1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
2 years ago
9

Which statement is correct? (Note: Our selectionsort picks largest items first.) A. The algorithm might be either selectionsort

or insertionsort. B. The algorithm might be selectionsort, but could not be insertionsort. C. The algorithm might be insertionsort, but could not be selectionsort. D. The algorithm is neither selectionsort nor insertionsort.
Computers and Technology
1 answer:
babunello [35]2 years ago
3 0

Answer:

The statement which is correct:

c. The algorithm might be insertion sort, but could not be selection sort.

Explanation:

Selection sort:

In data structure, such a sorting technique in which the smallest element from the unsorted array is swapped with the left-most element. So, the first digit is always the smallest.

Insertion Sort:

In data structure, such a sorting technique in which each element is compared with all other elements of the array.

  • As our selection sort picks the largest items first so it can't be selection but can be insertion sort as insertion sort the largest item can come on the first position.

You might be interested in
A(n) _____ is a type of man-in-the-middle attack where an attacker captures the data that is being transmitted, records it, and
professor190 [17]

Answer:

wireless replay attack

Explanation:

Based on the scenario being described within the question it can be said that the type of attack that is being described is known as a wireless replay attack. Like mentioned in the question this is a network attack where an individual hijacks data in the middle of it being sent in order to copy it before the data reaches the intended recipient. This information can then be used for whatever the attacker intends.

6 0
3 years ago
Read 2 more answers
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
Alex_Xolod [135]

Answer:

eavesdropping

Explanation:

Eavesdropping is as an <em>electronic attack</em> where digital communications are intercepted by an individual whom they are not intended. This is done in two main ways: <em>Directly listening</em> to digital or analog voice communication or the <em>interception or sniffing</em> of data relating to any form of communication.

4 0
3 years ago
What is the best anime that you like the most (give me 3 plz)
Dmitry [639]

Answer:

The rising of shied hero, last hope, and dragon pilot.

4 0
2 years ago
Read 2 more answers
Consider the following language:
VMariaS [17]

L is a decidable language because the Turing machine accepts it.

L is a recognizable language if  TM M recognizes it.

<h3>How do you know if a language is decidable?</h3>

A language is said to be decidable only when there seems to exists a Turing machine that is said to accepts it,

Here, it tends to halts on all inputs, and then it answers "Yes" on words that is seen in the language and says "No" on words that are not found in the language. The same scenario applies to recognizable language.

So,  L is a decidable language because the Turing machine accepts it.

L is a recognizable language if  TM M recognizes it.

Learn more about programming language from

brainly.com/question/16936315

#SPJ1

8 0
1 year ago
Blank Are input instructions you give to a computer
kotegsom [21]

Explanation:

A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.

4 0
2 years ago
Other questions:
  • Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
    14·2 answers
  • A security policy is a
    11·1 answer
  • "list at least 3 key performance indicators that should be considered prior to initiating a cloud deployment."
    15·1 answer
  • Create a SavingsAccount class. Use a static data member annualInterestRate to store the annual interest rate for each of the sav
    10·1 answer
  • Why are application programs stored in main memory​
    11·1 answer
  • Can someone solve this for me please? It’s part of an escape room.
    13·2 answers
  • The template code provided is intended to check whether an integer entered by the user is outside of the range 20-29 (inclusive)
    9·1 answer
  • Which of these are tools used to diagnose and test code? Check all of the boxes that apply.
    9·1 answer
  • State the function of the <br> BIOS,​
    11·1 answer
  • Area Triangolo Rettangolo in c++
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!