Process for sorting the documents

Assignment Help Basic Computer Science
Reference no: EM131554134

The law firm that employs Bob has a (menial) task for him. He is to sort 1,000 documents by their case number. Each document is 8.5 by 11 inches and the case number is an eight digit number in the top right hand corner of each document. Bob is to sort the documents in a small (10 by 12 feet) room which contains a single 60 by 30 inch table.

Bob knows that you have been studying sorting algorithms so asks you to help him figure out how to sort the documents in a reasonable amount of time.

Describe to Bob a process for sorting the documents. The process should be based on one of the four sorting algorithms we have studied in class (selection sort, insertion sort, merge sort and quick sort). Marks are allocated to how quickly Bob can sort the documents using your process. Your description should either be in (clear) English or pseudo-code. Remember that you are describing how to sort documents, not the contents of an array. Also note that Bob has not studied Computing Science and has not studied Maths since grade 11 (and he wasn't very good at it) and your description must be easy for Bob to follow.

Reference no: EM131554134

Questions Cloud

What you do not know about apple : Read the required article: What You Don't Know About Apple. Discuss if Apple's competition has increased their share of the marketplace at Apple's expense.
Discuss p-value method : Hypertension is defined as a blood pressure reading over 140 mm Hg systolic and/or over 90 mm Hg diastolic. Hypertension, if not corrected, can cause long-term.
What is his weighted average cost of capital : If Kent’s opportunity cost is 8 percent, what is his weighted average cost of capital?
Delete rows from the employee deduction table : Create two PL/SQL blocks that will insert or delete rows from the employee deduction table. Include exception processing for bad input
Process for sorting the documents : Describe to Bob a process for sorting the documents. The process should be based on one of the four sorting algorithms we have studied in class (selection sort
What is the bank cost of preferred stock : Sixth Fourth Bank has an issue of preferred stock with a $5.80 stated dividend that just sold for $100 per share. What is the bank’s cost of preferred stock?
What important right did jessica violate : What should Jessica have done or said when Harry asked about Glenn's reason for being in the office? What important right did Jessica violate
Discuss the major steps involved in implementing a program : Discuss the major steps involved in implementing a program or project and identify some of the problems that can arise with each.
Major it project and explain the importance : Identify the main steps or phases involved in a major IT project and explain the importance and value of each step.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Deregulation of electricity generation

a. Describe the economic rationale for the deregulation of electricity generation

  Do you trust this simple probability model

do you trust this simple probability model?

  What is the legal range for these integer numbers

Find the description of the constructor we have used (the one with three integers as parameters). What is the legal range for these integer numbers?

  Design an information security metrics

Design an information security metrics program that would provide ChoicePoint executives with visibility into the effectiveness of the security program in preventing future data breaches. What information security metrics would you recommend and w..

  Comment at the top of the program

Note: For all exercises, write a multi-line comment at the top of the program. Include on the first line your name, student number and date. Include the unit # and ex# on the second line. And on the third line, include a description of the program..

  Demonstrate critical awarenes-research theory and techniques

Demonstrate a critical awareness of previous research in an IT context - understanding of research theory and techniques.

  What is an evil twin access point and a rogue twin access

What is an evil twin access point and a rogue twin access point?

  Write a script that creates and calls a stored procedure

Write a script that creates and calls a stored procedure named insert_category. First, code a statement that creates a procedure that adds a new row to the Categories table. To do that, this procedure should have one parameter for the category name.

  Explaining the most common security threats

Create a 10-slide presentation explaining the most common security threats, modern threats to current Client and Server Operating Systems

  Design an fsm to allow sender to send a packet to receiver

Design an FSM to allow the sender to send a packet to the receiver only when the receiver is ready. If the receiver is ready to receive a packet, it sends an ACK. Lack of getting an ACK for the sender means that the receiver is not ready to receiv..

  The main goal of any business communication

The main goal of any business communication is to determine what message needs to be delivered, and how to deliver it clearly and concisely to the intended audience.

  What is the maximum logical address space for the task

Assume that a task is divided into four equal-sized segments and that the system builds an eight-entry page descriptor table for each segment. Thus, the system has a combination of segmentation and paging. Assume also that the page size is 2 Kbyte..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd