1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
3 years ago
10

Assume you use Bubble Sort to sort a list with 15 elements (i.e.n= 9). Exactly howmany comparisons do you use (in the worst case

)?
Computers and Technology
1 answer:
Salsk061 [2.6K]3 years ago
4 0

Answer:

Worst case is 55 but it really does depend on the numbers

Explanation:

1/2n squared -1

So that would be 7.5 squared -1

You might be interested in
A user is claiming a host can be reached via the IP address but not through the name. What should a technician do first to resol
bagirrra123 [75]

Answer:

Add an entry to the HOSTS file

Explanation:

A file that is used to add the host name along with their IP addresses is called Host file. In this file all the IP addresses are mapped with their respective host names. Whenever some user tries to access some website, he may use the name of website to access it. The website have both name and IP address of the server, both of these information stored in host file. On GUI the user only see the information of Host name.

If some user only access the IP address of the website instead of the host name. The technician should add the name and IP address of the host in Host file. He should follow the following steps to resolve the problem.

  1. Access the host file by following the given path of file in Windows operating system.
  2. open the host file
  3. edit the file with new host name and relevant IP address
  4. save the changes

3 0
4 years ago
Modify your main.c file so that it allocates a two dimensional array of integers so that the array has 20 rows of 30 integers in
Alexandra [31]

Answer:

Explanation:

b

7 0
3 years ago
Which of the following statements should be avoided when developing a mission statement?
Citrus2011 [14]

Answer: The how-to statements

Explanation:

The mission statement is simply a short summary of the purpose of a company. It is the guideline on how a company will operate. The mission statement states the reason for the existence of a company, products sold or service rendered and the company's goals.

The mission statement should be brief but comprehensive, consist of simple words and describe the “who, what, and where” of the organization.

Therefore, the incorrect option based on the explanation above is "The how-to statements". This shouldn't be part of the mission statement.

3 0
3 years ago
Of the following which would be the best data representation for this puzzle in a puzzle class?
sladkih [1.3K]

please include the puzzle and or questions.

5 0
3 years ago
Leah’s computer is connected to the network most of the time. Once, she noticed few of her files with sensitive data were missin
vivado [14]

Answer:

The Firewall (Router) is the vulnerable hardware.

Explanation:

The entry into the network will be the firewall (If there is a firewall installed on the network), if this medium is compromised, every workstation on the network will be vulnerable.

3 0
3 years ago
Other questions:
  • Which of these is a weakness of written communication?
    8·1 answer
  • This program will get you used to retrieving a value from a function. The function should be named getRandomNumber. The function
    15·1 answer
  • These items describe guidelines for the effective use of presentation graphics. Graphics should be large enough to be seen by th
    9·1 answer
  • What is a directed graph?
    5·1 answer
  • If your TV was showing a flat black or blue screen, or had "snow", what steps would you take to fix it?
    13·1 answer
  • What part of the meat help you identify the less tender cuts​
    13·1 answer
  • Is the most important characteristic of a hard drive.​
    7·2 answers
  • WILL MARK BRAINLIEST!!!!!!!!!!!
    6·2 answers
  • How do we Rewrite the following Python code to avoid error. mark=inpt("enter your mark ")
    6·1 answer
  • What service determines which resources a user can access along with the operations that a user can perform?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!