1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
3 years ago
6

I have an array that is already sorted. Periodically, some new data comes in and is added to the array at random indexes, messin

g up the ordering. I need to re-sort the array to get it back to being fully ordered. I do not want to use very much additional memory during the sort. Choose the sorting algorithm we studied that will perform the best:
a. Quick sort
b. Merge sort
c. Insertion sort
d. Selection sort
Computers and Technology
1 answer:
Greeley [361]3 years ago
8 0

Answer:

The answer is "Option C".

Explanation:

The array was already sorted. Much new information is applied to the array on a recurring basis at random indices, to bring everything back in order. During in the sort, I wouldn't want to use much further memory.

It is a sorting algorithm that constructs one piece at a time in the final sorted array. In large lists, it is far less effective than sophisticated technology like quicksort, heapsort, or combination sort.

You might be interested in
Write a function called cipher(phrase,shift)that accepts two parameters: a string phrase and an integer shift.The integer shift
Aleks [24]

Answer:

Following is given the code according to requirement.

The code is attached as an image so that the indentation is understood by the user. Comments are given inside the code where necessary.

The output of code is also attached as well  in end.

I hope it will help you!

Explanation:

7 0
3 years ago
To create a multi-column and multi-row box for users to type into in an html form, use the ____________ tag pair
alexgriva [62]

To create a multi-column and multi-row box for users to type into in an html form, use the <textarea></textarea> tag pair.

<span>The html tags are the codes or the hidden keywords in the web browser to tell about its format and displayed content. The html tags mostly comes in pairs, pair consist of the start tag and end tag.</span>
4 0
3 years ago
After discovering a security incident and removing the affected files, an administrator disabled an unneeded service that led to
patriot [66]

Answer:

A. Containment

Explanation:

  • This Containment is important before an incident or damage to resources. Most events require control, so it is important when handling each event. Containment provides time to develop a solution strategy that is prevalent.
  • Decisions Making decisions to facilitate an event is much easier if the decision is involved in predetermined strategies and processes. Organizations must define acceptable risks in dealing with events and develop strategies accordingly.
  • Network prevention is a fast and powerful tool designed to give security administrators the power they need to detect and prevent threats.
5 0
4 years ago
A clock is reading 10:27:54.0 (hr:min:sec) when it is discovered to be 4 seconds fast. Explain why it is undesirable to set it b
lara31 [8.8K]

Answer:

(a)Applications Time Stamp Events

(b)S=0.5(W-T_{skew})+T_{skew}, where T_{skew}≤W≤T_{skew}+8.

Explanation:

Some applications assume that clocks always advance, so they could timestamp events under this assumption.

In our case we have the wrong timed clock, say W and the hardware clock H which is supposed to advance at a perfect rate.

We proceed to construct a software clock such that after 8 seconds we can replace the wrong timed clock with the software clock in good conditions.

Let us denote the software clock with S.

Then, S=c(W-T_{skew})+T_{skew} where:

T_{skew}=The current Time(10:27:54) and;

c is to be found.

We already know that S=T_{skew}+4 when W= T_{skew}+8,

So:

S=c(W-T_{skew})+T_{skew}

T_{skew}+4=c(T_{skew}+8-T_{skew})+T_{skew}

4=8c

c=0.5

We obtain the formula

S=0.5(W-T_{skew})+T_{skew}, where T_{skew}≤W≤T_{skew}+8.

4 0
3 years ago
Describe the components of the Ethernet frame in detail?
Marta_Voda [28]
Starts with an Ethernet header, which contains destination and source MAC addresses as its first two fields
7 0
4 years ago
Other questions:
  • An analyst is reviewing the logs from the network and notices that there have been multiple attempts from the open wireless netw
    13·1 answer
  • Something the user knows (ID and password); something the user has (such as a smart card, which is a credit card device storing
    12·1 answer
  • What is computer hacking? describe some examples
    6·1 answer
  • What are the diffrent types of contract
    9·1 answer
  • Grace is performing a penetration test against a client's network and would like to use a tool to assist in automatically execut
    13·2 answers
  • What is a type of machine-to-human communication?
    14·1 answer
  • Where are parameters such boot order, processor voltage, motherboard raid, hardware virtualization support, and overclocking con
    7·1 answer
  • 8. What do you believe: should husbands make decisions for their wives.
    5·1 answer
  • Which word describes an important characteristic of good computer
    6·1 answer
  • What are the small squares that appear in the corners and in the middle of the sides of a selected object's border called?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!