1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
2 years ago
12

Descending selection sort with output during execution

Computers and Technology
1 answer:
zvonat [6]2 years ago
6 0

Taking the input as a string, slicing it with a space as the delimiter, turning the divided portion into an integer, and then appending to the list.

<h3>Explanation:</h3>

def selection_sort_descend_trace(numbers):

i=len(numbers)

print("Output: ")

for num in range(0,i-1):# traversing from 0 to N-2, total N-1 iterations

val=numbers[num]

start=num+1

end=i

t=0

for j in range(start,end):

if(val<numbers[j]):

remember=j

val=numbers[j]

t=1

if(t==1):# swaping onlf if greater number is available

temp=numbers[num]

numbers[num]=val

numbers[remember]=temp

for p in range(i):# printing

print(numbers[p],end=' ')

print("\n")

if __name__ == "__main__":

print("Enter the integers separated by space: ")

numbers=[int(x) for x in input().split(' ')]

selection_sort_descend_trace(numbers)

For further details about the explanation, click here:

brainly.com/question/15728245

#SPJ1

You might be interested in
a limited-access expressway. A)allows vehicles to enter or exit only at certain place.B) does not permit trucks or buses.C)has n
zepelin [54]
Hello babe I just wanted to say hello
3 0
3 years ago
The following are sources of secondary data except _________. a libraries b data bases c focus groups d syndicated research e sc
sineoko [7]
<span>d syndicated research</span>
8 0
4 years ago
A company is deploying a file-sharing protocol across a network and needs to select a protocol for authenticating clients. Manag
VARVARA [1.3K]

Answer:

The answer is "Option C".

Explanation:

Among all four of the above, the application of Kerberos is securer. The consumer not just to validates the provider but also verifies the product to the clients with secure authentication.  

  • It offers a common interface between windows as well as other operating systems.  
  • The user login Smart Card gives much higher protection as it allows security with two factors, that's why except Option C other choices were wrong.
6 0
3 years ago
(Find the number of uppercase letters in a string) Write a recursive function to return the number of uppercase letters in a str
Leokris [45]
Def countUppercase(s):
count=0
for i in s:
if i.isupper():
count+=1
s=s.replace(i, "")
else:
s=s.replace(i, "")
countUppercase(s)
return count

element=input("Enter the string: ")
string=countUppercase(element)
print("\nNumber of upper letter in the string: ",string)

3 0
3 years ago
Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I
vitfil [10]

Answer:

64 bits.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the word size used by it is 64 bits.

3 0
3 years ago
Other questions:
  • Which mitigation technique would prevent rogue servers from providing false ip configuration parameters to clients?
    5·2 answers
  • Function of network security​
    9·1 answer
  • A program is run line by line to determine the source of a logic error. Which best describes the specific tool being used? (A.)c
    5·1 answer
  • Why should we continue to study and learn about ipv4 addressing if the available ipv4 address space is depleted?
    12·2 answers
  • One of the difficult decisions a systems analyst has to make when it comes to software is whether to recommend making, buying, o
    13·1 answer
  • I have a question involving do and for loops while using arrays.
    8·1 answer
  • Why does this app say im following a question? how do i make it stop?​
    14·2 answers
  • Assignment 1: silly sentences edhesive
    7·1 answer
  • State three advantage and disadvantages of Laser printer ​
    7·1 answer
  • Examples of pop in computer​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!