1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
3 years ago
9

The quicksort is an example of a divide and conquer algorithm in that it divides the sorting problem into smaller problems by di

viding the list of items to be sorted into smaller subsets. The pivot is the mechanism that is used to segment the list. Describe how the quicksort works including a discussion of the pivot, how it is selected, and why the pivot is important to the quicksort.
Computers and Technology
1 answer:
ankoles [38]3 years ago
8 0

Answer:

The quicksort pivot is an arbitrary element within the collection that is being sorted.  Using the pivot point, the collection of elements is partitioned into two smaller lists of elements.  Using some logic, the smaller elements are placed left of the pivot point, and larger elements are placed to the right of the pivot point.  Ideally, you would prefer you pivot point to be a median of your dataset to optimize the creation of the two sublists into a balanced state.

Cheers.

You might be interested in
Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicompu
GuDViN [60]

Answer:

The system that will be more prone to attack or vulnerability is the  bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.

Explanation:

Solution

If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable  to unauthorized persons or individuals.

The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.

With this example, the chances of vulnerability or attacks increases from the following :

  • Accounts payable could be disturbed by changing cash in payment false.
  • Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.
  • Transaction fraud like hacking, masquerading are very common in a networked system.
3 0
2 years ago
A network interface port has collision detection and carrier sensing enabled on a shared twisted-pair network. From this stateme
hram777 [196]

Answer:

This is an Ethernet port operating at half duplex.

Explanation:

Modern Ethernet networks built with switches and full-duplex connections no longer utilize CSMA/CD. CSMA/CD is only used in obsolete shared media Ethernet (which uses repeater or hub).

7 0
2 years ago
Read 2 more answers
what does it mean if you get the brainlyest ?and why does everyone want it so bad? and how do i give it to someone?
Bad White [126]

people mark the people who answered their question probably because they were asked to or their answer was what they were looking for and it helped them. and i don't know why people want it so bad, but personally for me i like getting brainliest because i guess it makes me look cool lol. also it's easy, to give brainliest, when you see a crown that's where you mark brainliest. but sometimes brainly doesn't show the crown i don't understand why, but it happens for some people including me.

8 0
3 years ago
What is the difference between word processing software and presentation software​
Gnesinka [82]

Answer:

Word is a word processing program. PowerPoint is presentation software. MS Word is used for preparing documents which have higher quantum of text and tables. ... On the other hand, MS Powerpoint is used in cases where you want to give a presentation.

3 0
3 years ago
A(n) systems analyst codes system software, fine-tunes operating system performance, and performs other system software-related
NikAS [45]
In general, a systems analyst is a person who uses analysis and design strategies to solve business problems.
They also analyze an organization’s current computer systems and develop information systems solutions to help the organization run more smoothly.

Now knowing a systems analyst job, therefore the answer to this is “FALSE”.

<span> </span>

6 0
3 years ago
Other questions:
  • An email address is made up of all of the following parts except
    13·2 answers
  • The equation x + y2-4x+2y=b describes a circle.
    8·1 answer
  • A chemistry teacher colleague of yours uses video regularly in their courses, but commented to you about how much time it takes
    15·2 answers
  • Write a program that represents a popular kid’s toy that teaches them about different shapes and colors.
    14·1 answer
  • Many bookstores have closed since the rise of the Internet. What type of
    11·1 answer
  • What do you consider to be audit evaluation areas?
    14·1 answer
  • What is the difference between websites and web page​
    8·1 answer
  • Tina reported a safety hazard at her workplace to OSHA. Representatives from OSHA came to her work and inspected the issue, then
    14·1 answer
  • Visit on social networking site and look for the site's privacy policy.The link is typically found at the bottom of the page and
    9·1 answer
  • A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!