A sorting algorithm can involve switching the places of two elements being compared, a process called ____.

A. swapping
B. data hiding
C. batch processing
D. sorting


Answer: A

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The algorithm will produce a different output depending on the specific secret key being used at the time. The exact substitutions and transformations performed by the algorithm depend on the key. 2. When using symmetric encryption it is very important to keep the algorithm secret. 3. On average, half of all possible keys must be tried to achieve success with a brute-force attack. 4. Ciphertext generated using a computationally secure encryption scheme is impossible for an opponent to decrypt simply because the required information is not there. 5. Monoalphabetic ciphers are easy to break because they reflect the frequency data of the original alphabet.

Computer Science & Information Technology

A reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C shoppers have the ability to design a _____ product.

A. standardized B. universal C. generic D. ?personalized 

Computer Science & Information Technology

The Independent Basic Service Set is a wireless network that uses an AP.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Picture ________ include shadows, reflections, glows, soft edges, bevels, and 3-D rotations

A) backgrounds B) layouts C) effects D) shapes

Computer Science & Information Technology