Subjective information is sometimes helpful in decision making.
a. True b. False

Answers

Answer 1

Answer:

a-true

Explanation:

you find that you not certain about what you want so I suggest you find information on that certain subject

Answer 2

Answer:

FALSE.

Hope it helps..


Related Questions

1 Refer to the plan below and write a Java program called PrintSum which outputs the sum of the (10 marks) ..umbers from 0 up to n, where n is input by the user: Plan Initialise total and counter to 0 Get n from the user
WHILE the counter is <=n
update the total
add 1 to counter print total

Answers

The java program that called "PrintSum" that follows the provided plan is given below.

What is the Java program?

import  java.util.Scanner  ;

public class PrintSum {

   public   static void main(String[] args){

       int   total =0;

       int counter = 0;

       Scanner   scanner = newScanner(System.in);

       System.out.print("Enter a   number (n):");

       int n = scanner.nextInt();

       while (counter <= n) {

           total += counter;

           counter++;

       }

       System.out.println("  The sum of numbers from 0 to " +n + " is: " + total);

   }

}

How does this work  ?

This program prompts the user to enter a number (n),then calculates the sum of numbers from 0 to n using  a while loop.

The total variable is updated in each   iteration of the loop,and the counter is incremented by 1. Finally, the program outputs the calculated sum.

Learn more about Java at:

https://brainly.com/question/26789430

#SPJ1

In MIPS, all operation codes (op-codes) use ______ only.

A- 5 bits
B- 8 bits
C- 6 bits
D -32 bits

Answers

Answer:

5 bits

Explanation:

ue82ijevw8ey जभछतड।णृबदजठणब

Which of these is false?
Power BI is a tool for visualizing your data and for storytelling
Power BI is interactive and you work with dashboards and reports to discover trends and insights.
Power BI is collaborative - you work from the same data (reports, apps, dashboards) with colleagues to collaborate and share.
Power BI is another name for the reporting tools found in Excel and Microsoft Dynamics

Answers

Answer:

false

Explanation:

i think its false but , try asking your teacher to be sure of this

problem description IT​

Answers

In IT, a problem description refers to a clear and concise explanation of an issue or challenge that needs to be resolved within a technology system or application.

How is this so?

It involves providing relevant details about the symptoms, impact, and context of the problem.

A well-written problem description outlines the specific errors, failures, or undesired behavior observed and provides enough information for IT professionals to analyze and identify potential solutions.

A comprehensive problem description is crucial for effective troubleshooting and problem-solving in the IT field.

Learn more about Problem Description at:

https://brainly.com/question/25923602

#SPJ1

Consider this scenario: A major software company finds that code has been executed on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. Which of the following statements best describes the company’s approach?

Answers

Answer:

The company effectively implemented patch management.

Explanation:

From the question we are informed about a scenario whereby A major software company finds that code has been executed on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. In this case The company effectively implemented patch management. Patch management can be regarded as process involving distribution and application of updates to software. The patches helps in error correction i.e the vulnerabilities in the software. After the release of software, patch can be used to fix any vulnerability found. A patch can be regarded as code that are used in fixing vulnerabilities

Critical Thinking
6-1
Devising a DC Strategy
Problem:

This project is suitable for group or individual work. You're the administrator of a network of 500 users and three Windows Server 2016 DCs. All users and DCs are in a single building. Your company is adding three satellite locations that will be connected to the main site via a WAN link. Each satellite location will house between 30 and 50 users. One location has a dedicated server room where you can house a server and ensure physical security. The other two locations don't have a dedicated room for network equipment. The WAN links are of moderate to low bandwidth. Design an Active Directory structure taking into account global catalog servers, FSMO roles, sites, and domain controllers. What features of DCs and Active Directory discussed in this chapter might you use in your design?

Answers

The Active Directory (AD) database and services link users to the network resources they require to complete their tasks.The database (or directory) holds crucial details about your environment, such as how many computers and users there are, as well as who has access to them.

What is the features of DC refer ?

By verifying user identity through login credentials and blocking illegal access to those resources, domain controllers limit access to domain resources.Requests for access to domain resources are subject to security policies, which domain controllers apply. To create and administer sites, as well as to manage how the directory is replicated both within and between sites, utilize the Active Directory Sites and Services console.You can define connections between sites and how they should be used for replication using this tool. All of the information is safeguarded and kept organized by the domain controller.The domain controller (DC) is the container that Active Directory uses to store the kingdom's keys (AD). Administrators and users can easily locate and use the information that Active Directory holds about network objects.A structured data store serves as the foundation for the logical, hierarchical organization of directory data in Active Directory. A networking appliance designed specifically for enhancing the performance, security, and resilience of applications provided over the internet is known as an application delivery controller (ADC). Distributed Control Systems (DCS.   Automatic regulation.    Program (logic) control   Remote control (start, shutdown, change of set points),  Alarms and notifications management,Collection and processing of process and equipment data. Graphic presentation of process and equipment condition data.Applications like production scheduling, preventative maintenance scheduling, and information interchange are made possible by the DCS.The global dispersion of your plant's subsystems is made easier by a DCS.A DCS may effectively monitor or enhance operational qualities like: Efficiency. Industrial processes are controlled by DCS to raise their dependability, cost-effectiveness, and safety.Agriculture is one process where DCS are frequently employed.chemical factories.refineries and petrochemical (oil) industries. The DCS is interfaced with the corporate network in many contemporary systems to provide business operations with a perspective of production.View Next:DCS Wiring Plans.Test on instrumentation.Secure Control System.dustrial communication, automation, and remote function. As the name implies, the DCS is a system of sensors, controllers, and associated computers that are distributed throughout a plant. Each of these elements serves a unique purpose such as data acquisition, process control, as well as data storage and graphical display.

       To learn more about Active Directory refer

      https://brainly.com/question/24215126

       #SPJ1

       

d) Declare an array list and assign objects from the array in (a) that have more than or equal to 4000 votes per candidate to it. ​

d) Declare an array list and assign objects from the array in (a) that have more than or equal to 4000

Answers

An example of how you can declare an ArrayList and assign objects from an array that have more than or equal to 4000 votes per candidate is given in the image attached?

What is the ArrayList

In this particular instance, one has introduce and establish a Candidate category that embodies every individual who is running for election, comprising their respective titles and total number of votes they receive.

One need to go through each element in the candidates array, assess whether their vote count meets or exceeds 4000, and include them in the highVoteCandidates ArrayList. In conclusion, we output the candidates with the most votes contained in the ArrayList.

Learn more about  ArrayList  from

https://brainly.com/question/24275089

#SPJ1

d) Declare an array list and assign objects from the array in (a) that have more than or equal to 4000
d) Declare an array list and assign objects from the array in (a) that have more than or equal to 4000

1) If it takes your computer 2 hours to complete a process requiring 3TB of memory, how fast is your dada processing speed in KB per second

2) You are comparing two computerized devices to determine which to buy. You like downloading 30 MB songs. How many full songs will a device with 8GB storage hold

we are supposed to use the cancelling method thing or whatever

Kilobyte=KB=1024 bytes
megabyte=MB=1024 KB
gigabye=GB=1024 MB
terabyte=TB=1024 GB

Answers

If it takes a computer 2 hours to complete a process requiring 3TB of memory, the data processing speed in KB per second is: 416667KB/Second.

What is the justification for the above answer?

Since our answer must be in KB/Sec, hence we first convert our data in to KB and Seconds.

Given the above conversion table,

3TB  = 3 x 10⁹ or 3000000000 kb

2 hours = 7200 seconds

Hence,

Processing speed in KB/sec

= 3000000000/ 7200

= 416666.666667

\($\approx$\) 416667KB/Second

If one likes downloading 30 MB songs. How many full songs will a device with 8GB storage hold?

8GB = 8000megabyts

Hence,

a device with 8,000 megabytes will contain:

8000/30

= 266 songs.

Learn more about Data Processing Speed:
https://brainly.com/question/14515121
#SPJ1

What will be the output?
name = "Dave"
print(name)
A. name
B. "Dave"
C. Dave
D. (name)

Answers

i believe it’s c, sorry if im wrong

survey and describe the system

Answers

Survey systems help create, distribute, and analyze surveys by providing a framework for designing questionnaires, managing respondents, and analyzing data.

What is survey?

A survey system lets users create surveys with different question types and response options. The system offers multiple ways to distribute surveys, including sharing a web link, email invites, website embedding, and social media.

Data is collected from respondents and stored accurately and securely, with error checking and validation in place. After survey completion, analyze data with summary stats, visualizations, filters, and cross-tabulations for identifying patterns. Survey systems have reporting features to generate detailed reports based on its data, including statistics, graphs, etc.

Learn more about survey  from

https://brainly.com/question/14610641

#SPJ1

A library contains 60,000 books. 14,000 are on the subject of business, 22,000
are on healthcare and 12,000 on psychology and law. What percentage of the
library’s books is on computing, if computing books make up two-thirds of the
remainder?

Answers

Answer:

13%

Explanation:

Taking out business, healthcare, and psychology & law leaves 12,000. 2/3 of 12,000 is 8,000. 8,000 is 13(.333)% of 60,000.

QUESTION 1 Choose a term from COLUMN B that matches a description in COLUMN A. Write only the letter (A-L) next to the question number (1.1-1.10) in the ANSWER BOOK. COLUMN A 1.1. Substances that provide nourishment to the body 1.2. How you think and feel about something 1.3. Helps to cope with the challenges of being a student Exercise relating to increasing your heart rate 1.5. Having traits or qualities traditionally associated with 1.4. men 1.6. Seeing, hearing, or sensing something that is not really there 1.7. 1.8. Leaving everything till the last minute Is Chapter 2 in the Constitution of SA 1.9. Group of people who share notes and information 1.10. Ability to exercise for extended period of time COLUMN B A hallucination B nutrients C study group D procrastinate E endurance F Bill of Rights G Cardio-vascular H masculine I attitude J resilience K strength L flexibility ​

Answers

Answer:

1.1 B nutrients 1.2 I attitude 1.3 J resilience 1.4 H masculine 1.5 L flexibility 1.6 A hallucination 1.7 D procrastinate 1.8 F Bill of Rights 1.9 C study group 1.10 E endurance

Explanation:

Need help
I need help with this it’s really confusing and I have to send it to my teacher with a file I don’t get it

Need help I need help with this its really confusing and I have to send it to my teacher with a file

Answers

Answer:

100 POINTS MATHEMATICS MIDDLE SCHOOL HOMEWORK.

I will report you if you answer incorrectly or steal my points.

You are part of a sales group that has been asked to give a presentation.
Before you begin, what should you and your group do?
O A. Figure out who is the best public speaker.
O B. Look into file-sharing options so that everyone can work on the
same file at the same time.
OC. Buy the best software on the market.
O D. Ask if you have to give a slide presentation.

Answers

The answer is the 2 one becuase I took the test

Project – Develop an outline for your business plan. While most of it is an outline, write a business idea statement, a purpose statement, and a plan of the next steps to do.

Answers

Our trade plan outlines the happening of a mobile app that tracks often water consumption and reminds consumers to stay hydrated.

What is the purpose?

The purpose of our app search out reassure healthy hydration tendencies and advance overall wellness.

To solve our aims, we will conduct consumer research, create an example, test accompanying a focus group, purify established responses, and launch the app on two together iOS and Android principles.

We will also evolve a shopping approach, gather responses, steadily improve the app, and survey participation with well-being and well-being parties for expansion.

Read more about business plan here:

https://brainly.com/question/28303018

#SPJ1

4:when a computer is on it is
normally termed......
A:information
B:programming
C:running ↓

Answers

Answer:

c: running

Explanation:

when the computer is turned on The operating system keeps things organized in the background so that multiple programs can run at the same time

What happens during a SQL interjection?

A.
XML input is affected
B.
a syntax error occurs
C.
LDAP statements are exploited
D.
system operations are affected

Answers

Answer:

SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.

Design a pda (pushdown automata) of the following:
a^n b^n c^m d^4m

Answers

Answer:

Explanation:

Here is the design of a Pushdown Automaton (PDA) for the language L = {a^n b^n c^m d^4m}:

1. The PDA has a stack to store symbols.

2. The initial state is q0 and the initial stack symbol is Z0.

3. The transitions are defined as follows:

- Transition from q0:

 - Read 'a' from the input, push 'A' to the stack, and remain in q0.

 - Read 'b' from the input, pop 'A' from the stack, and transition to q1.

 - Read 'c' from the input, push 'C' to the stack, and transition to q2.

 - Read 'd' from the input, push 'D' to the stack, and transition to q3.

- Transition from q1:

 - Read 'b' from the input, pop 'A' from the stack, and remain in q1.

 - Read 'c' from the input, push 'C' to the stack, and transition to q2.

 - Read 'd' from the input, push 'D' to the stack, and transition to q3.

- Transition from q2:

 - Read 'c' from the input, push 'C' to the stack, and remain in q2.

 - Read 'd' from the input, pop 'C' from the stack, and transition to q2.

 - Read 'd' from the input, pop 'D' from the stack, and transition to q2.

 - Read end of input, pop 'Z0' from the stack, and transition to q4 (final state).

- Transition from q3:

 - Read 'd' from the input, push 'D' to the stack, and remain in q3.

 - Read end of input, pop 'Z0' from the stack, and transition to q4 (final state).

4. The PDA accepts the input string if it reaches the final state q4 with an empty stack.

Note: This PDA design assumes that n and m are positive integers. If n or m can be zero, some modifications to the transitions may be needed to handle those cases.

in media literacy,
how does media influence public? and the press

⚫ analyze or compare the influences of social media
⚫ analyze the ethics or journalist, news outlets, etc​

Answers

what is mean by computers

do any of you know of a good online web browser?

Answers

Answer:

For me well the obvious GO OGLE...LOL sorry didnt understood well..

Answer: the dark web

Explanation:

Which of the following would be considered unethical for a programmer to do? (5 points)

Create software used to protect users from identity theft
Ignore errors in programming code that could cause security issues
Protect users from unauthorized access to their personal information
Use someone else's code with the original developer's permission

Answers

One thing that would be onsidered unethical for a programmer to do is B. Ignore errors in programming code that could cause security issues

Why would this be unethical for a programmer ?

Creating software designed to protect users from identity theft stands as a commendable and ethical endeavor, demonstrating the programmer's commitment to safeguarding user information and thwarting identity theft.

Engaging in such behavior would be considered unethical since it undermines the security and integrity of the software, potentially exposing users to vulnerabilities and compromising their sensitive data. Respecting intellectual property rights and obtaining proper authorization reflects adherence to ethical and legal standards.

Find out more on programmers at https://brainly.com/question/13341308

#SPJ1

For the equation y = 5 + 6x, what does y equal when x is 4?
A.
29

B.
15

C.
19

D.
23

Answers

Answer:

y = 29

Explanation:

y = 5+6x

What is y when x = 4

Substitute x with 4 :

5 + 6(4)

5 + (6×4)

5 + 24

29

y = 29

Hope this helped and have a good day

Answer:

y=29

Explanation:

y=5+6x

y=5+6(4)

y=5+24

y=29

what is the different between ethical and legal issues?​

Answers

Answer:

Ethical issue is anything that a person believes to be right or wrong that generally comes down based on personal opinion or a persons belief or philosophy while legal issue is any act done by a person whether he/she thinks it is right or wrong, whether it conforms to the law and needs legal expertise.

Explanation:

You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected

Answers

Considering the situation described here, the thing to do to ensure that the host OS is protected is to install a virtual machine.

What is a virtual machine?

Virtual Machine is the virtualization of a computer system. The purpose of a Virtual Machine is to deliver the functionality of a physical computer containing the execution of hardware and software.

How Virtual Machine is used to ensure that the host OS is protected

Virtual Machine is used to host the virtual environment and subsequently run the operating system within the virtual machine.

This process allows the sandbox to be isolated from the physical hardware while accessing the installed operating system.

Hence, in this case, it is concluded that the correct answer is to install a virtual machine.

Learn more about Virtual Machine here: https://brainly.com/question/24865302

create a visual python quiz that pops up when you run the code

Answers

Refer to the attachment!!

create a visual python quiz that pops up when you run the code


Order the steps to access the Spell Checker pane.
Click on the Review tab.
Click on the Spelling button.
Navigate to the Proofing group.

Answers

The Order  of the steps to access the Spell Checker pane is:

Click on the Review tab.

Navigate to the Proofing group.

Click on the Spelling button.

What is the order?

In Microsoft Word and additional identical program, the Review tab is a ticket situated favorable of the screen, occasionally close tabs to a degree Home, Insert, and Page Layout.

In Clicking on the Review label will take you to the portion of the program that holds forms for inspecting and rewriting your document.

Learn more about Spell Checker pane from

https://brainly.com/question/14307537

#SPJ1

python assighment 12 not whole question

For this assignment, you will write a series of methods which are designed to help you analyze how often different words appear in text. You will be provided texts as lists of words, and you will use dictionaries to help with your analysis.

Methods to write

Method
Description
get_word_counts(word_list)
This method will take a list parameter and return a dictionary which has as its keys the words from the list, and has as its values the number of times that word appears in the list. So, for example, if you have the following list:
words = ["to", "be", "or", "not", "to", "be"]
then get_word_counts(words) should return this dictionary:
{'to': 2, 'be': 2, 'or': 1, 'not': 1}
number_of_appearances(word_counts, word)
This method takes a dictionary of word counts (like the one returned from your get_word_counts method) as a parameter and a single word. It returns the number of times that word appears in the text (i.e. the value if it exists in the dictionary, or 0 otherwise).
total_words(word_counts)
This method takes a dictionary of word counts (like the one returned from your get_word_counts method) as a parameter. It returns the total number of words from the text (i.e. the sum of all the values).
most_common(word_counts)
This method takes a dictionary of word counts (like the one returned from your get_word_counts method) as a parameter. It returns the word which appears the most frequently (i.e. the key with the highest value in the dictionary). Don't worry if there is more than one most common word; any correct answer should pass the grader, as it will be tested only on word count dictionaries with a single most common word.
single_words(word_counts)
This method takes a dictionary of word counts (like the one returned from your get_word_counts method) as a parameter. It returns a list containing every word which appears exactly once (i.e. every key which has a value of 1).
get_combined_counts(word_counts_a, word_counts_b)
This method takes two dictionaries of word counts (like the one returned from your get_word_counts method) as parameters. It returns a single dictionary which combines the totals from both.
The starter code already contains the following lines of code to test your methods on some words from two classic Beatles songs.
words = ['oh', 'i', 'need', 'your', 'love', 'babe', 'guess', 'you', 'know', 'its', 'true', 'hope', 'you', 'need', 'my', 'love', 'babe', 'just', 'like', 'i', 'need', 'you', 'hold', 'me', 'love', 'me', 'hold', 'me', 'love', 'me', 'i', 'aint', 'got', 'nothing', 'but', 'love', 'babe', 'eight', 'days', 'a', 'week', 'love', 'you', 'every', 'day', 'girl', 'always', 'on', 'my', 'mind', 'one', 'thing', 'i', 'can', 'say', 'girl', 'love', 'you', 'all', 'the', 'time', 'hold', 'me', 'love', 'me', 'hold', 'me', 'love', 'me', 'i', 'aint', 'got', 'nothing', 'but', 'love', 'girl', 'eight', 'days', 'a', 'week', 'eight', 'days', 'a', 'week', 'i', 'love', 'you', 'eight', 'days', 'a', 'week', 'is', 'not', 'enough', 'to', 'show', 'i', 'care']
counts = get_word_counts(words)
print("WORD COUNTS")
for word in sorted(counts):
    print(word, counts[word])
print()

print("Appearances of 'need':", number_of_appearances(counts, "need"))
print("Appearances of 'want':", number_of_appearances(counts, "want"))
print()

print("Total words:", total_words(counts))

print("Most common word:", most_common(counts))
print()

print("SINGLE WORDS")
for word in sorted(single_words(counts)):
    print(word)
print()

other_words = ['love', 'love', 'me', 'do', 'you', 'know', 'i', 'love', 'you', 'ill', 'always', 'be', 'true', 'so', 'please', 'love', 'me', 'do', 'whoa', 'love', 'me', 'do', 'love', 'love', 'me', 'do', 'you', 'know', 'i', 'love', 'you', 'ill', 'always', 'be', 'true', 'so', 'please', 'love', 'me', 'do', 'whoa', 'love', 'me', 'do', 'someone', 'to', 'love', 'somebody', 'new', 'someone', 'to', 'love', 'someone', 'like', 'you']
other_counts = get_word_counts(other_words)
print("OTHER WORD COUNTS")
for word in sorted(other_counts):
    print(word, other_counts[word])
print()
combined_counts = get_combined_counts(counts, other_counts)
print("COMBINED WORD COUNTS")
for word in sorted(combined_counts):
    print(word, combined_counts[word])
You should uncomment lines to test your methods as you go along. Leave these lines uncommented when you submit your code, as the grader will use them for one of the tests.
If you want to transform your own text to a list so you can analyze it using your methods, here is some simple code you can use to change a passage into a list. Be warned - it may not work if your text contains quotation marks or line breaks.

Answers

Python runs on a variety of operating systems, including Windows, Mac, Linux, and Raspberry Pi.

Thus, The syntax of Python is straightforward and resembles that of English. Python's syntax differs from various other programming languages in that it enables programmers to construct applications with fewer lines of code and Linux.

Python operates on an interpreter system, allowing for the immediate execution of written code. As a result, prototyping can proceed quickly. Python can be used in a functional, object-oriented, or procedural manner.

Web applications can be developed on a server using Python. Workflows can be made with Python and other technologies.

Thus, Python runs on a variety of operating systems, including Windows, Mac, Linux, and Raspberry Pi.

Learn more about Python, refer to the link:

https://brainly.com/question/32166954

#SPJ1

a. Draw the hierarchy chart and then plan the logic for a program needed by Hometown Bank. The program determines a monthly checking account fee. Input includes an account balance and the number of times the account was overdrawn. The output is the fee, which is 1 percent of the balance minus 5 dollars for each time the account was overdrawn. Use three modules. The main program declares global variables and calls housekeeping, detail, and end-of-job modules. The housekeeping module prompts for and accepts a balances. The detail module prompts for and accepts the number of overdrafts, computes the fee, and displays the result. The end-of-job module displays the message Thanks for using this program.


b. Revise the banking program so that it runs continuously for any number of accounts. The detail loop executes continuously while the balance entered is not negative; in addition to calculating the fee, it prompts the user for and gets the balance for the next account. The end-of-job module executes after a number less than 0 is entered for the account balance.


Hierarchy chart and pseudocode required

Answers

The Hierarchy Chart for the program needed by Hometown Bank is given below:

                Main Program

                   |

               -------------

              |             |

      Housekeeping module  Detail module

              |             |

     Prompts for balance   Computes fee

         and accepts input  and displays result

              |

        -----------------

       |                 |

   End-of-job module    Detail loop (while balance >= 0)

       |

   Displays message "Thanks for using this program"

Pseudocode for Main Program:

Declare global variables

Call Housekeeping module

Call Detail module

Call End-of-job module

Pseudocode for Housekeeping Module:

Prompt for balance

Accept input for balance

Pseudocode for Detail Module:

Detail loop:

  while (balance >= 0)

     Prompt for number of overdrafts

     Accept input for number of overdrafts

     Compute fee: 1 percent of balance - 5 dollars * number of overdrafts

     Display result

     Prompt for balance

     Accept input for balance

Pseudocode for End-of-job Module:

Display message "Thanks for using this program"

Read more about pseudocode here:

https://brainly.com/question/24953880

#SPJ1

=SUM(A2:A19,013,855,19)
What is the meaning of sum

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The meaning of the sum is to add the value of the given cells. Basically,the meaning of the sum is the addition of numbers.

For example, in excel write in the formula bar, "=Sum()" its meaning is to add the value of all the given reference cells. As given in the question, "=Sum()" will add the value of the cells A2,A19, O13 and then add into 855 and 19. After all this, show the addition result in the cells where this formula is written.

A Quicksort (or Partition Exchange Sort) divides the data into 2 partitions separated by a pivot. The first partition contains all the items which are smaller than the pivot. The remaining items are in the other partition. You will write four versions of Quicksort:
• Select the first item of the partition as the pivot. Treat partitions of size one and two as stopping cases.
• Same pivot selection. For a partition of size 100 or less, use an insertion sort to finish.
• Same pivot selection. For a partition of size 50 or less, use an insertion sort to finish.
• Select the median-of-three as the pivot. Treat partitions of size one and two as stopping cases.
As time permits consider examining additional, alternate methods of selecting the pivot for Quicksort.

Merge Sort is a useful sort to know if you are doing External Sorting. The need for this will increase as data sizes increase. The traditional Merge Sort requires double space. To eliminate this issue, you are to implement Natural Merge using a linked implementation. In your analysis be sure to compare to the effect of using a straight Merge Sort instead.

Create input files of four sizes: 50, 1000, 2000, 5000 and 10000 integers. For each size file make 3 versions. On the first use a randomly ordered data set. On the second use the integers in reverse order. On the third use the
integers in normal ascending order. (You may use a random number generator to create the randomly ordered file, but it is important to limit the duplicates to <1%. Alternatively, you may write a shuffle function to randomize one of your ordered files.) This means you have an input set of 15 files plus whatever you deem necessary and reasonable. Files are available in the Blackboard shell, if you want to copy them. Your data should be formatted so that each number is on a separate line with no leading blanks. There should be no blank lines in the file. Even though you are limiting the occurrence of duplicates, your sorts must be able to handle duplicate data.

Each sort must be run against all the input files. With five sorts and 15 input sets, you will have 75 required runs.

The size 50 files are for the purpose of showing the sorting is correct. Your code needs to print out the comparisons and exchanges (see below) and the sorted values. You must submit the input and output files for all orders of size 50, for all sorts. There should be 15 output files here.

The larger sizes of input are used to demonstrate the asymptotic cost. To demonstrate the asymptotic cost you will need to count comparisons and exchanges for each sort. For these files at the end of each run you need to print the number of comparisons and the number of exchanges but not the sorted data. It is to your advantage to add larger files or additional random files to the input - perhaps with 15-20% duplicates. You may find it interesting to time the runs, but this should be in addition to counting comparisons and exchanges.

Turn in an analysis comparing the two sorts and their performance. Be sure to comment on the relative numbers of exchanges and comparison in the various runs, the effect of the order of the data, the effect of different size files, the effect of different partition sizes and pivot selection methods for Quicksort, and the effect of using a Natural Merge Sort. Which factor has the most effect on the efficiency? Be sure to consider both time and space efficiency. Be sure to justify your data structures. Your analysis must include a table of the comparisons and exchanges observed and a graph of the asymptotic costs that you observed compared to the theoretical cost. Be sure to justify your choice of iteration versus recursion. Consider how your code would have differed if you had made the other choice.

Answers

The necessary conditions and procedures needed to accomplish this assignment is given below. Quicksort is an algorithm used to sort data in a fast and efficient manner.

What is the Quicksort?

Some rules to follow in the above work are:

A)Choose the initial element of the partition as the pivot.

b) Utilize the same method to select the pivot, but switch to insertion sort as the concluding step for partitions that contain 100 or fewer elements.

Lastly,  Utilize the same method of pivot selection, but choose insertion sort for partitions that are of a size equal to or lesser than 50 in order to accomplish the task.

Learn more about Quicksort  from

https://brainly.com/question/29981648

#SPJ1

Other Questions
which of the following were black swan events that occurred in the early 21st century and helped reshape the global economy? 3. Read the sentence from Reality Is Broken by Jane McGonigal.The truth is this: in today's society, computer and video games are fulfilling genuine humanneeds that the real world is currently unable to satisfy.What claim does this counterargument best address?(3 Points)The gaming platforms cause peoplebecome overly engaged.The gaming boom represents a significant opportunity for profit.The amounts of time and money spent on gaming are skyrocketing.The amount of time that gamers spend gaming is wasted. if kate somehow were to end up with all the snickers bars and all the skittles, the allocation would be pareto efficient Mandy buys 36 pens, 36 pencils, 36 rulers and 36 pencil cases.Price listpenspencilsrulerspencil cases4 for 75p12 for 42p6 for 1.1054p eachWhat is the total amount of money spent by Mandy?I (c) (0.5 pts) assign each reaction (the one under standard conditions and the one in yeast mitochondria) as being exergonic or endergonic. explain your reasoning Why was the New Deal unconstitutional? is generally the best method available to the social scientist interested in collecting original data to describe a population too large to observe directly. C and D are mutually exclusive events. Find P(C or D) . P(C)=2/5, P(D)=3/5 PLS HELP!!! WILL GIVE BRAINLIEST hey does anyone play nitro type!? Sarah was sitting in a seat at a baseball game when another ticket holder showed her she was in the wrong seat. The other ticket holder kindly told Sarah she needed to go 5 rows down and 3 seats to the right. Which rule describes the translation needed to put Sarah in the correct seat? Either solve the following or state why there is not a solution: a. 5x =_13 1: b. 4x +9=_13 57: c. 8x + 7 =_6 12: d. 5x + 13y = 1: e. 12x + 18y = 7: what is the purpose of the firm under the shareholder theory of the firm? multiple choice question. to generate jobs for the general public to create new and improved products for customers to serve to create value for society to maximize its long-term market value a model often used when creating a program that begins with the overall task and refines it into smaller subtasks is a(n) group of answer choices Is it possible to make valid conclusions based on the data collected? (2 points) Why did the British sign the Treaty of Paris? What did Great Britain agree to do under the treaty? within a classful addressing, ____ is the default subnet mask for a class c address. explain three examples of a workshop Which of the following scenarios represents the equation below:15x + 35 = 25x + 40A-Austin is competing in a bicycle race. He has traveled 15 miles and is maintaining a steady speed of 35 mph. Alexandra is competing in the same race. She had a flat tire and has only traveled 40 miles, but now she is maintaining a speed of 25 mph. At what point will the two bicyclists meet?B-Big Dog Snowboards charges $15 for equipment rental plus $35 per hour for snowboarding lessons. Half-Pipe Snowboards charges $40 for equipment plus $25 per hour for lessons. After how many hours will the companies charge the same amount?C-Claudia received 40 dollars for her birthday and deposits the money into her savings account. She plans to save an additional 25 dollars each month to add to her account. Maria received 35 dollars for her birthday and deposits the money into her savings account. She plans to save an additional 15 dollars each month to add to her account. When will the two girls have the same amount in their savings account?D-Marco is draining his two aquariums that are the same size. One tank has 35 liters of water in it and is being drained at a rate of 15 liters per minute. The other tank has 25 liters of water in it and is being drained at a rate of 40 liters per minute. At what time will the tanks hold the same amount of water? Click on the number line below to show the approximate location of v 19 on the number line.0123456Den