1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
14

The bubble sort algorithm sorts using what technique?

Computers and Technology
1 answer:
sweet [91]3 years ago
8 0

Explanation:

Bubble sort is one of the simplest sorting techniques present.

In bubble sort in every iteration we compare the each element with the next element if it is out of order then we swap the elements if not we do nothing and move to next iteration.This is done n-1 times where n is the number of elements in the array.

It this algorithms the element with highest value is bubbled out in each iteration hence it is called bubble sort.

You might be interested in
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
3 years ago
The while loop and the do loop are equivalent in their expressive power; in other words, you can rewrite a while loop using a do
sleet_krkn [62]
I think False...

I hope this helps
8 0
2 years ago
Use the Wrap Text icon to _____. modify which graphic appears in the front of layered images modify the picture effects change t
sergey [27]

I believe it's change the way text is wrapped around an object.

3 0
2 years ago
Read 2 more answers
What does it mean to read visual and audio text
solniwko [45]

Talking books could be a means to automatize and generalize such an audio–visual reading experience. ... RWL consists of an experimental reading situation where one reads a text while one can hear it said aloud by a prerecorded speaker or by a text-to-speech system.


5 0
3 years ago
A camera on a tripod shows the ground floor of a skyscraper and then moves upward to show its entire length. what camera movemen
scZoUnD [109]

Answer:

A pedestal. It involves moving the camera upwards or downwards in relation to a subject.

8 0
2 years ago
Other questions:
  • Please help?!
    11·2 answers
  • You are the system administrator for a medium-sized Active Directory domain. Currently, the environment supports many different
    7·1 answer
  • Which button, when pressed, allows light from the subject to fall on the sensor?
    8·1 answer
  • Which are characteristics of an effective solution? Choose all that apply. solves the problem in anticipated ways each time resu
    5·1 answer
  • What conversion factor should be used to convert from meters to Gigameters?
    7·1 answer
  • What is a credit card balance? A...The amount of interest you must pay the credit card company B...The required minimum payment
    15·1 answer
  • Enna always says thank you when people give her gifts. She even writes thank-you cards. On holidays, Enna remembers
    9·1 answer
  • The average price of milk increased from $3.00 last year to $3.50 this year. This is most likely due to:
    14·1 answer
  • A toolbar of round buttons that appear when you move the mouse when in Slide Show view id called ____________.A toolbar of round
    8·1 answer
  • How does Virtual Reality help to make work experiences more inclusive?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!