1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
4 years ago
9

The quicksort is an example of a divide and conquer algorithm in that it divides the sorting problem into smaller problems by di

viding the list of items to be sorted into smaller subsets. The pivot is the mechanism that is used to segment the list. Describe how the quicksort works including a discussion of the pivot, how it is selected, and why the pivot is important to the quicksort.
Computers and Technology
1 answer:
ankoles [38]4 years ago
8 0

Answer:

The quicksort pivot is an arbitrary element within the collection that is being sorted.  Using the pivot point, the collection of elements is partitioned into two smaller lists of elements.  Using some logic, the smaller elements are placed left of the pivot point, and larger elements are placed to the right of the pivot point.  Ideally, you would prefer you pivot point to be a median of your dataset to optimize the creation of the two sublists into a balanced state.

Cheers.

You might be interested in
Which option ensures that a page break is automatically inserted ahead of a specific paragraph or heading?
gulaghasi [49]

The correct answer is option D, the last one! <3

6 0
3 years ago
Read 2 more answers
An information system report is an example of...
STatiana [176]

Answer:

a. data processing

b. data collection

c. data input

d. data output

Explanation:

An information system is a system used to filter, process, collect, distribute and create data.

Information system can be a work system whereby humans and machine perform processess using informations gathered, process it to solve the needs of their customers in the form of goods and services.

8 0
4 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
2.
Sauron [17]
Im pretty sure it is b
7 0
3 years ago
What is a graphical user interface (GUI)?
o-na [289]

The answer is D - A user-friendly computer program that allows the user to point and click on icons to make the computer function.


4 0
4 years ago
Other questions:
  • Is brainly down? Cant search anything
    8·1 answer
  • What role/service is windows 2012 server backup part of?
    5·1 answer
  • What determines how a system will work to meet the business needs defined during system investigation?
    13·1 answer
  • Create a Produceclass that hasan instance variable of type Stringfor the name, appropriate constructors, appropriate accessor an
    13·1 answer
  • Write a C function which takes three parameters which are the cost for an item in a grocery store, the quantity to buy, and the
    12·2 answers
  • Evaluating algebraic expressions 8(x+2)when x =6
    7·1 answer
  • A user complains because the social media apps on his mobile device always note his location. The user is worried about privacy,
    12·1 answer
  • Code in Java:
    6·1 answer
  • Worksheet Identify the devices for moving the cursor around your computer screen
    12·1 answer
  • Which join is made with the following query?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!