1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
12

This finding maximum number function will keep on going until we reach at the last value

Computers and Technology
1 answer:
ivann1987 [24]3 years ago
8 0
In which algorithm first the maximum element is found and then placed at the end?
Heapsort algorithm
The Heapsort algorithm involves preparing the list by first turning it into a max heap. The algorithm then repeatedly swaps the first value of the list with the last value, decreasing the range of values considered in the heap operation by one, and sifting the new first value into its position in the heap.
You might be interested in
With the evolution of RFID instead of UPC, how will this capability make the production grow and improve inventory and security?
saw5 [17]

Answer:

RFID in a business setting as keycards to enter into specific rooms and Elevator control. RFID will eventually have more applications and security then Barcode.

Explanation:

6 0
4 years ago
Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
astraxan [27]

Answer:

Activation Records

The storage (for formals, local variables, function results etc.) needed for execution of a

subprogram is organized as an activation record.

An Activation Record for “Simple” Subprograms

.

Activation Record for a Language with Stack-Dynamic Local Variables

Dynamic link: points to the top of an activation record of the caller

Explanation:

6 0
3 years ago
Which of the following is the smallest aperture (f-stop) opening?
Firlakuza [10]

Answer:

E) f/16

Explanation:

6 0
3 years ago
A technician is installing a server using a two-channel RAID controller, using RAID1 for the first channel and RAID5 for the sec
Stolb23 [73]

Answer:

Two disks RAID 1 and four disks RAID 5.

Explanation:

The RAID level stands for Redundancy array of independent disk drive level. It is a process whereby disk storage like hard disk drive or solid state disk are connected in array to function in parallel to each other, to promote performance and reliability. The categories of raid level are 0, 1, 3, 5, 10 etc.

The RAID level 1 writes data on both main disk and mirror disk. It is more efficient with only two disk. The RAID 5 strips data across disk array and stores a parity check on them. It can hold 16 disks efficient and can be used in the two channel RAID to hold the remaining four disks.

5 0
3 years ago
Write an application that counts by five from 5 through 500 inclusive, and that starts a new line after every multiple of 50 (50
padilas [110]

Answer:

//package CountByFives.java;

import java.util.*;

import java.io.*;

class Main{

public static void main(String[] args)

{

System.out.println("Enter the maiximum number of numbers");

Scanner sq1=new Scanner(System.in);

int num =sq1.nextInt();

int i=0,n=0,a=10;

while(i <=num)

{  

   

   System.out.print(i);

   i+=5;

   if(n==a)

   {

     System.out.println('\n');

     n=0;

   }

   n=n+1;

}

}

}

Explanation:

Please check the answer section.

3 0
4 years ago
Other questions:
  • The goal of conducting an incident analysis is to ascertain weakness. Because each incident is unique and might necessitate a di
    8·1 answer
  • A _______ is a piece of computer hardware used for the modulation and demodulation of data between digital and analog formats.
    10·1 answer
  • A ____ is a copy that is kept in case values need to be restored to their original state.
    5·1 answer
  • Under the advanced options screen, what startup option should be enabled in order to view what did and did not load during the b
    12·1 answer
  • How many bytes are in a yottabyte. (don't look it up)
    10·1 answer
  • Given a UNIX file system with 1024-byte blocks, how many disk accesses are needed to access bytes 2500-2503 of a file (assume th
    12·1 answer
  • _____ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless
    15·1 answer
  • What device is used to transmit what is effectively a type of Morse code between stations?
    11·1 answer
  • Your friend Aria is complaining that programming seems too complicated. She says, “Why do we need things like sequence, selectio
    11·1 answer
  • What is a blog . explain with example clearly .​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!