How can the following algorithm be described?
position = 0while position < len(lyst): if target == lyst[position]: return position position += 1return -1

A. binary search
B. bubble sort
C. sequential search
D. selection sort


Answer: C

Computer Science & Information Technology

You might also like to view...

In array-based data structures, adjustable arrays are often used instead of fixed-length arrays because:

A. fixed-length arrays can become filled B. very little of a fixed-length array might actually be used, wasting memory C. adjustable arrays conserve memory D. All of the above

Computer Science & Information Technology

Crosstab queries display the results in a grid of columns and rows

Indicate whether the statement is true or false

Computer Science & Information Technology

When evaluating information, be suspicious of all of the following except _______ .

A. unbiased information B. URLs with slight modifications C. an organization with no history, physical location, or staff D. exceptionally long URLs

Computer Science & Information Technology

A vSphere administrator wants to force the issue of encrypted vMotion for encrypted virtual machines. What steps must be performed?

A. right-click the datastore select edit settings select encryption select Required from the Encrypted vMotion drop-down menu B. right-click the VM select edit settings select VM Options select encryption select Required from the Encrypted vMotion drop-down menu C. right-click the datacenter select edit settings select encryption select Opportunistic from the Encrypted vMotion drop-down menu D. right-click the cluster select edit settings select encryption select Disabled from the Encrypted vMotion drop-down menu

Computer Science & Information Technology