1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
3 years ago
9

Rewrite the MERGE procedure so that it does not use sentinels, instead stopping once either array L or R has had all its element

s copied back to A and then copying the remainder of the other array back into A.
Computers and Technology
1 answer:
Strike441 [17]3 years ago
4 0

Answer:

Merge sort is a sorting technique based on divide and conquer technique.

Explanation:

MERGE(A, p, q, r)

   n1 = q - p + 1

   n2 = r - q

    L[1..n1] and R[1..n2]   this creates the new array

   for i = 1 to n1

       L[i] = A[p + i - 1]

   for j = 1 to n2

       R[j] = A[q + j]

   i = 1

   j = 1

   for k = p to r

       if i > n1

           A[k] = R[j]

           j = j + 1

       else if j > n2

           A[k] = L[i]

           i = i + 1

       else if L[i] ≤ R[j]

           A[k] = L[i]

           i = i + 1

       else

           A[k] = R[j]

           j = j + 1

You might be interested in
Both tangible and intangible property? are not covered by intellectual property protections. are both covered by intellectual pr
LiRa [457]

Answer:

B -both covered by intellectual property protections.

Explanation:

3 0
3 years ago
4.8 Code Practice: Question 1
Furkat [3]

Answer:

c = 1 # global variable

    jhjl jh

def add(): c = 1 # global variable

def add():

   print(c)

add()

   c = c + 2 # increment c by 2

   print(c)

add()

Explanation:

4 0
2 years ago
Read 2 more answers
Jake is preparing his resume. He is applying for the position of iOS application developer at a large software company. He wants
gavmur [86]

Answer:

C. Modern Programming Language Skills

Explanation:

4 0
3 years ago
How does a Graphical User Interface (GUI) interact with a desktop or laptop computer?
Viefleur [7K]

Windows, icons, menus, and pointers does  a  graphical  user interface (GUI) interact with a  desktop or laptop computer.

  • Windows, icons, menus, and pointers

<u>Explanation:</u>

Graphics user interface (gui) made a big resolution on desktop or laptop or tablet or workstation industries. In olden days till  1994 still, people were using the black and white computer where a desktop consists of keyboard and printer and monitors where display color white and black.

If we open a picture it will display only in black and white so games are in black and white mode. After windows  3.1  we have seen color picture and mouse interface is used. Since technology developed and interface in GUI is also developed improved in windows icon menu and mouse pointer.

As technology developed we going back to a dark mode such as black and white mode.

4 0
3 years ago
Advanced Communications, a leading mobile communication service provider, has a deal with On-the-Go, a chain of several thousand
Stells [14]

Answer:

The answer is "Strategic alliance"

Explanation:

These alliances are an indo-organizational type in which several trading stakeholders decide to put resources, transfer knowledge. It also collaborates in environmentally friendly-nomic price-creating exercises.

  • In this alliances major mobile phone service provider, Advanced Phone has a contract with On-the-Go, a chain of several thousand convenience stores nationwide.
  • It depends on synergy in both the assets and technical expertise to introduce to those of the partnership by any of the trade members, that's why the strategic alliance is the correct answer.

3 0
3 years ago
Other questions:
  • To create a formula in ___ you would first click in one of the cells. A.word b.excel c.facebook d.powerpoint
    13·1 answer
  • Why are video texts an example of multimedia? A. They use audio and visual elements together. B. They use one type of medium to
    13·2 answers
  • A company decides to reduce its IT labor force by hiring an external company to manage various aspects of IT administration, suc
    6·1 answer
  • Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
    9·1 answer
  • Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact tha
    5·1 answer
  • Rapid development programming languages eliminate the possibility of having bugs in code. True or False
    8·1 answer
  • A system is composed of four parts, J, K, L, and M. All four must function for the system to function. The four component reliab
    6·1 answer
  • Explain in your own words how remote-access Trojans (RATs) work. How can these be used by attackers? How would a network adminis
    10·1 answer
  • Which person would be the best fit for a career in the Information Technology field?
    6·2 answers
  • Importance of computer​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!