Answer the following statements true (T) or false (F)
1. Any sorting algorithm, such as bubble sort or selection sort, that can be used on data stored in an array can also be used on data stored in a vector.
2. If algorithm A requires 2n + 1 basic operations to process an input of size n, and Algorithm B requires 3n + 2 basic operations to process the same input, algorithms A and B are considered to be equally efficient.
3. With pointer variables you can access, but you cannot modify, data in other variables.
4. An array name is a pointer constant because the address it represents cannot be changed during run-time.
5. Memory cannot be allocated after a program is already running.
1. TRUE
2. TRUE
3. FALSE
4. TRUE
5. FALSE
You might also like to view...
The Department of Defense developed the Ada language with a capability called ______, which allows programmers to specify that many activities can proceed in parallel.
Fill in the blank(s) with the appropriate word(s).
When specifying the size of frames, the asterisk represents a ratio value
Indicate whether the statement is true or false
Main memory is faster than cache memory
Indicate whether the statement is true or false
Jo an employee reports to the security manager that several files in a research and development folder that only JOE has access to have been improperly modified. The modified data on the files in recent and the modified by account is Joe's. The permissions on the folder have not been changed, and there is no evidence of malware on the server hosting the folder or on Joe's workstation. Several failed login attempts to Joe's account were discovered in the security log of the LDAP server. Given this scenario, which of the following should the security manager implement to prevent this in the future?
A. Generic account prohibition B. Account lockout C. Password complexity D. User access reviews