1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
3 years ago
12

Give a recursive version of the algorithm Insertion-Sort (refer to page 18 in the textbook) that works as follows: To sort A[1..

n], we sort A[1..n − 1] recursively and then insert A[n] in its appropriate position. Write a pseudocode for this recursive version of InsertionSort and analyze its running time by giving a recurrence relation and solving it
Computers and Technology
1 answer:
Inga [223]3 years ago
3 0

Answer:

see explaination

Explanation:

void insertion( int e,int *x, int start, int end)

{

if (e >= x[end])

x[end+1] = e;

else if (start < end)

{

x[end+1] = x[end];

insertion(e, x, start, end-1);

}

else

{

x[end+1] = x[end];

x[end] = e;

}

}

void insertion_recurssion(int *b, int start, int end)

{

if(start < end)

{

insertion_sort_recur(b, start, end-1);

insertion(b[end], b, start, end-1);

}

}

void main()

{

insertion_recurssion(x,0,5);

}

You might be interested in
Please answer immediately!!!
diamong [38]

Answer:

Please check the attachment.

Remember:

All N1, N2, N3N, N4, N5, N6, N7 and each of them are certainly like the server. Also note that Router, repeaters, switch and transmitter are not mentioned in the above diagram. Please assume it in between each location.

Explanation:

Please check the attachment. Also, Remember that Server is at the head office, and rest 7 are the 7 branches. The VOIP, video surveillance, Door security system and the computer networks are being shown in the diagram. And each location has a network of computers joined through VLAN, and each of them are given the IP addresses of Class A, Class B and class C of the iPV4(or IPV6), which can be found by the future network administer, operators through the IP address, that is assigned.  

4 0
3 years ago
Suppose that a program asks a user to enter multiple integers, either positive or negative, to do some calculation. The data ent
KatRina [158]

Answer:

d) An alphabetic character

7 0
3 years ago
A program that will ring a bell six times is what kind of program?
amm1812

Answer:

D

Explanation:

because it is a sequence it does more than one thing

6 0
3 years ago
Read 2 more answers
The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to
cestrela7 [59]

Answer:

sorry I can't understand what is this is

3 0
3 years ago
Which of these describes a database? Check all of the boxes that apply.
lesya [120]

Answer:

The answer is 2,3,4 and the next one is 1,2 and 4

Explanation:

Just did it

EDG 2021

5 0
3 years ago
Other questions:
  • Samantha writes technical content for a webpage and uploads it to the webpage. What should she do to ensure that the content, wh
    11·2 answers
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • What is the radix transformation method?
    5·1 answer
  • To close the ____ view, click File on the Ribbon or click the preview of the document in the Info gallery to return to the docum
    9·1 answer
  • Assign jsonData with the parsed value of the stringData variable. Then, assign 29 to the points property in jsonData and assign
    13·1 answer
  • Which of these ia an example of gene flow?
    5·1 answer
  • What is a special type of variable used in subroutines that refers to a piece of data?
    15·1 answer
  • Match the feature to its function.
    7·1 answer
  • You are developing a Website that is going to be viewed extensively on smartphones and tablets. Which of the following should yo
    7·1 answer
  • Please help me.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!