1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
3 years ago
9

Which statement is correct? (Note: Our selectionsort picks largest items first.) A. The algorithm might be either selectionsort

or insertionsort. B. The algorithm might be selectionsort, but could not be insertionsort. C. The algorithm might be insertionsort, but could not be selectionsort. D. The algorithm is neither selectionsort nor insertionsort.
Computers and Technology
1 answer:
babunello [35]3 years ago
3 0

Answer:

The statement which is correct:

c. The algorithm might be insertion sort, but could not be selection sort.

Explanation:

Selection sort:

In data structure, such a sorting technique in which the smallest element from the unsorted array is swapped with the left-most element. So, the first digit is always the smallest.

Insertion Sort:

In data structure, such a sorting technique in which each element is compared with all other elements of the array.

  • As our selection sort picks the largest items first so it can't be selection but can be insertion sort as insertion sort the largest item can come on the first position.

You might be interested in
What is the total number of time zones that can be configured to show by default in a calendar in Outlook 2016?
olganol [36]

Answer:

I think its 2, but correct me if i'm wrong. :>

Explanation:

6 0
2 years ago
Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform onl
sdas [7]
Least privilege is the data access principle that ensures to unnecessary access to data exists by regulation members so that can perform only minimum data manipulation necessary. The principle of least privilege or as called as POLP is the run-through of controlling access to the minimal level that will permit normal functioning. The norm of least privilege interprets to giving people the lowermost level of user right that they can have and still do their jobs. The principle is also functional to things other than people as well as programs and processes. It is created in the US department of defense in the 1970’s and aimed to limit the potential damage of any security breach either accidental or malicious. 
5 0
3 years ago
Write a program that will add up the series of numbers: 99, 98, 97… 3, 2, 1. The program should print the running total as well
Elanso [62]

Answer:

a = 99

b = 99

while(a > 0):

    b += a

    print(b)

    a -= 1

Explanation:

4 0
3 years ago
Cerise is explaining computer viruses to her students. What is the best way for her to explain a computer virus?
Sedbober [7]
B. It is a code that creates multiple copies on loading and damages the system
3 0
2 years ago
Read 2 more answers
Phân tích cạnh tranh của cocacola và pepsi
Fittoniya [83]
I don’t understand please speak English
7 0
2 years ago
Other questions:
  • If a storm is 7.5 kilometers away, how much time is expected between observations of lightning and thunder? Round your answer to
    10·1 answer
  • Which type of movement lets the player control an object's movement?
    5·1 answer
  • • Write a program to find the maximum, minimum, and average score of players. The input to the program is a file containing play
    9·1 answer
  • An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be i
    7·1 answer
  • The goal expressed in this definition states that data visualization is about ________________ .
    11·2 answers
  • What does Putting a word in quotation marks on your search bar do on google?
    12·1 answer
  • Look at the following function prototype. double mynewFunction(int); What is the data type of the function’s return variable?
    11·1 answer
  • Disadvantages of computer. ​
    9·1 answer
  • Outline four types of cyber law.
    14·1 answer
  • JUST MAXED OUT THE COMMENTS anyways come here
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!