subject

Identify the correct shell sort algorithm for the given interleaved sorting. InsertionSortInterleaved(numbers, numbersSize, startIndex, gap) { i = 0
j = 0
temp = 0 // Temporary variable for swap
for (i = startIndex + gap; i < numbersSize; i = i + gap) {
j = i
while (j - gap >= startIndex && numbers[j] < numbers[j - gap]) {
temp = numbers[j]
numbers[j] = numbers[j - gap]
numbers[j - gap] = temp
j = j - gap
}
}
}
ShellSortistOfGames, listSize, gapValues) {
for each gapValue in gapValues)
for (i = gapValue; i > 0; i--) {
Insertion Sortinterleaved listOfGames, listSize, 1. gapValue)
O }
}
}
ShellSortlist, listSize, gapValues) (
for each (gapValue in gapValue)
for (i = 1; i < gapValue; ++) {
InsertionSortinterleaved listofGames, listSize, i, gapValue)
O }
}
}
ShellSortinumbers, numbers Size, gapValues) {
for each (gapValue in gapValues) {
for (i = 0; i InsertionSortinterleaved numbers, numbersSize, igapValue)
O }
}
}
ShollSortistOfGames, listSize, gapValues) (
for each (gapValue in gapValues) {
Insertion , listSize)
O }
}
}

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 10:00
What is estimated time of arrival (eta)? a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds a gps technology adventure game that posts the longitude and latitude location for an item on the internet for users to find a north/south measurement of position the time of day of an expected arrival at a certain destination and is typically used for navigation applications
Answers: 3
question
Computers and Technology, 23.06.2019 11:30
Auser is given read permission to a file stored on an ntfs-formatted volume. the file is then copied to a folder on the same ntfs-formatted volume where the user has been given full control permission for that folder. when the user logs on to the computer holding the file and accesses its new location via a drive letter, what is the user's effective permission to the file? a. read b. full control c. no access d. modify e. none of the above
Answers: 1
question
Computers and Technology, 23.06.2019 13:50
Explain how email technologies enable the exchange of messages between users. find out the typical parts of an email address and explain each part.
Answers: 1
question
Computers and Technology, 24.06.2019 11:00
Need fast im timed in a paragraph of 125 words, explain at least three ways that engineers explore possible solutions in their projects.
Answers: 2
You know the right answer?
Identify the correct shell sort algorithm for the given interleaved sorting. InsertionSortInterleave...
Questions
question
Mathematics, 17.11.2020 22:40
question
Mathematics, 17.11.2020 22:40
question
Mathematics, 17.11.2020 22:40
question
Mathematics, 17.11.2020 22:40
Questions on the website: 13722363