Answer:
static int [] bubbleSort(int[] arr) {
int n = arr.length;
int temp = 0;
for(int i=0; i < n; i++){
for(int j=1; j < (n-i); j++){
if(arr[j-1] > arr[j]){
temp = arr[j-1];
arr[j-1] = arr[j];
arr[j] = temp;
}
}
}
return arr;
}
Explanation:
Above function is written in java language in which it takes integer array then sorts it using bubble sort and return back the array. The function has return type int[] which is necessary for returning array of type integer. The variable n contains the size of array which is calculated through array's length method which is built in. Above function sorts array in descending order if you want to sort it in ascending order just change the condition of in if branch from <em>"</em><em>if(</em><em>arr[j-1] > arr[j]</em><em>)</em><em>"</em> to <em>"</em><em>if(</em><em>arr[j-1] < arr[j]</em><em>)</em><em>"</em> means replace > sign with < sign .
Answer:
1: General search, 2: Online reference, 3:Speciality Search, 4: Metasearch engine, 5: Social search tool.
Explanation:
General search engine are internet portals for searching numerous compiled resources for specific key words or phrases. examples are Google and Bing.
Online references are virtual reference that connect you to professional librarian over the internet.
Specialty search engine searches special created database for particular subject and they are also refer to as topical search engines.
Metasearch engine this kind of search engine uses other search engine to provide his own result.
Social search tool provide content that are social media related.
Answer:
C. confirm the identity of a user requesting access to information or assets
Explanation:
Authentication technologies are used by many organizations to confirm the identity of a user requesting access to information or assets. Authentication is used to secure data and ensure access is given to an authorized user. There are four main types of authentication technologies that can be used in an organisation. The first one is the password-based technology where a user provides a user id and a password to gain access to information. There is also a certificate-based technology which uses digital certificates to authenticate users. The third technology is the E-Token Based authentication where a device generates a random number whenever it is used, the number generated can be used in place of a password. The fourth alternative is biometric technology , which identify users by their physical characteristics such as their fingerprints, voice or facial features.