1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
3 years ago
9

Which statement is correct? (Note: Our selectionsort picks largest items first.) A. The algorithm might be either selectionsort

or insertionsort. B. The algorithm might be selectionsort, but could not be insertionsort. C. The algorithm might be insertionsort, but could not be selectionsort. D. The algorithm is neither selectionsort nor insertionsort.
Computers and Technology
1 answer:
babunello [35]3 years ago
3 0

Answer:

The statement which is correct:

c. The algorithm might be insertion sort, but could not be selection sort.

Explanation:

Selection sort:

In data structure, such a sorting technique in which the smallest element from the unsorted array is swapped with the left-most element. So, the first digit is always the smallest.

Insertion Sort:

In data structure, such a sorting technique in which each element is compared with all other elements of the array.

  • As our selection sort picks the largest items first so it can't be selection but can be insertion sort as insertion sort the largest item can come on the first position.

You might be interested in
State and explain five misused of science and technology​
kap26 [50]

Answer:

Science and technology is the major key of life cycle.

Explanation:

Any five misused of science and technology are:-

•Guns and weapons to clash.

•Phishing sites

•Scamming online or on online shopping.

•Misusing social media and our phones.

•Crazy addictive online games.

6 0
3 years ago
Game design colleges anyone know the requirements??
tester [92]
Basic understanding of code language such as Java, C++, Swift (iOS) etc. without knowledge of these, you’ll be lost trust me. Study up on these in your spare time. They do teach this stuff in college, but being ahead of the game is always good. No pun intended kek ;D
8 0
3 years ago
The internet is an example of
DochEvi [55]
A large multi user program
6 0
3 years ago
Read 2 more answers
Write a while loop that lets the user enter a number. The number should be multiplied by 10, and the result assigned to a variab
pentagon [3]

Answer:

#include <stdio.h> // header file inclusion

int main() // main function declaration

{

    int number,product=0; // variable declaration

    while(product<100) // while loop

   {

       scanf("%d",&number); // input a number

       product= number*10; // multiply the number by product

       printf("%d\n",product); // print the value of product

   }

 return 0; // return statement

}

Output:

  • If the user enter 10 then the loop terminates for the first time and the output is 100.
  • If the user enter 5,10 then the loop executes in 2 times and the output is 50 and 100.

Explanation:

  • Firstly there is an inclusion of header file which understands the meaning of printf() and scanf() function.
  • Then there is the main() function definition
  • Then we declare a two-variable (number and product) of integer type.
  • Then we define a while loop and check the condition that product value is less than 100 or not.
  • Then we take input and multiply by 10.
  • Then we assign the value in the product and print the product value.
6 0
3 years ago
Software that instructs the computer how to run applications and controls the display/keyboard is known as the
saw5 [17]
Answer is : operating system
8 0
4 years ago
Other questions:
  • What is statement used to communicate ones feelings in a nonconfrontational manner
    9·1 answer
  • Which type of engine has been used to power airships and/or dirigibles?
    13·1 answer
  • Dead state is the name of the time delay in a cpu caused by differences between the speed of the cpu and ram.
    15·1 answer
  • When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
    11·1 answer
  • PLEASE HELP ME ASAP!!! THIS IS DUE SOON!!
    9·1 answer
  • Access control lists (ACLs) are used to permit and deny traffic in an IP router.
    14·1 answer
  • List and explain three computing devices from the 20th century​
    13·2 answers
  • The best presentations try to include as much text as possible on each slide true or false ​
    13·1 answer
  • Write a program to play an automated game of Rock, Paper, Scissors. Two players make one of three hand signals at the same time.
    9·1 answer
  • You are asked to analyze events in a firewall log that occurred six months ago. when you analyze the log file, you notice events
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!