1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adelina 88 [10]
3 years ago
13

You must write a pseudocode process called swapSort which should sort a list of numbers using an algorithm called swap sort.

Computers and Technology
1 answer:
aivan3 [116]3 years ago
4 0

Answer:

i dont get it there is too much

Explanation:

You might be interested in
Java variable is the name of a Group of answer choices numeric data value stored in memory data value stored in memory that can
artcher [175]

Answer:

Java variable is the name of a group of data value stored in memory that can change its value but cannot change its type during the program's execution

Explanation:

Generally, a variable is a temporary location in the memory where data are stored in a computer program. Values in the variable can always be change during the course of program execution.

The equal sign ( = ) is use to assign and identify a variable. The value to be stored in the variable is always at the right of the equal sign, while the variable name is always at the left of the equal sign.

5 0
3 years ago
Qual è la differenza tra variabile semplice e variabile strutturata? <br>​
Mrrafil [7]

Answer:

Sia la variabile semplice che la variabile strutturata possono avere il diverso set di valori, ma entrambi differiscono poiché la variabile semplice può contenere solo i valori di un tipo di dati. Tuttavia, la variabile strutturata può contenere la variabile di diversi tipi di dati come la struttura in c ++ ed elencare in Python. Ci sono anche molti altri esempi.

Ad esempio in c ++:

int num;  è una variabile semplice

e   struct class

        {

             int roll;

             string name;

        } class[25];

è una variabile strutturata che può memorizzare i dettagli dei 26 studenti.

Explanation:

Si prega di controllare la sezione di risposta.

6 0
4 years ago
Harrison works in a manufacturing unit and oversees the logistics, including the daily shipping of a large number of packages. W
Nookie1986 [14]

E. Transaction processing system

Explanation:

He will need a transaction processing system to know the amount of logistics available daily and how many to ship and how many to order.

Transaction processing system will make him keep track of what transactions take place during the various days to help him give a good report.

8 0
3 years ago
Read 2 more answers
What are the functions of information technology?
Gekata [30.6K]

There are six basic functions of IT.

1. Capture: Compiling detailed records of activities.

2. Processing: Converting, analyzing, computing and synthesizing all forms of data and information.

3. Generation: Organizing information into a useful form.

4. Storage: Retaining information for further use.

5. Retrieval: Locating and copying stored data or information for further processing or for transmission to another user.

6. Transmission: Distributing information over a communication network.

3 0
2 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
Other questions:
  • What is computer virus?
    8·1 answer
  • Give two reasons why cloud computing could be harmful to an organization.<br> (No choices!)
    15·1 answer
  • What is this file used for
    15·2 answers
  • The field on which records are sorted is called the composite primary key.A. TrueB. False
    12·1 answer
  • Write a program that lets the user play the game of Rock, Paper, Scissors against the computer. The program should work as follo
    13·1 answer
  • Most hard drives are divided into sectors of 512 bytes each. Our disk has a size of 16 GB. Fill in the blank to calculate how ma
    9·1 answer
  • What is output if the user types in 8
    15·1 answer
  • The most common threats to your computer and your online safety come from what is called ____
    11·2 answers
  • A computer reads a sequence from top to bottom and left to right.
    13·1 answer
  • Select the correct answer from each drop-down menu. The following diagram shows four resistors. What is the effective resistance
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!