actually just one disorder on an entire spectrum of disorders that fall under the category of Autism Spectrum Disorders.
What is optimal strategy if n is known : Consider the numerical 20 questions game. In this game, player 1 thinks of a number in the range 1 to n. Player 2 What is an optimal strategy if n in known?
Determine the value of the electric potential : Determine the value of the electric potential. calculate the acceleration of the ball when it is 3 cm from the surface and again at the position determined in part b.
Current occupational environment : Current Occupational Environment - What changes in the economy and society have helped create the current occupational environment?
Elucidate what could be done to encourage people to spend : Elucidate what could be done to encourage people to spend more so as to increase aggregate demand and invariably, create employment possibilities.
Design a program using structured pseudocode : Design a program using structured pseudocode as demonstrated in the lectures and, ensuring all variables are declared, prompt the user for the appropriate input and display a meaningful output message.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Results of password cracker designed for operating system

Download a password cracker designed for your operating system. Run the cracker on your system. Explain the results from the cracker.

  Explaining difficulties in managing information resources

Considering difficulties in managing information resources, explain in scholarly detail why risk management must involve in the following elements to include threats,

  Write difference between logical and physical modeling

What is the difference between logical and physical modeling? Give three reasons why logical models are superior for structuring business requirements.

  Activity diagram of each step of ordering pizza

Draw an activity diagram representing each step of the process; from the moment you pick up the phone to the point where you are eating the pizza.

  Page translation table for virtual memory system

Design a page translation table to meets the requirements of virtual memory system.

  Adding two unsigned and signed binary numbers

Add the two binary numbers and interpret the sum assuming that the numbers are (1) unsigned, and (2) signed.

  Procedural structure of a simple inventory-accounting system

Using a structure chart, recognize the procedural structure of a simple inventory/accounting system for a small store (perhaps a rivately owned curio shop in a resort community)

  Explain one technological device

Explain one technological device in 350 to 700 words. Include the following:When did it come (or will it potentially come) into existence? What scientific or technological reasoning explains how this potential will be (or can be) be reached in t..

  Assessing security risks for determining infrastructure

As part of project to assess security risks for determining infrastructure, you have found that other managers often have various ideas on severity and levels of risk.

  Explaining seven steps of information gathering

Write and explain the seven steps of information gathering.

  Prove by induction of recurrence relation has solution

Describe why Kim's recurrence relation is correct. Prove by induction that Kim's recurrence relation has solution: M(k) = 3^(k - 1).

  Information culture have negative impact on apple-s business

Which of the given information cultures would have the greatest negative impact on Apple's business? Information-functional culture, Information-sharing culture.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd