List the resulting array after each call of the merge method. Indicate the number of character-to-character comparisons made for each call to merge (line 22 of the merge method at the end of the assignment). Sort the following array of characters into alphabetical order: C Q S A X B T.
01 public static void mergesort (char[] a, int i, int r){
02
03 if (1 >= r) {
04 return;
05 }
06 int middle = (1+r)/2;
07 mergesort(a, l, middle);
08 mergesort(a, middle+1, r);
09 merge(a, l, middle, r);
10 }
11
12 public static void merge (char[] a, int i, int m, int r){
13
14 //copy lower half of the array into b
15 char [] b = new char[m-1+1];
16 for (int i = 0; i <= m-1; i++ ) {
17 b[i] = a (1+i);
18 }
19
20 int i = 0, j m+1, k = 1;
21 while (i <= m-1 && j <= r ) {
22 if (a[j] < b[i]) {
23 a[j];
24 k += 1;
25 j += 1;
26 } else {
27 a[k] b[i];
28 k += 1;
29 i += 1;
30 }
31 }
32 while (i <= m-1) {
33 a[k] b[i];
34 k += 1;
35 i += 1;
36 }
37 while ( j <= r ) {
38 a[k] a[j];
39 k += 1;
40 j += 1;
41 }
42 }

Answers

Answer 1

Answer:

40j

Explanation:

the no. divided by one is that no.


Related Questions

When it comes to memory, why is it important to have enough storage space on a hard drive when using many RAM intensive programs?

Answers

Answer:

Memory and storage are important concepts to master in Information Technology. ... This type of memory is volatile which means that the actual data disappears when the computer loses power. Because memory needs to be much faster than storage, it is rather more expensive than storage per GB.

Explanation:

Why are visually interesting effects, such as WordArt, to be used sparingly?

Answers

Explanation:

Formatting with Word Art

Standard formatting options, such as bold, italic, and underline , are all Available on the home tab.

Word Art Styles

You can find Word art text effects in the text group on the insert tab. When you apply a word art text effect , PowerPoint 2007 displays the format contextual tab under drawing tools.

Answer:

Microsoft PowerPoint is a popular presentation application that is widely used across many mediums. Maybe you’ve used it to read presentations from conferences or perhaps you’ve explored its basic functions, but have you ever considered its true impact and potential?

As a JAWS user, the benefits of creating visually appealing PowerPoint presentations might not be immediately evident, but the use of images, audio and graphics to convey an idea can significantly impact your audience. Here are 4 reasons to incorporate powerful visuals into your next presentation.

Explanation:

As a presenter, you need to grab the attention of your audience from the very beginning. While your words are certainly important, those who can see the presentation will need more to become fully engaged.

Think of it as showing rather than telling. You are literally creating a balance by illustrating the text points in your slides to convey a message, and what better way to do this than through powerful pictures, videos and graphics to pique their interest.

As a non-visual user, you might have difficulty choosing images. If so, don’t hesitate to consult with sighted individuals to find the right visuals. Your slides will be more compelling and memorable as a result.

Write a complete method to create an array of random integers. The method takes in three integer parameters: the array size, the lower bound, and the upper bound. The method also takes in a boolean parameter. The method creates and returns an integer array of the specified size that contains random numbers between and lower and upper bound. If the boolean parameter is true, the upper bound is inclusive. If the boolean parameter is false, the upper bound is not inclusive (meaning it is exclusive). Note the lower bound is always inclusive. If any of the parameters are invalid, null is returned.

Answers

Write a complete method to create an array of random integers. The method takes in three integer parameters: the array size, the lower bound, and the upper bound. The method also takes in a boolean parameter. The method creates and returns an integer array of the specified size that contains random numbers between and lower and upper bound. If the boolean parameter is true, the upper bound is inclusive. If the boolean parameter is false, the upper bound is not inclusive (meaning it is exclusive). Note the lower bound is always inclusive. If any of the parameters are invalid, null is returned.

Hope this helps!

Which unit of the computer works of the output?​

Answers

Answer:

monitor

Explanation:

this is because monitor displays information so it an output

What are the benefits of computer literacy?

Answers

Answer:

College Material

Explanation:

it helps and introduces you to more computer related thing that maybe you like and are more interested in and that could help you go to college and maybe get a degree in something to do with computers

Consider the following statements regarding computer programs A - Variables can contain different values at different times.B - Reserved words of a programming language can be used as variable names in that languageWhich of the following is true with respect to the above? * O Only A is correct Only B is correct Both A and B are incorrect Both A and B are correot​

Answers

Answer:

The answer is: Only A is correct.

Explanation:

Variables in a program can assume different values at different times, and the program can then produce different results, depending on circumstances, so A is correct.

In a computer language, a reserved word (also known as a reserved identifier) is a word that cannot be used as an identifier, such as the name of a variable, function, or label – it is "reserved from use". This is a syntactic definition, and a reserved word may have no meaning. So, B is incorrect.

Hence, the answer is: Only A is correct.

Predicting and controlling the social impact of technology, both anticipating new technologies and their social and environment implications and the consequences of ever- increasing scale of application of older technologies is one form of contribution of:


Select one:
A. Science to technology
B. Invention to innovation
C. Innovation to invention
D. Technology to science

Answers

Answer:

This report is a response to General Assembly resolution 72/242, in which the

Commission on Science and Technology for Development is requested, through the

Economic and Social Council, to give due consideration to the impact of key rapid

technological changes on the achievement of the Sustainable Development Goals. The report

contains analysis of the impact of rapid technological change on sustainable development,

especially the consequences for the 2030 Agenda for Sustainable Development’s central

principle of “leaving no one behind”. It presents the opportunities offered by rapid

technological change regarding the achievement and monitoring of the Sustainable

Development Goals across the various economic, social and environmental dimensions.

It discusses the transformative and disruptive potential of rapid technological changes,

including economic, social and normative considerations. In the report, it is highlighted that,

without appropriate science, technology and innovation policies, technologies, be they old

or new, are unlikely to deliver progress regarding global development. Such progress

requires an environment that nurtures learning and innovation to build and manage effective

innovation systems. In this context, the report presents examples of national strategies and

policies for rapid technological change and takes stock of regional, international and multistakeholder cooperation. In addition to national and international policies, the report also

calls for the international community to continue to discuss how international technology

assessment and foresight, as well as consensus building on normative guidelines, can shape

the developmental potential of rapid technological change. It concludes with suggestions for

Member States and the international community.

Explanation:

Explain basic anatomy of computers.

Answers

Explanation:

A computer system can be divided into two components which are responsible for providing the mechanisms to input and output data, to manipulate and process data, and to electronically control the various input, output, and their storage. ... They are known as hardware and software.

How was Television used when originally invented? How is television used today?

Answers

Explanation:

.......................

Answer:

Than:

Baird's early mechanical television had 30 holes and rotated 12.5 times per second. There was a lens in front of the disk to focus light onto the subject. When light hit the subject, that light would be reflected into a photoelectric cell, which then converted this light energy to electrical impulses.

Now :

Television is an inescapable part of modern culture. We depend on TV for entertainment, news, education, culture, weather, sports—and even music, since the advent of music videos. ... News, current events and historical programming can help make young people more aware of other cultures and people.

write the working of dot matrix printer?

no links

Answers

The working of dot matrix printer is provided in the picture.

what is the name of the computer that access shared resources on the network

Answers

Answer:

what is the name of the computer that access shared resources on the network

Explanation:

A server is a device or computer program that provides functionality for other devices or programs. Any computerized process that can be used or called upon by a client to share resources and distribute work is a server

If the host has a second network card, SECOND_NIC_NAME should get the name of that network card. If the managed host has no second network card, the playbook should set SECOND_NIC_NAME.

a. True
b. False

Answers

a. True is your answer

What is connectivity?

Answers

Answer:

In general terms, connectivity is the ability to connect systems or application programs.

connecting devices to each other in order to transfer data back and fourth

You can change the default margin size for Word documents. A. True B. False​

Answers

Answer:

False

Explanation:

Word processing is an application that allows you to create a variety of documents, including letters, resumes, and more.

Define basic logical gates with its symbol, algebraic expression and truth table.​

Answers

Answer:

A truth table is a good way to show the function of a logic gate. It shows the output states for every possible combination of input states. The symbols 0 (false) and 1 (true) are usually used in truth tables. The example truth table shows the inputs and output of an AND gate.

Explanation:

Please answer this, don't skip please. I would really appreciate if you had knowledge over this question and helped out :)

1) The tag is the second of two main parts of a web page. The information between the opening and closing tag is seen by web page visitors in the browser window. True or False
2) The area is the first of two main parts of a web page. The header is where the operation code resides. True or False


3) The next tag is the tag - the head is the first of two main parts of a web page. The head is where the operation code resides. True or False

Answers

Answer:

1) they are only visible to the to the person/people who are running the website. therefore the answer to that statement is false.

2) they operation code of a website resides at the end of a address, therefore that statement is also false

Explanation:


A piece of computer hardware designed to allow computer to communicate over a network is?

Answers

Answer:

The hardware is a Router....

HOMEWORK: Bud, Not Buddy I NOTICE... What do you see? chpter 3-4

Answers

Answer:

Check Explanation for Chapter 3 - 4 Summary!

Explanation:

Chapter 3:

Bud tries hard not to panic in the pitch-black darkness of the shed. The eyeballs of three dried-out fish heads stare back at him as he tries the doorknob, which he hopes Mr. Amos only pretended to lock. While deciding where to lay his blanket and pillow, he remembers the story of the cockroach crawling into his best friend’s ear back at the Home. From the story his friend, Bugs, tells, the cockroach was yelling, “My legs! My legs! Why have they done this to my legs?” while adults tried to extract it with tweezers. Bud wants to avoid any encounters with the cockroaches that are surely crawling over the shed’s floor, ready to crawl in his ears. He spreads his blanket on the top of the woodpile and climbs up.

Bud attacks the bat with a rake, only to discover that he has disturbed a hornet’s nest. Hornets sting him as he grabs for the doorknob hoping for escape. In his haste, he forgets about the fish heads with their razor-like teeth. He screams as the teeth cut into him, and the hornets continue to sting. He manages to escape through a window above the wood pile and falls to the ground, slapping at the hornets still attacking him. He heads towards the Amoses’ house, set on revenge.

Chapter 4 Summary:

Bud climbs into the Amoses’ house through an unlocked window. He finds his suitcase still under the kitchen table and puts it on the back porch step. Back in the house, he grabs Mr. Amoses’ shotgun and hides it outside, so if the Amoses wake up, they wouldn’t use it on him.  

Bud returns to the kitchen. He fills a glass with warm water and heads up to Todd’s room. Todd is sound asleep. Bud dips Todd’s fingers in the warm water, hoping he’ll wet his bed. When he doesn’t, Bud pours the water on Todd’s pajama pants, causing Todd to soak his sheets. Bud creeps out of the house, grabs his suitcase, and heads toward the road, now “on the lam ... just like Public Enemy Number One.”

Hope this helps! Let me know if you have any questions! :)

Which of the following accurately describes the overall trend in computing during the past 70-plus yearsa.
a. Toward physically larger, more powerful computers.
b. Toward physically larger, less powerful computers.
c. Toward physically smaller, less powerful computers.
d. Toward physically smaller, more powerful computers.
e. Toward physically smaller, single-use computers.

Answers

By simply reducing its size the computer can be speedier as indicated above, the concept of Einstein that messages can not spread faster than light speeds gives one of the limits to how quickly computers can work.

The computers have to become smaller to make them quicker. Therefore, Toward represents the total trend in the last 70+ years physically smaller, more powerful machines perfectly.

The wrong choice can be defined as follows:

For option a, it is wrong because physically larger computers acquire larger space.For option b, it is wrong because physically larger computers are acquiring in a larger space and it is more powerful.For option c, it is wrong because a small computer acquires a small space but it is less powerful as compared to physically larger.For option e, it is wrong because it is also known as a microcomputer that is powerful for both single and multiple users.

Therefore "Option d" is correct.

Learn more:

brainly.com/question/24504878

software.
Q4..
Microsoft word is an example of
(A) System
(1) word processor
(°) Presentation software
(P) Spreadsheet

Answers

Ms Word is an example of a word processor.

One example of a Word Processor is Microsoft Word, but other word processing applications are also widely used.

What do ALT stand for

Answers

Answer:

please mark me brainliest

Explanation:

ALT, which stands for alanine transaminase, is an enzyme found mostly in the liver. When liver cells are damaged, they release ALT into the bloodstream. An ALT test measures the amount of ALT in the blood.

Alt stands for "Alternate Key." I hope that this helped you.

_ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks.

Answers

The right answer will be "The Internet of Things (IoT)".

Connecting computers systems, electromechanical machinery as well as digital ones with distinctive identifications as well as the possibility of transference of information through the internet without interactivity as well as people.Such an IoT system would be a collection of web-enabling connected devices which employ embedded subsystems, particularly CPUs, captors, and networking gear, to gather as well as transmit information from their surroundings and execute upon that.

Learn more about IoT here:

https://brainly.com/question/19995128

Define mini computer

Answers

Answer:

Definition of minicomputer

a small computer that is intermediate between a microcomputer and a mainframe in size, speed, and capacity, that can support time-sharing, and that is often dedicated to a single application.

Answer:

A very small Computer

Explanation:

I computer that is very small like a apple watch.


8. Which of the following is
most likely to contain a
computer virus?


1.CD-ROM
2.RAM
3.Floppy Disk
4.ROM

Answers

Answer:

4. A floppy Disk

Explanation:

This is because it can be transfered from one device to another. So, if one device is infected with a virus, it'll be affected

[tex].[/tex]

differentiate between standard and enhanced keyboard(10 diffrences)​

Answers

Explanation:

by which green plants and some other organisms use sunlight to synthesize nutrients from carbon dioxide and water. Photosynthesis in plants generally involves the green pigment chlorophyll and generates oxygen as a by-product.

A standard keyboard typically features a basic layout and functionality, while an enhanced keyboard includes additional features such as multimedia keys, customizable macros, and backlighting options.

The difference between standard and enhanced keyboards are as follows:

1) Key Layout: One of the primary differences between a standard keyboard and an enhanced keyboard is the key layout. A standard keyboard typically follows the traditional QWERTY layout, while an enhanced keyboard may have additional keys or modified key arrangements.

2) Extra Function Keys: Enhanced keyboards often feature additional function keys beyond the standard set found on a standard keyboard. These extra keys may provide quick access to specific functions like media controls, volume adjustment, launching applications, or controlling lighting effects.

3) Multimedia Controls: Enhanced keyboards often include dedicated multimedia controls for managing audio and video playback. These controls allow users to play, pause, stop, or skip tracks without the need to navigate through software interfaces.

4) Macro Keys: Enhanced keyboards may offer programmable macro keys that allow users to assign custom functions or complex sequences of commands to a single key press. This feature is commonly utilized by gamers or power users who require quick access to specific actions or shortcuts.

5) Backlit Keys: Many enhanced keyboards have backlit keys, allowing for improved visibility in low-light environments. These keyboards may offer adjustable backlighting levels or even customizable RGB lighting options for personalization.

6) Touchpad or Trackpad: Some enhanced keyboards include an integrated touchpad or trackpad, similar to those found on laptops. This feature eliminates the need for a separate mouse and provides cursor control directly on the keyboard.

7) Ergonomic Design: Enhanced keyboards often prioritize ergonomics by incorporating features like palm rests, adjustable tilt angles, or split keyboard layouts. These design elements aim to provide increased comfort and reduce the risk of repetitive strain injuries.

8) Connectivity Options: While standard keyboards usually come with a wired USB connection, enhanced keyboards may offer additional connectivity options such as wireless Bluetooth or specialized connectors like USB-C for faster data transfer.

9) Specialized Keys: Enhanced keyboards may have dedicated keys for specific purposes, such as gaming keyboards with keys optimized for gaming actions like WASD movement or mechanical keyboards with specialized switches for tactile feedback.

10) Software Integration: Enhanced keyboards often come with companion software that allows users to customize key functions, lighting effects, and other settings. This software integration provides additional flexibility and personalization options beyond what standard keyboards offer.

Learn more about Keyboards click;

https://brainly.com/question/30124391

#SPJ2

What is a file and ten examples

Answers

Answer:

A file is a collection of related electronic information.

Examples;

» a report [ a dbm file ]

» a receipt [ a dbm file ]

» bill list [ a .xls file ]

» attendance sheet [ a .xls file ]

» family slideshow [ a .ppt file ]

» physics notes [ a .docx file ]

» chemistry notes [ a .doc file ]

» a query [ a .dbm file ]

» a survey sheet [ a .xls file ]

» organization work plan [ a .ppt file ]

Explanation:

[tex]{ \sf{dbm \:→database }} \\ { \sf{xls \:→ \: spreadsheet }} \\ { \sf{docx \: and \: doc→ \: word \: processor}} \\ { \sf{ppt \: → \: powerpoint}}[/tex]

Answer:

a file is for holding loose paper or important documents that are typically arranged in a particular order for easy reference

Explanation:

example PDF

DOC

AUDIO FILE FORMAT

TIFF

DOCUMENT FILE FORMAT

PSD

ZIP

Topic:

Recursion. Use recursion to display the pattern given above. No loops allowed.

See the picture for the pattern​

Answers

Answer:

const SIZE=8

function print(n, s) {

 if (n > 0) {

   process.stdout.write(s);

   print(n-1, s);

 }

}

function main(n=1) {

 if (n<=SIZE) {

   print(SIZE-n, "  ");

   print(n, "* ");

   process.stdout.write("\n");

   main(n+1);

 }

}

main();

Explanation:

Here is a solution in javascript. Note that it uses recursion multiple times to avoid loops.

When to not touch the mask? ​

Answers

Answer:

If your mask touches another part of your body that is potentially contaminated with the virus—hair, forehead, hands—and the mask is put over your mouth and nose, you are at risk for infection.

Always be sure to wash your hands before putting your mask on, and once it is in place and you are out in public, don’t keep touching or adjusting it. When you’re not wearing it, don’t leave it around your neck in case there was any type of contamination.

Who made computer ? Which year?

Answers

Answer:

The first computer that resembled the modern machines we see today was invented by Charles Babbage between 1833 and 1871.

Answer:

Charles Babbage in 1991

Draw a system flowchart illustrating the steps performed by an operating system as it executes the instruction to back up a disk on a single-user computer system.

Answers

The flowchart's pseudo code is as follows:

The command BACKUP user issues through the user interface.UI executes the awakening File Manager instruction.File Manager resolves the address of a backup file that wakes up Device Manager.Device Manager opens the drive access path to back files in the Memory Manager I/O buffer that reads the file (or part of the data).In the I/O buffer, Memory Manager assigns memory to the processor manager.Processor Manager loads the I/O buffer memory file, and File Manager awakens.File Manager determines the document address be copied into the Processor Managers new disc.The Device Managers, Processor Manager copies memory to the I/O buffer.This device manager enables you to open a drive access path where a new disc awakens file manager will be duplicated by the I/O buffer.File Manager decides whether the file is copied completely If yes if you are jumping to point 11, you decide the next area of the file that will be backed up and Device Manager is returning to point 4.File Manager decides if this is the last backup item, if not, it wakes up Manager of Processor Activates Processor Manager for sending interface File N is backed up for a client can jump back to point 3 if affirmative. The Processor Manager activates the user interface to send the user message 'All files have been backed up'.

Learn more:

brainly.com/question/17373574

brainly.com/question/13152070

Other Questions
Which were descendants of Shem? Jesus Christ Abraham Hebrews the first Egyptians the first Europeansselect all the right answers How do I describe artifact(Please put it in your own words) If I started at 7:20 and ended at 8:07 how much times is that? Write an equation in slope-intercept form of a line that passes through the point (-4,9) and has a slope of 1/2. Combine Like Terms3. What is the simplest expression equivalent to 12xy + 20x - 9 - 11xy - 3x + 15?-Xy+17-6xy+23x+2423xy+17X+6xy+17X+6 At the end of Chapter 9, what word does Bradford use to describe the NativeAmericans?I Calculate the engineering stress in SI units on a bar 25 cm long and having a cross section of 9.00 mm 4.00 mm that is subjected to a load of 3500 kg. The control in an experimentGroup of answer choicesminimizes experimental inaccuracy.reduces the experimental errors.allows for comparisons to the experimental group.is an additional replicate for statistical purposes. Nothing was accomplished by crying. Change it into active voice. PLEASE HELP COMPARING RATIOS What did Frenchmen do for a living in America? SaveSubmitWhen examining the groupings for life on Earth, a student lists six major groups, including archaebacteria, true bacteria, protists,fungi, plants, and animals. The student wants to organize the groups by similar features. The student knows that plants areautotrophic and can photosynthesize to make their own food. Which other groups can be organized into the group that is consideredautotrophs because they have some species that can photosynthesize? Select ALL that apply.AFungiBAnimalsProtistsD)True bacteriaArchaebacteria what will happen to the atoms or sbstance when it is condenses I need help with this. What is the temperature range of holding food that is considered the Danger Zone? What are the domain and range of the function below?PLZ help me i hate algebra 2 and i started school last week (answering gets 10 points, PLS HELP!) In english we have to read these short stories, and mine is the story hamadi. 1. In 35 complete sentences, thoroughly explain how the protagonist's cultural background affects his or her actions and choices in your Module One short story? Provide at least two specific details from the text to show how the protagonist's cultural background affects his or her actions and choices.2. In 35 complete sentences, thoroughly explain how your protagonist changes from the beginning of the story to the end in your Module One short story? Provide at least two specific details from the text to show how the protagonist changes from the beginning of the story to the end. What was the motivation of the players who were indicted for throwing the 1919 World Series game? 3(x-5)+1=2+x Please put the work!!!!!!!!!!!!!! Domestication is the ability for humans to live peacefully with other humans in a settled community act of humans building a permanent settlement using materials available close by preference of ancient humans to live in temporary settings and hunt for their food process of changing the growth of plants or behavior of animals to be useful for humans