1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
3 years ago
13

Which of the following sorting algorithms is described by this text? "Split the array in two parts. Take each part, and split it

into two parts. Repeat this process until each part has only two items. Check the order of the two items and swap if necessary. Then, take the sorted part and combine it with an adjacent part, sorting as you combine. Repeat until all parts have been combined."
A)Insertion sort

B)Merge sort

C)Heap sort

D)Quick sort

E)Selection sort
Computers and Technology
1 answer:
BartSMP [9]3 years ago
5 0

Answer:

Option(B) i.e "Merge sort " is the correct answer to the given question .

Explanation:

The merge sort follow the approach of divide and conquer technique .It means firstly it divided the given array into the sub parts that sub parts are sorted in comparing the first  value with the adjacent value and perform selection sorting in them it means we swap the value if necessary. This process will continue until all the elements are checked .

  • When the sub parts are  arranged  then we will combine them and getting the new or original array that is in sorted order.
  • When we perform the merge sort  the extra memory is used which is drawback of merge sort .
  • All the other options are not Splitting  the array in two parts and perform sorting so these are incorrect option .
You might be interested in
As you are talking to your colleague over the phone, the sound of an airplane flying low drowns out part of your conversation. I
Rasek [7]

Answer:

Interference.

Explanation:

As the user is communicating with their friend through the mobile, most of their interaction is interrupted by the noise of an airplane flying at low hight. Instantly afterward, the user's mobile phone rang, disrupting the communication once more.  

So, according to the following scenario both of those are examples of interference.

6 0
3 years ago
Identify different character components for a given typeface: Arial.
Shkiper50 [21]

Answer: Arial belongs to the sans serif family of typefaces. It is the most commonly used typeface, and it is the default typeface set in Microsoft Word. A character is a typographic element represented through an upper- or lowercase letter, number, or special character. Every letter of the alphabet has multiple parts that we describe with a particular set of terms. Typographers call this “letter anatomy.” The basic terms common to all letters are below:

An ascender is the stroke extending upward, going above the x-height (which is the height of the letter excluding the ascender or descender).

A descender is the stroke extending downward from the baseline (which is the imaginary horizontal line that aligns the bodies of the characters).

A bar is the horizontal stroke in the uppercase letters A, E, F, H, I, and T, as well as in the lowercase letters e, f, and t.

A counter is the blank space within the body stroke.

A bowl is a curved stroke that surrounds the counter.

A shoulder is a curved stroke beginning at the stem.

A serif is the tapered feature at the end of a stroke. Arial is a sans serif font, and it does not have tapered corners at the ends of the main strokes.

3 0
3 years ago
Because collecting the adjustment data requires time, the adjusting entries are often a.estimated and recorded earlier than the
Yanka [14]

Answer:

b. entered later but dated as of the last day of the period.

Explanation:

Because collecting the adjustment data requires time, the adjusting entries are often entered later but dated as of the last day of the period.

6 0
3 years ago
Read 2 more answers
What is the use of an NDP?
Makovka662 [10]

Answer:

It defines five ICMPv6 packet types for router solicitation,router advertisement,neighbor solicitation,neighbor advertisement,and network redirects.

Explanation:

8 0
3 years ago
What is a critical consideration on using cloud-based file sharing and storage applications.
Dmitry [639]

Answer:

Determine if the software or service is authorized

Explanation:

:)

3 0
2 years ago
Other questions:
  • Potatocat2UwU da best
    12·1 answer
  • What is the type of person of personal computer which is also called a laptop computer?
    8·1 answer
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    14·2 answers
  • Which of the following statements holds true for the term "html"? It refers to a system that connects end users to the Internet.
    10·2 answers
  • What option do you use to view your presentation?
    15·1 answer
  • What is the way to discover requirments for software projects ?
    14·1 answer
  • Tell the story, step by step, of how your computer finds the CodeHS server,
    9·1 answer
  • ¿Toda sustancia de aspecto homogéneo es siempre una sustancia pura?
    8·1 answer
  • What to do if you click on a phishing link on iphone
    9·2 answers
  • Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!