1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
7

Suppose we are sorting an array of nine integers using heapsort, and we have just finished one of the reheapifications downward.

The array now looks like this: 3 2 6 4 5 1 7 8 9 How many completed reheapification downward operations have been performed so far
Computers and Technology
1 answer:
Ilia_Sergeevich [38]3 years ago
7 0

Answer:

3

Explanation:

Heap sort pick an item from the first or last position in an array and compares it with other items in other positions in the array, swapping position if they meet the condition.

The array above has three maximum items arranged sequentially in the array, this is prove that there have been 3 reheapifications in the array.

You might be interested in
Which of the following is a method which can be used to delete a page from a publication?
Alexandra [31]
Selecting the page and pressing the backspace key
3 0
3 years ago
Some of the ways we can resolve IPv4 address shortage
tekilochka [14]

Answer:

NAT

Proxy

IPv6

Explanation:

Network Address Translation (NAT) allows a local area network (LAN) to connect to the internet using only one external IP address. The LAN addresses (typically 192.168.x.x) can be used over and over again.

A proxy is a computer that makes requests to the internet on behalf of the computers on a LAN. It is a more restricted flavour compared to the NAT, but the effect is the same.

IPv6 is a new addressing scheme that will use a 48 bits address space rather than a 32 bits address space of IPv6, and that would provide plenty of addresses.

7 0
3 years ago
TRUE/FALSE QUESTIONS: T F 1. An intruder can also be referred to as a hacker or cracker. T F 2. Activists are either individuals
Law Incorporation [45]

Answer:

1. True 2. False 3. True 4. True 5. True 6. False 7. True

Explanation:

1.  A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.

2. Activists are people who campaign to bring about a positive political or social change.

3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.

4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.

5. Yes, intruders have a common attack methodology.

6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.

7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.

5 0
3 years ago
ASAP PLZ!!!!!! Select the correct answer from each drop-down menu. Complete the sentences related to the types of sample data. I
Anit [1.1K]

Answer:

Data mining is one of the activities in Data Analysis. ... On the other hand, Data Analysis tests a given hypothesis. While Data mining is based on Mathematical and scientific methods to identify patterns or trends, Data Analysis uses business intelligence and analytics models.

Explanation:

8 0
3 years ago
The second phase of the writing process is when you draft your message. Choose the appropriate step in the drafting phase to com
Kamila [148]

Answer: a. Proofreading

Explanation:

Proofreading is an important part in the publication process. In this the carefully all the contents of the text are thoroughly read and errors are rectified and corrected like formatting issues, spelling mistakes, grammatical errors, inconsistencies, punctuation mistakes, and other mistakes are checked. Without proofreading no writing should be published.

According to the given situation, proofreading is the part of the revision process of the writing. This is done when the writing part is completed and the content is sent for electronic printing before electronic printing thorough revision of the content is required.

6 0
3 years ago
Read 2 more answers
Other questions:
  • They predicted another cold day in Seattle. They predicted another windy day in Seattle. Combine the sentences into one sentence
    8·1 answer
  • Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data
    11·1 answer
  • One of the most famous ___ licenses is gpl, which ensures that a particular program remains free to distribute and allows its co
    10·1 answer
  • Easy STEAM question :)
    15·2 answers
  • How to Ctrl + shift + F4 but in a HP laptop?​
    8·2 answers
  • All computers can support multiple internal hard drives. <br><br> a. True <br><br> b. False
    13·1 answer
  • A collection of computers and other hardware devices that are connected together to share hardware, software, and data, as well
    15·1 answer
  • Nothing bottomnothing
    9·1 answer
  • Snap Me on <br>samxavier.18​
    12·2 answers
  • You are configuring NIC teaming on a server with two network adapters. You chose Switch Independent Mode. You now must choose be
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!