How many algorithms are there for sorting purpose and what are they?

1 Answer

Answer :

There are many sorting algorithms however there are only a smallhandful that we actually use: insertion sort (stable) is typicallyused for small sets while large data sets primarily use heapsort(unstable), merge sort (stable) or quicksort (unstable). Efficientimplementations typically use a hybrid sort such as Timsort(stable) or introsort (unstable).The following lists all the documented algorithms currentlylisted in Wikipedia's "Sorting algorithm" page:Quicksort, merge sort, in-place merge sort, heapsort, insertionsort, introsort, selection sort, Timsort, cubesort, shell sort,bubble sort, binary tree sort, cycle sort, library sort, patiencesorting, smoothsort, strand sort, tournament sort, ******** sort,comb sort, gnome sort, unshuffle sort, Franceschini's sort, blocksort, odd-even sort, pigeonhole sort, bucket sort (uniform keys),bucket sort (integer keys), counting sort, LSD radix sort, MSDradix sort, MSD radix sort in-place, spreadsort, burstsort,flashsort, postman sort bead sort, simple pancake sort, spaghettisort, sorting network, bitonic sorter, bogo sort, stooge sort,Han's algorithm, Thorup's algorithm.

Related questions

Description : Mark correct option a) For the purpose of bag account PO is a Unit Bag Office b) Memo of authorized Bag balance is issued by Sr/Supdt of PO/RMS offices c) Diagram of a sorting case is prepared by SRM d) All the above are correct

Last Answer : d) All the above are correct

Description : Mark the correct option relating ot press sorting office a) Press concerned should provide necessary suitable accommodation for the post office free of rent and give an undertaking in writing that effect. b) Press ... additional staff , if any that may be employed for the purpose. d) All the above

Last Answer : d) All the above

Description : Why is it easy to compose programs from algorithms ?

Last Answer : Answer : Algorithm gives a written plan of work in any corner. And if the work goes according to the plan, the work is completed smoothly. The work of the corner is divided into ... sequential method of solving problems in computers is called algorithm. So composing programs from algorithms is easy.

Description : Did Early Indians invented mathematical algorithms that computer programmers use today to tell computers what to do?

Last Answer : No, they did not.

Description : What is the academic discipline that relies most heavily on algorithms for problem solving?

Last Answer : What is the answer ?

Description : Which of the following is incorrect? Algorithms can be represented: a) as pseudo codes b) as syntax c) as programs d) as flowcharts

Last Answer : Answer: b Explanation: Representation of algorithms: -As programs -As flowcharts -As pseudo codes

Description : Modern NLP algorithms are based on machine learning, especially statistical machine learning. a) True b) False

Last Answer : a) True

Description : ____________ are algorithms that learn from their more complex environments (hence eco) to generalize, approximate and simplify solution logic. a) Fuzzy Relational DB b) Ecorithms c) Fuzzy Set d) None of the mentioned

Last Answer : c) Fuzzy Set

Description : Standard planning algorithms assumes environment to be ___________ a) Deterministic b) Fully observable c) Single agent d) Stochastic

Last Answer : a) Deterministic

Description : _____________ algorithms is used to extract the plan directly from the planning graph, rather than using graph to provide heuristic. a) BFS/DFS b) A* c) Graph-Plan d) Greedy

Last Answer : c) Graph-Plan

Description : Which can be adapted for planning algorithms? a) Most-constrained variable b) Most-constrained literal

Last Answer : a) Most-constrained variable

Description : General algorithm applied on game tree for making decision of win/lose is ____________ a) DFS/BFS Search Algorithms b) Heuristic Search Algorithms c) Greedy Search Algorithms d) MIN/MAX Algorithms

Last Answer : d) MIN/MAX Algorithms

Description : Constraint satisfaction problems on finite domains are typically solved using a form of ___________ a) Search Algorithms b) Heuristic Search Algorithms c) Greedy Search Algorithms d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Though local search algorithms are not systematic, key advantages would include __________ a) Less memory b) More time c) Finds a solution in large infinite space d) Less memory & Finds a solution in large infinite space

Last Answer : d) Less memory & Finds a solution in large infinite space

Description : Which of the following is not true? A : For robotics, you should have a knowledge of different sensors B : For robotics, you must be able to write different planning algorithms C : For robotics, you may have to use actuators D : For robotics, you do not require help of computer engineers, mechanical

Last Answer : D : For robotics, you do not require help of computer engineers, mechanical

Description : Which of the following is not true? A : For robotics, you should have a knowledge of different sensors B : For robotics, you must be able to write different planning algorithms C : For robotics, you may have to use actuators D : For robotics, you do not require help of computer engineers, mechanical

Last Answer : D : For robotics, you do not require help of computer engineers, mechanical

Description : __________ do not take their decisions on measurements or estimates of the current traffic and topology. a. Static algorithms b. Adaptive algorithms c. Non - adaptive algorithms d. Recursive algorithms

Last Answer : c. Non - adaptive algorithms

Description : Which of the following routing algorithms can be used for network layer design? a. shortest path algorithm b. distance vector routing c. link state routing d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : A computer program consists of: a) System Flowchart b) Program Flowchart c) Algorithm's written in any computer language d) None of The Above

Last Answer : c) Algorithm's written in any computer language

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Distinguish between A* and AO* algorithms?

Last Answer : Ans:- A* algorithm:-  A* uses a best-first search and finds the least-cost path from a given initial node to one goal node (out of one or more possible goals).  It uses a distance-plus- ... node as SOLVED.  If starting node is SOLVED or value greater than FUTILITY, stop, else repeat from 2.

Description : State the differences between DIT and DIF algorithms.

Last Answer : i. In DIT the input is in bit reversed order while the output is in normal order. In DIF the input is in normal order while the output is in bit reversed order. ii. Considering ... before the add subtract operation. While in DIF the complex multiplication takes place after the add subtract operation

Description : what is meant by in place computations in DIT and DIF algorithms?

Last Answer : An algorithm in which same memory devices are used to store input and output data’s is known as in place computations in DIT and DIF algorithms.

Description : Which of the following(s) is/are found in Genetic Algorithms? (i) evolution (ii) selection (iii) reproduction (iv) mutation (a) i & ii only (b) i, ii & iii only (c) ii, iii & iv only

Last Answer : (a) i & ii only

Description : Core of soft Computing is A. Fuzzy Computing, Neural Computing, Genetic Algorithms B. Fuzzy Networks and Artificial Intelligence C. Artificial Intelligence and Neural Science D. Neural Science and Genetic Science

Last Answer : D. Neural Science and Genetic Science

Description : n(log n) is referred to A. A measure of the desired maximal complexity of data mining algorithms B. A database containing volatile data used for the daily operation of an organization C. Relational database management system D. None of these

Last Answer : A. A measure of the desired maximal complexity of data mining algorithms

Description : Evolutionary computation is A . Combining different types of method or information B. Approach to the design of learning algorithms that is structured along the lines of the theory of evolution. C. ... the knowledge of an expert formulated in terms of if-then rules. D . None of these

Last Answer : B. Approach to the design of learning algorithms that is structured along the lines of the theory of evolution.

Description : Expert systems A . Combining different types of method or information B. Approach to the design of learning algorithms that is structured along the lines of the theory of evolution C. an information base ... the knowledge of an expert formulated in terms of if-then rules D . None of these

Last Answer : C. an information base filled with the knowledge of an expert formulated in terms of if-then rules

Description : ______ are algorithms that learn from their more complex environments (hence eco) to generalize, approximate and simplify solution logic. a) Fuzzy Relational DB b) Ecorithms c) Fuzzy Set d) None of the mentioned

Last Answer : c) Fuzzy Set

Description : The methods or algorithms which are used to increase the performance of disk storage sub-system is called ............. A) Disk performing B) Disk scheduling C) Disk storing D) Disk extending

Last Answer : B) Disk scheduling

Description : ………… is not the component of data structure. A) Operations B) Storage Structures C) Algorithms D) None of above

Last Answer : D) None of above

Description : Which of the following algorithms has lowest worst case time complexity? a) Insertion sort b) Selection sort c) Quick sort d) Heap sort

Last Answer : d) Heap sort

Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates

Last Answer : a. hashing algorithms

Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates

Last Answer : (a) Hashing algorithms

Description : What are the algorithms to have efficient parsing?

Last Answer : i. Left to right parsing algorithm  ii. Chart Parsing algorithm.  iii. Left corner parsing

Description : What is Genetic Algorithms?

Last Answer : Genetic Algorithm is a variant of stochastic beam search in which successor states are generated by combining two parent states, rather than by modifying a single state.

Description : What are the 2 types of memory bounded heuristic algorithms?

Last Answer : i. Recursive Best First Search(RBFS)  ii. Memory bounded A*(MA*)

Description : Deep learning is a subfield of machine learning where concerned algorithms are inspired by the structured and function of the brain called _____. A. Machine learning B. Artificial neural networks C. Deep learning D. Robotics

Last Answer : B. Artificial neural networks 

Description : List various polygon filling algorithms

Last Answer : Various polygon filling algorithms are: Flood Fill Algorithm Boundary Fill Algorithm Scan Line Algorithm

Description : List any two line drawing algorithms. Also, list two merits of any line drawing algorithm.

Last Answer : Line drawing algorithms: Digital Differential Analyzer (DDA) algorithm Bresenham's algorithm Merits of DDA algorithms: It is the simplest algorithm and it does not require special skills ... , and multiplication by 2, which can be accomplished by a simple arithmetic shift operation.

Description : List / name two line drawing algorithms.

Last Answer : Digital Differential Analyzer (DDA) Algorithm  Digital Differential Analyzer algorithm generates a line from differential equations of line and hence the name DDA. Bresenham’s Algorithm  The Bresenham algorithm is another line drawing algorithm which uses integer calculations for drawing line.

Description : A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process its pages in following order: ABACABDBACD Assuming that a page interrupt occurs when a new page is brought in the main ... replacement algorithms are (A) 9 and 7 (B) 7 and 6 (C) 9 and 8 (D) 8 and 6

Last Answer : (C) 9 and 8

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Consider a disk queue with request for input/output to block on cylinders  98, 183, 37, 122, 14, 124, 65, 67  in that order. Assume that disk head is initially positioned at cylinder 53 and moving ... and 252 cylinders (B) 640 and 236 cylinders (C) 235 and 640 cylinders (D) 235 and 252 cylinders

Last Answer : Answer: 236 and 208 cylinders Explanation: SSTF Initial head position =53 The closest queue to initial head position=65 head moves from 53 to 65=12 head moves from 65 to 67=2 head moves from 67 ... 122=24 head moves from 122 to 124=2 head moves from 124 to 183=59 Total head movement=208 

Description : Which of the following statements is not true about disk-arm scheduling algorithms ? (A) SSTF (shortest seek time first) algorithm increases performance of FCFS. (B) The number of requests for disk ... arm movements. (D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.

Last Answer : (B) The number of requests for disk service are not influenced by file allocation method.

Description : Consider a program that consists of 8 pages (from 0 to 7) and we have 4 page frames in the physical memory for the pages. The page reference string is :  1 2 3 2 5 6 3 4 6 3 7 3 1 5 3 6 3 4 2 4 3 4 5 ... to fill available page frames with pages): (A) 9 and 6 (B) 10 and 7 (C) 9 and 7 (D) 10 and 6

Last Answer : (B) 10 and 7

Description : Consider f(N) = g(N) + h(N) Where function g is a measure of the cost of getting from the start node to the current node N and h is an estimate of additional cost of getting from the current ... ? (A) A* algorithm (B) AO* algorithm (C) Greedy best first search algorithm (D) Iterative A* algorithm

Last Answer : (C) Greedy best first search algorithm

Description : Code blocks allow many algorithms to be implemented with the following parameters : (A) clarity, elegance, performance (B) clarity, elegance, efficiency (C) elegance, performance, execution (D) execution, clarity, performance

Last Answer : (B) clarity, elegance, efficiency

Description : Which of the following algorithms is not a broadcast routing algorithm ? (A) Flooding (B) Multidestination routing (C) Reverse path forwarding (D) All of the above

Last Answer : (D) All of the above