1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
3 years ago
15

One of the most studied computational problems is the ordering of a collection of values. Ordering is important because many pro

blems set on collections of values become easy if the elements of the collection are ordered.
Sorting by selection is an example of sorting algorithm.

This algorithm consists of the following steps:

1. It is looked for in the part disordered by the smaller element and it is changed the smaller element with the element under the marker.

2. A marker is used to divide the ordered and disordered parts of the vector. The value 0 is assigned to the bookmark.

3. The marker is advanced.

4. The process repeats until there is only one element from the marker.

Check the alternative that shows the correct ordering of the steps of the sort ordering algorithm.

Alternatives:

The)
1 - 2 - 3 - 4.

B)
1 - 2 - 4 - 3.

w)
2 - 1-4.

(d)
2 - 1-3.

and)
2-3-1-4.
Computers and Technology
1 answer:
andreyandreev [35.5K]3 years ago
7 0

I think the order should be 2-1-3-4, but the description of step 1 is confusing. In selection sort, you iterate from the point of the marker down through the entire list and find the smallest value, and swap that with the value at the marker. Then you advance the marker and repeat the process on the remainder of the list.

You might be interested in
What are some of the issues that organizations need to be aware of when designing and managing data?
tensa zangetsu [6.8K]

Answer and Explanation:

There are two primary issues.  

The principal issues is Security of data or information.

The information must be overseen such that it is upheld up regularly and kept secure from any catastrophic event or outer hacking.  

Second, when planning a framework to oversee information, we have to make it versatile and adaptable.

The data should be scalable , i.e., the component used to store the information must be effectively ready to develop as we collect more information or the sort of information contribution to the framework needs to change after some time.

7 0
4 years ago
Four differences between fourth and fifth generation of computers​
Juliette [100K]

Answer:

 The following are the four difference between the fourth and the fifth generation of the computer that are:

  • The fourth generation computer technology is basically based of the microprocessor. On the other hand, the fifth generation computer is based upon the artificial intelligence technology.  
  • The fourth generation computer system are faster in computation. Whereas, the fifth generation computer are more reliable and faster in speed as compared to all other generations.
  • The fifth generation computer are small in the size and more potable as compared to the fourth generation computer system.
  • Laptop, notebook and Chromebook are some of the example of fifth generation. Whereas, STAR 100 and IBM 4341 are the example of fourth generation.
7 0
3 years ago
)
I am Lyosha [343]

Photo metadata

Hope this helps

5 0
3 years ago
Which of the following sentences from the section "The Limits To Free Enterprise With A Mixed Economy" BEST develops a central i
kirza4 [7]
The correct answer is d so there you go
3 0
3 years ago
The User Datagram Protocol (UDP) is called the connectionless protocol because: It does not attempt to fix bad packets but resen
DochEvi [55]

Answer:

The User Datagram Protocol (UDP) is called the connectionless protocol because:

It does not attempt to fix bad packets or resend lost packets.

Explanation:

Ports are openings or entrance doors through which data packages have access to a PC or server.  TCP and UDP are transport protocols with port numbers.  TCP means Transmission Control Protocol.  They are used to connect two devices over the internet and other networks.  UDP means User Datagram Protocol.  They are used to connect applications and to speed the transfer of data.  Comparatively, UDP is faster, simpler, and more efficient than TCP.  TCP enables retransmission of lost data packets, which UDP cannot do.

4 0
3 years ago
Other questions:
  • HURRY
    5·1 answer
  • Which of the following tends to be true of silent film acting as opposed to sound film acting?
    7·1 answer
  • Which of the following about if statement is true? A. The condition is a Boolean expression B. A Boolean expression is something
    15·1 answer
  • Are the buying and selling of stocks centralized activities? Why or why not?
    10·2 answers
  • I live in Alabama and I’m ab to leave to go on a 3 week trip to France and I’m wondering how I can get LTE for my IPhone 6s Plus
    15·2 answers
  • Suppose that a 2M x 16 main memory is built using 256kB x 8 RAM chips and memory is word addressable, how many RAM chips are nec
    6·1 answer
  • Expectation on Information Technology Fundamental​
    12·1 answer
  • 3. The following is a dump of a UDP header in hexadecimal format. 0045DF000058FE20 a. What is the source port number? b. What is
    15·1 answer
  • Camera work is at the center of video production. True or False?
    14·1 answer
  • Which interpersonal skill is the most important for a telecom technician to develop?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!