1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
6

Assume Flash Sort is being used on a array of integers with Amin = 51, Amax = 71, N=10, m=5 Items are classified according to th

e formula: K(A[i]) = 1 + (int) ( (m-1) * (A[i] - Amin) / (Amax - Amin) ) What is the classification for 63?
Computers and Technology
1 answer:
Yuliya22 [10]3 years ago
8 0

Answer:

3

Explanation:

= 1 + (int) (4*(63 - 51)/(71-51)))

= 1 + (int) (4*12/20)

= 1 + (int) (48/20)

= 1 + (int)2.4

= 1 + 2

= 3

You might be interested in
Whoever understands this first and replies will be the brainliest.<br><br><br><br> Road work ahead?
Scorpion4ik [409]

I SURE HOPE IT DOES (this is the best vibe if you dont get this you are an uncultured swine)

7 0
4 years ago
Read 2 more answers
What is the answer to this question I am not sure?
aleksley [76]

Answer:

Light sensor

Explanation:

“Street Light that Glows on Detecting Vehicle Movement. Generally, street light controlling system is a simple concept which uses a transistor to turn ON in the night time and turn OFF during the day time. The entire process can be done by a using a sensor namely LDR (light dependent resistor).”

8 0
3 years ago
Read 2 more answers
Helllp me you will git 16 points
siniylev [52]

Answer:

False

Hope it helps...

Have a great day :P

8 0
3 years ago
Read 2 more answers
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
ad-work [718]

Answer:

encryption

Explanation:

A(n) encryption   virus runs a program that searches for common types of data files, compresses them, and makes them unusable.

5 0
3 years ago
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidentia
SOVA2 [1]

The employee would access an intranet to maintain security.

6 0
3 years ago
Other questions:
  • 1- Design a brute-force algorithm for solving the problem below (provide pseudocode): You have a large container with storage si
    10·1 answer
  • When reading data across the network (i.e. from a URL) in Python 3, what string method must be used to convert it to the interna
    9·1 answer
  • The PATH environment variable.
    5·1 answer
  • Which of the following terms describes a type of useful and legitimate software that is distributed by a developer where they do
    10·1 answer
  • An array of integers named parkingTickets has been declared and initialized to the number of parking tickets given out by the ci
    14·1 answer
  • Select the correct answer.
    12·2 answers
  • Research the topic of legal and ethical behaviors or dilemmas related to technology. Identify five topics of concern and briefly
    9·1 answer
  • In this assignment we are going to practice reading from a file and writing the results of your program into a file. We are goin
    10·1 answer
  • Fort Nite is the best u can’t say it’s not
    13·2 answers
  • Jazmine just finished setting up an operating system that's designed to work between a VM guest OS and computer hardware. What i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!