1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
4 years ago
15

One of the most studied computational problems is the ordering of a collection of values. Ordering is important because many pro

blems set on collections of values become easy if the elements of the collection are ordered.
Sorting by selection is an example of sorting algorithm.

This algorithm consists of the following steps:

1. It is looked for in the part disordered by the smaller element and it is changed the smaller element with the element under the marker.

2. A marker is used to divide the ordered and disordered parts of the vector. The value 0 is assigned to the bookmark.

3. The marker is advanced.

4. The process repeats until there is only one element from the marker.

Check the alternative that shows the correct ordering of the steps of the sort ordering algorithm.

Alternatives:

The)
1 - 2 - 3 - 4.

B)
1 - 2 - 4 - 3.

w)
2 - 1-4.

(d)
2 - 1-3.

and)
2-3-1-4.
Computers and Technology
1 answer:
andreyandreev [35.5K]4 years ago
7 0

I think the order should be 2-1-3-4, but the description of step 1 is confusing. In selection sort, you iterate from the point of the marker down through the entire list and find the smallest value, and swap that with the value at the marker. Then you advance the marker and repeat the process on the remainder of the list.

You might be interested in
Do you need special software to create a web page?
Serjik [45]

Answer:

Many websites these days have done it for you, (Wix, Squarespace ect.)

If you want to start from scratch however, then I believe you do, I have only researched these websites which do it for you.

Hope this helped :)

5 0
4 years ago
Read 2 more answers
11111110110001001100010110111010 How many characters are encoded in<br> that binary data? *
omeli [17]

Answer:

33.

Explanation:

8 0
3 years ago
Read 2 more answers
Protocol 2 - Check for Errors
Lapatulllka [165]

Please note that the Problem to be solved from Protocol 1 is not provided hence the general answers. To construct and send, open a network environment a single multi-packet message, simply click "Add Packet" and then click "Send at Once".

<h3>How will the receiver know the order of the packets or if any are missing?</h3>

If the text or message sent does not make any reading sense, or if certain words are jumbled and out of place, then it is clear that something is wrong.

If the messages arrive in a coherent fashion, then the packet was fully received.

<h3>How will the receiver request missed packets and what will the sender do in response?</h3>

Where the users are familiar with the Transmission Control Protocol, lost packets can be detected when there is a timeout. Lost packets are referred to as Dropped packets.

Learn more about Packets at:
brainly.com/question/17777733

7 0
2 years ago
A ________ is a small message box that displays when the pointer is placed over a command button.
Aleonysh [2.5K]

An enhanced <u>ScreenTips</u> is a small message box that displays when the pointer is placed over a command button.

<h3>What are ScreenTips?</h3>

ScreenTips is known to be a term that connote a small windows that shows any kind of descriptive text if a person place the pointer on a command or on a control.

Note that Enhanced ScreenTips are found to be bigger windows that shows a lot of descriptive text than a ScreenTip.

Therefore, An enhanced <u>ScreenTips</u> is a small message box that displays when the pointer is placed over a command button.

Learn more about ScreenTips from

brainly.com/question/26677974

#SPJ1

6 0
2 years ago
The use of technology to observe a user's actions often without the user's knowledge is known as:
Margaret [11]

Answer:

C

Explanation:

Computer surveillance refers to spying that allows the viewer to gain access of all activity on the given computer.

5 0
3 years ago
Other questions:
  • A system of interlinked documents that are available on the internet is
    5·1 answer
  • What following functions does browser perform
    5·1 answer
  • The use of quick styles is a great way to save _____.
    6·1 answer
  • Which activity does not allow a person to perform any work while at the shop
    10·1 answer
  • Write a program that uses a loop to read 10 integers from the user. Each integer will be in the range from -100 to 100. After al
    10·1 answer
  • Which statement best describes antivirus software?
    13·1 answer
  • True or False
    11·1 answer
  • Which of the following characteristics differentiates PCM from BWF audio
    15·2 answers
  • The Program Manager just received approval of his proposed acquisition strategy with one exception: he has been directed to make
    7·1 answer
  • A department store maintains data on customers, products, and purchase records in three tables: customer, product, and purchase.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!