1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dmitriy555 [2]
3 years ago
8

Write a program that takes a list of integers as input. The input begins with an integer indicating the number of integers that

follow. You can safely assume that the number of integers entered is always less than or equal to 10. The program then determines whether these integers are sorted in the ascending order (i.e., from the smallest to the largest). If these integers are sorted in the ascending order, the program will output Sorted; otherwise, it will output Unsorted
Computers and Technology
1 answer:
Naya [18.7K]3 years ago
4 0

Answer:

is_sorted = True

sequence = input("")

data = sequence.split()

count = int(data[0])

for i in range(1, count):

   if int(data[i]) >= int(data[i+1]):

       is_sorted = False

       break

if is_sorted:

   print("Sorted")

else:

   print("Unsorted")

Explanation:

*The code is in Python.

Initialize a variable named is_sorted as True. This variable will be used as a flag if the values are not sorted

Ask the user to enter the input (Since it is not stated, I assumed the values will be entered in one line each having a space between)

Split the input using split method

Since the first indicates the number of integers, set it as count (Note that I converted the value to an int)

Create a for loop. Inside the loop, check if the current value is greater than or equal to the next value, update the is_sorted as False because this implies the values are not sorted (Note that again, I converted the values to an int). Also, stop the loop using break

When the loop is done, check the is_sorted. If it is True, print "Sorted". Otherwise, print "Unsorted"

You might be interested in
Sypherpk is good go sub 2 him
attashe74 [19]

Answer:

Ok

Explanation:

I will check him out, do you need anything else though?

4 0
3 years ago
Read 2 more answers
Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy alg
faust18 [17]

Answer:

Following are the Pseudo Code to the given question:

Explanation:

Following are the pseudo-code by using the For loop:

Defines the A function (node, element)

The node is larger than 0.

if another value of the node equals its element

Loop Break

That element if node. value becomes lower than that

Node is node equivalent.

right

Using other nodes is node equivalent.

 left

Node Return

If the node is vacant

print the Tree is empty

Following are the pseudo-code by using the while loop:

Defines the function A(node,element)

While this node is not zero.

if the value of the node equals the element

Loop Break

The element if node. value is lower than

Node is node equivalent.

right

Using other nodes is equivalent to an a.left node

Node Return

If the node is vacant

print Tree is empty

following are the Pseudo-code for recursion:

Set the function A (node, key)

If no root is the same as the root or no root.

return the root.

If the root value is lower than that of the quest for key return (root. right, key)

Return your lookup (root.left,key)

 

5 0
3 years ago
A data structure used to bind an authenticated individual to a public key is the definition of ________.
patriot [66]

Answer:

Digital Certificate is the correct answer of this question.

Explanation:

Digital certificates are always for encryption and identification for transmitting public keys.The concept of digital certificate is a data structure used for linking an authenticated person to a public key. It is used to cryptographically attach public key rights to the organization that controls it.

<u>For example</u>:- Verisign, Entrust, etc.

  • An appendix to an electronic document that is used for authentication purposes.
  • A digital certificate's most frequent use is to confirm that an user sending a message is who he or she appears to be, and provide the recipient with the means to encode a response.

4 0
3 years ago
There are four types of characteristics attributed to a flow: reliability, delay, jitter, and bandwidth. Explain how each of the
sergeinik [125]

Answer and Explanation:

Reliability is important because if the service lacks  lacks reliability this could mean losing a packet or acknowledgement which then requires retransmission.

Delay can be tolerable in different degrees by applications, for example online chatting or conferences need to have the minimum delay possible.

Jitter is the variation in delay for packets belonging to the same flow.

High Jitter: difference between delays is large

Low jitter: difference between delays is small.

Bandwidth depends on the application. In video conferences, for example, there is a need to send million of bits per second to refresh a colour screen while sending a email may not reach even a million.

4 0
3 years ago
How do you measure the capacity of speed and memory of computer system<br>Explain.​
jeka94
Im sorry i just need points
3 0
3 years ago
Other questions:
  • What is the name of the process of heat transfer in which heat is transmitted through light waves?
    7·2 answers
  • Isaac is researching Abraham Lincoln’s life for a social studies report. He finds an encyclopedia that includes original letters
    5·2 answers
  • You are working in the media industry, and you have created a web application where users will be able to upload photos they cre
    5·2 answers
  • What percentage of business are using social media today
    14·1 answer
  • One of the best ways to shoot a picture is to frame the subject in the middle of the screen or viewer. T or F
    14·2 answers
  • Write a program to read from std_info.txt.
    11·1 answer
  • Shira’s Shoes sold 875,000 pairs of sandals in June, which was 70% of the total number of shoes sold. How many shoes did the com
    14·2 answers
  • What are the different steps while solving a problem using computer? explain​
    7·1 answer
  • If you wanted to make the system sequentially consistent, what are the key constrains you need to impose
    6·1 answer
  • Did brainly.com go down today? i coudlnt get in it
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!