Answer the following statements true (T) or false (F)

1. Any sorting algorithm, such as bubble sort or selection sort, that can be used on data stored in an array can also be used on data stored in a vector.
2. If algorithm A requires 2n + 1 basic operations to process an input of size n, and Algorithm B requires 3n + 2 basic operations to process the same input, algorithms A and B are considered to be equally efficient.
3. With pointer variables you can access, but you cannot modify, data in other variables.
4. An array name is a pointer constant because the address it represents cannot be changed during run-time.
5. Memory cannot be allocated after a program is already running.


1. TRUE
2. TRUE
3. FALSE
4. TRUE
5. FALSE

Computer Science & Information Technology

You might also like to view...

The Department of Defense developed the Ada language with a capability called ______, which allows programmers to specify that many activities can proceed in parallel.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When specifying the size of frames, the asterisk represents a ratio value

Indicate whether the statement is true or false

Computer Science & Information Technology

Main memory is faster than cache memory

Indicate whether the statement is true or false

Computer Science & Information Technology

Jo an employee reports to the security manager that several files in a research and development folder that only JOE has access to have been improperly modified. The modified data on the files in recent and the modified by account is Joe's. The permissions on the folder have not been changed, and there is no evidence of malware on the server hosting the folder or on Joe's workstation. Several failed login attempts to Joe's account were discovered in the security log of the LDAP server. Given this scenario, which of the following should the security manager implement to prevent this in the future?

A. Generic account prohibition B. Account lockout C. Password complexity D. User access reviews

Computer Science & Information Technology