1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
7

A list is sorted by selecting the largest element in the list and swapping it with the last one. This technique is called ______

__.
Computers and Technology
1 answer:
ratelena [41]3 years ago
4 0
Selection sort is the answer
You might be interested in
Bayley wants to connect a new external hard drive to his Windows PC. He wants the fastest connection type available because he p
USPshnik [31]

Answer:

Thunderbolt 3

Explanation:

Bayley certainly needs the fastest connection possible for his work. The best connection type for this kind of work is the Thunderbolt 3. Thunderbolt 3 is an improvement of the previous Thunderbolt 2 developed by Intel. Thunderbolt 3 has two times the speed of Thunderbolt 2. Theoretically, its maximum throughput is approximately 40 Gbps.

7 0
3 years ago
Read 2 more answers
What movie would be greatly improved if it was made into a musical?
Lina20 [59]
Sixteen candles would be even better if it was a musical
3 0
3 years ago
You are creating a classification model from a DataFrame that contains data about traffic on highways in a US state, which conta
torisob [31]

Answer:

Split the data into two randomly sampled DataFrame,and then train the model with one DataFrame and test it with the other .As we have know labels in the data frame ,so this approch will give us a better picture on how accuractly our model is trained

Explanation:

Split the data into two randomly sampled DataFrame,and then train the model with one DataFrame and test it with the other .As we have know labels in the data frame ,so this approch will give us a better picture on how accuractly our model is trained

3 0
3 years ago
In last week's meeting we discussed long and short term costs associated with build an buy scenarios using a house as an example
dedylja [7]

Answer:

Custom software designs a software package that is targeted to a particular user community and that meets an organization's specific needs. A lot of these things must be taken into account whenever making a "buy vs. create" decision for a custom software.

Purchasing a wrong program may hinder the process for your business while trying to build one can be expensive and time consuming. The study of these two methods should take into account labor costs, long-term and brief-term costs, and infrastructure costs.

The most popular purpose an organization creates or gets a custom product is that it's special to their organization and if the software is designed effectively it will improve the business' productivity and create its own competitiveness edge.

Moreover, creating a custom software requires a great upfront cost and it also takes a long time to build a proper one.

Labor costs for developing a customized product are often greater than purchasing off-the-shelf solution, as the company has to employ a software developer and build an IT team to create and manage the right software.

There would be maintenance costs in the long run but it wouldn't be as enormous as it was in the building and the process of creation. But, the more significant than cost, is the long-term benefit it brings to the business.

A specific application will improve the workflow of the company, allow the company to retain space with the rate and volume expansion, all of which would help bring financial benefits and distinguish the business from other competitors.

4 0
3 years ago
Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
SCORPION-xisa [38]

Answer: Snort

Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.

The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.

3 0
3 years ago
Other questions:
  • Which version represents the video project after the assembly cut has been completed, transitions and special effects have been
    9·1 answer
  • Write a method swaparrayends() that swaps the first and last elements of its array parameter. ex: sortarray = {10, 20, 30, 40} b
    15·1 answer
  • Which is most harmful computer virus define​
    15·1 answer
  • True or False: The correct answer to a numeric entry field will appear only if you click on the fields themselves after selectin
    12·1 answer
  • Why were spices very important 500 yr and what did people use them for
    8·1 answer
  • 2- (8 point) Write a program using the instructions below. Assume that integers are stored in 4 bytes. a) Define an array of typ
    10·1 answer
  • A boundary marks the inside and outside of a system and sets the system apart from its environment.
    11·1 answer
  • What is bit in computer science? (You must select all correct answers.) Hb. A. A part of a tool, such as a router. Non. B. A bas
    6·2 answers
  • of the choices listed, which is the correct protocol to access a remote computer and execute commands?
    11·1 answer
  • Lists Five Examples of simple statement<br>​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!