1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
strojnjashka [21]
3 years ago
11

2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra

y of n numbers.b. Set up and solve (for n = 2k) a recurrence relation for the number of keycomparisons made by your algorithm.c. How does this algorithm compare with the brute-force algorithm for thisproblem?
Computers and Technology
1 answer:
Lisa [10]3 years ago
6 0

The pseudocode :

Pair MaxiMini(array, sizeof_array)

if sizeof_array = 1

return element as both maximum and minimum

else if sizeof_array = 2

do one comparison to find the maximum and minimum

return that pair

else

# sizeof_array > 2

recursion for maximum and minimum of the left half

recursion for maximum and minimum of the right half

one comparison determines the true max of the two elements

one comparison determines the true min of the two elements

return the pair of maximum and minimum

You might be interested in
Three reasons why users attach speakers to their computers.
ZanzabumX [31]

Answer:

Iv'e answered this question 2 times already lol. The purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.

Explanation: I hope this helps!

8 0
3 years ago
State ONE (1) disadvantage of using computers to store and process<br> information.
NNADVOKAT [17]

Answer:

it can be hacked

Explanation:

there is always a chance for computer data to be hacked

3 0
2 years ago
Por qué no es tan común el uso de energías mas amigables con el medio ambiente en el país donde vives?
Effectus [21]

Answer:

Explanation:

English:

All forms of electricity generation have an environmental impact on our air, water, and land, but it varies. Of the total energy consumed in the United States, about 40% is used to generate electricity, making electricity use an important part of each person’s environmental footprint.

Producing and using electricity more efficiently reduces both the amount of fuel needed to generate electricity and the number of greenhouse gases and other air pollution emitted as a result. Electricity from renewable resources such as solar, geothermal, and wind generally does not contribute to climate change or local air pollution since no fuels are combusted.

The fuel mix for U.S. electricity generation

The chart below shows that most of the electricity in the United States is generated using fossil fuels such as coal and natural gas. A small but growing percentage is generated using renewable resources such as solar and wind.

Spanish:

Todas las formas de generación de electricidad tienen un impacto ambiental en nuestro aire, agua y tierra, pero varía. Del total de energía consumida en los Estados Unidos, alrededor del 40% se usa para generar electricidad, lo que hace que el uso de electricidad sea una parte importante de la huella ambiental de cada persona.

Producir y usar electricidad de manera más eficiente reduce tanto la cantidad de combustible necesario para generar electricidad como la cantidad de gases de efecto invernadero y otra contaminación del aire emitida como resultado. La electricidad de recursos renovables como la energía solar, geotérmica y eólica generalmente no contribuye al cambio climático ni a la contaminación del aire local, ya que no se queman combustibles.

Combustible para la generación de electricidad en EE. UU.

El cuadro a continuación muestra que la mayor parte de la electricidad en los Estados Unidos se genera utilizando combustibles fósiles como el carbón y el gas natural. Un porcentaje pequeño pero creciente se genera utilizando recursos renovables como la solar y la eólica.

5 0
3 years ago
What are three recommendations for reducing risk and improving the privacy of your personal information while using social media
viktelen [127]

Answer:

1. Treat the “about me” fields as optional.

2. Become a master of privacy settings.

3. Know the people you friend.

Explanation:

1. Treat the “about me” fields as optional.

Because these fields are offered, however, doesn’t mean you must fill them out. Consider offering a general version of the information requested or simply leaving the field blank. For instance, listing only your state of residence, instead of both city and state, can make it harder for others to figure out exactly where you live.

2. Become a master of privacy settings.

All social media sites give you the option to limit post viewing to specific audiences. Take the time to explore these settings, try different options, and become a master of their use.

3. Know the people you friend.

Once upon a time, social media users competed with one another to have the largest number of connections. Today, however, smart social media users know that the more people you’re connected to, the harder it is to control what happens to the information you post. Make sure you know the people you add on social media, in real life if possible. Don’t hesitate to use the “block” feature when the situation seems to call for it.

6 0
3 years ago
Specific Instructions
Goryan [66]

In the most common use of the term, a class can be seen as a blueprint used to create objects. In other words, object(s) are created from a class in Java.

<h3>Creating a Class</h3><h3>Code:</h3>

import java.util.*;

class Card{

 private String suit;

 private int value;

 public Card(String s,int v){

   suit = s;

   value = v;

 }

 public String getSuit(){

   return suit;

 }

 public int getValue(){

   return value;

 }

 public void display(){

   System.out.println(value+"("+suit+")");

 }

}

class Deck{

 private ArrayList<Card> deck;

 private ArrayList<Card> drawn;

 public Deck(){

   deck = new ArrayList<Card>();

   drawn = new ArrayList<Card>();

   String[] arr = {"Club","Spade","Heart","Diamond"};

   for(String s : arr){

     for(int i=1;i<=13;i++){

       deck.add(new Card(s,i));

     }

   }

 }

 public void draw(){

   drawn.add(deck.get(0));

   deck.remove(0);

 }

 public void draw(int N){

   if(N > deck.size()){

     N = deck.size();

   }

   for(int i=0;i<N;i++){

     draw();

   }

 }

 public void showDrawn(){

   for(Card c : drawn){

     c.display();

   }

 }

 public void shuffle(){

   Collections.shuffle(deck);

 }

 public void restore(){

   restore(drawn.size());

 }

 public void restore(int N){

   if(N > drawn.size()){

     N = drawn.size();

   }

   for(int i=0;i<N;i++){

     deck.add(drawn.get(0));

     drawn.remove(0);

   }

 }

 public void showDeck(){

   for(Card c : deck){

     c.display();

   }

 }

}

class Test{

 public static void main(String[] args){

   Deck d = new Deck();

   System.out.println("Original deck\n");

   d.showDeck();

   d.draw(8);

   System.out.println("\nDeck after drawing 8 cards\n");

   d.showDeck();

   d.shuffle();

   System.out.println("\nDeck after shuffling\n");

   d.showDeck();

   d.restore();

   System.out.println("\nDeck after restoring cards\n");

   d.showDeck();

 }

}

<h3>Test Output:</h3>

C:\Users\hp\Desktop>java Test

Original deck

1(Club)

2(Club)

3(Club)

4(Club)

5(Club)

6(Club)

7(Club)

8(Club)

9(Club)

10(Club)

11(Club)

12(Club)

13(Club)

1(Spade)

2(Spade)

3(Spade)

4(Spade)

5(Spade)

6(Spade)

7(Spade)

8(Spade)

9(Spade)

10(Spade)

11(Spade)

12(Spade)

13(Spade)

1(Heart)

2(Heart)

3(Heart)

4(Heart)

5(Heart)

6(Heart)

7(Heart)

8(Heart)

9(Heart)

10(Heart)

11(Heart)

12(Heart)

13(Heart)

1(Diamond)

2(Diamond)

3(Diamond)

4(Diamond)

5(Diamond)

6(Diamond)

7(Diamond)

8(Diamond)

9(Diamond)

10(Diamond)

11(Diamond)

12(Diamond)

13(Diamond)

<h3>Draw action:</h3>

9(Club)

10(Club)

11(Club)

12(Club)

13(Club)

1(Spade)

2(Spade)

3(Spade)

4(Spade)

5(Spade)

6(Spade)

7(Spade)

8(Spade)

9(Spade)

10(Spade)

11(Spade)

12(Spade)

13(Spade)

1(Heart)

2(Heart)

3(Heart)

4(Heart)

5(Heart)

6(Heart)

7(Heart)

8(Heart)

9(Heart)

10(Heart)

11(Heart)

12(Heart)

13(Heart)

1(Diamond)

2(Diamond)

3(Diamond)

4(Diamond)

5(Diamond)

6(Diamond)

7(Diamond)

8(Diamond)

9(Diamond)

10(Diamond)

11(Diamond)

12(Diamond)

13(Diamond)

<h3 /><h3>Shuffling action:</h3>

12(Diamond)

8(Spade)

4(Spade)

6(Diamond)

10(Spade)

13(Club)

7(Heart)

13(Heart)

7(Diamond)

9(Heart)

11(Diamond)

5(Heart)

8(Diamond)

9(Diamond)

3(Spade)

13(Spade)

4(Heart)

2(Heart)

3(Heart)

5(Diamond)

11(Heart)

11(Club)

10(Club)

9(Club)

3(Diamond)

4(Diamond)

6(Spade)

9(Spade)

10(Heart)

11(Spade)

5(Spade)

12(Spade)

1(Spade)

6(Heart)

12(Heart)

13(Diamond)

1(Heart)

2(Diamond)

1(Diamond)

7(Spade)

12(Club)

10(Diamond)

2(Spade)

8(Heart)

  • Restore action

12(Diamond)

8(Spade)

4(Spade)

6(Diamond)

10(Spade)

13(Club)

7(Heart)

13(Heart)

7(Diamond)

9(Heart)

11(Diamond)

5(Heart)

8(Diamond)

9(Diamond)

3(Spade)

13(Spade)

4(Heart)

2(Heart)

3(Heart)

5(Diamond)

11(Heart)

11(Club)

10(Club)

9(Club)

3(Diamond)

4(Diamond)

6(Spade)

9(Spade)

10(Heart)

11(Spade)

5(Spade)

12(Spade)

1(Spade)

6(Heart)

12(Heart)

13(Diamond)

1(Heart)

2(Diamond)

1(Diamond)

7(Spade)

12(Club)

10(Diamond)

2(Spade)

8(Heart)

1(Club)

2(Club)

3(Club)

4(Club)

5(Club)

6(Club)

7(Club)

8(Club)

You can learn more about creating a class here brainly.com/question/10410845

6 0
2 years ago
Other questions:
  • Which activity cannot be done on a social networking site?
    12·1 answer
  • In GIMP, the ( ) displays the image that the user is currently working on
    12·1 answer
  • write a simple assembly code using 8088 microprocessor instruction set to add two numbers ? please help me if you know :(​
    11·1 answer
  • Harry is undertaking a digital photography course as the college and wants to
    12·1 answer
  • A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when view
    7·1 answer
  • Edhesive coding practice 3.4​
    12·1 answer
  • At the beginning of a chapter in a book, the first letter often appears larger than the other text on the page. This
    15·1 answer
  • Expectation on Information Technology Fundamental​
    12·1 answer
  • Can you make a phone app with angular?.
    5·1 answer
  • Data security issues that must be addressed by hipaa implementation teams include:__________
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!