1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
max2010maxim [7]
3 years ago
12

Suppose that list is sorted using the selection sort algorithm as discussed in the book. What is the resulting list after two pa

sses of the sorting phase; that is, after two iterations of the outer for loop?
a. list = {10, 18, 24, 20, 75, 70, 60, 35}
b. list = {10, 18, 20, 24, 75, 70, 60, 35}
c. list = {10, 18, 24, 75, 70, 20, 60, 35}
d. list = {10, 20, 24, 75, 70, 20, 60, 35}
Computers and Technology
1 answer:
MrRissso [65]3 years ago
4 0

Answer:

The answer is "Option C".

Explanation:

In the given question the main list is missing. so, first, we defined the main list after that explain the answer to this question:

The main list:

list={24, 20, 10, 75, 70, 18, 60, 35}

In the above-given choices, option c is correct because in the list, the element 10 and element 18 are fixed in its correct position and element 10 and 24 are positioned in the placed of 18 elements, and the 20 elements will be placed as follows, and the other choices were wrong because in this data is in its wrong place.

You might be interested in
Most users find settings between ____ to be the most convenient option for how long the computer sits idle before the screen sav
Sphinxa [80]
I would say about 5 to 10 minutes
3 0
3 years ago
E Web Slice Gallery -
Verdich [7]

Answer:

C. Since he was hungry, she had a snack

Explanation:

So, you can say, " Claire is princes." In this "Claire happens to be the subject, " and Princes is the object. And apart from this a complete sentence must be enough to put forward a complete task. Now in C. we see complete thought is shared. Whereas in no other sentence complete thought has been revealed, and they are incomplete. And hence, the correct option is C.  

3 0
3 years ago
Which of the following identifies a user based on anatomical characteristics such as a fingerprint, a voice print, or iris patte
antiseptic1488 [7]

Answer:

Biometrics

Explanation:

Biometrics is the techniques that is used to measure and identify different characteristic of human being that are usually unique in nature for individuals such as voice characteristics, eye retina and finger prints. These features are unique for every person. These features could be used for different purposes now a day such biometric identification, biometric verification and for forensic purposes.

There are different algorithms to compute and compare these unique characteristics for each user and store in a database for the purpose of identification of the users. This data can also be used for forensic purpose if needed by some security agency to identify some person.

The type of identification in which these features such as voice, finger prints and iris pattern use is called biometrics.

3 0
3 years ago
________ states that the value of a network is equal to the square of the number of users connected to it.
Juliette [100K]

Answer:

This is known as the Metcalfe's Law

Explanation:

In 1980, Metcalfe's law was first presented, not considering users but the communication among compatible devices (e.g. telephone, fax machines and so on). It was after the globalization of the internet that the law got introduced to users and networks.

A demonstration of the law can be seen in fax machines, one fax machine is purposeless, however, the interconnection of multiple fax machines on the network increases the value of every fax machine because the number of the users of the fax machines increases. Similarly, the more the users of a particular service, the more relevant the service becomes.

8 0
3 years ago
Read 2 more answers
Spyware is unwanted and often unsolicited messages. It is not technically malicious software, but can have a serious negative ef
o-na [289]

Answer:

The answer is "Option b".

Explanation:

The given statement is false because the spyware is a malicious program, that infects its device, and steals access to systems data from its web, and the spam also isn't technically malicious, but it could have a serious negative impact through density on the networks, and it is also junk message, which is web slang for an email message, which is primarily unsolicited email.

4 0
3 years ago
Other questions:
  • Light travels at 3 × 108 meters per second. A light-year is the distance a light beam travels in one year.Write a PYTHON program
    14·1 answer
  • when a user has the requirement to stay connected 100% of the time as they move throughout the WLAN coverage area, what are they
    13·1 answer
  • Write a program that prompts the user to enter a series of numbers between 0 and 10 asintegers. The user will enter all numbers
    6·1 answer
  • Is an automatic computer check to ensure that the data entered is sensible and reasonable.It does not check the accuracy of data
    7·1 answer
  • Which code will print a random number between 1 and 100?
    15·2 answers
  • Fill in the blanks <br>a) an _______________ checks the files on the computer for viruses.​
    6·2 answers
  • Tinh T = a1*a2*a3*...an<br><br> Giúp em với
    13·1 answer
  • Your worksheet contains a price in cell A5 and many formulas refer to that price how would you refer to that price in the formul
    12·1 answer
  • Which of the following makes Super Mario Run unique?
    6·1 answer
  • Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!