Skip to main content

Data Sorting


In everyday life, people use algorithms to accomplish tasks, and this is no different when it comes to computing. Algorithms are just a sequence of steps that are followed to accomplish an assignment (Lysecky et al., 2015).  One of the most important things that are done when it comes to computing is storing data as well as sorting this data and then being able to retrieve that data. There are various ways of sorting through data if that is necessary. There are also various ways to retrieve the data that is stored by using different algorithms. Depending on the amount of data and the type of data that is being sorted there are different methods that are better than others. When sorting the data, one must decide if the data is going to be sorted in ascending order or descending order and there are algorithms that programmers use most often when writing programmers. One of the first sorting algorithms is the linear search algorithm which searches elements in an array one by one in a linear way. Although this is not the best-case scenario for vast amounts of data, it is one of the simplest. Algorithms can get complex but do serve a purpose like a merge sort which takes data and splits it to sort each side and then merges them. Finding the best algorithm depends on why it is being used but the most important factor in the efficiency of the algorithm is depending on the size of the input. There is a heap of information out there for new programmers and there are many ways to achieve the same outcome but a lot depends on what one has available to work with.

 

Lysecky, R., Vahid, F., Lysecky, S., & Givargis, T. (2015). Data structures essentials. Retrieved from https://zybooks.zyante.com/#/zybook/DataStructuresEssentialsR25/chapter/1/section/3

Comments

Popular posts from this blog

  Network Security Connection             Network security is very important in today’s world, and it will continue to be an essential part of the future of the cyber world. With each new technological advancement, there is a threat that arises that is set in motion to try and exploit that new technology. From the dawn of the first home computers, some seek to use those same systems with malicious intent. Cybercrime is the fastest-growing form of criminal activity (Vahid & Lysecky, 2017). The growing rate of cybercrime means there must be people at the forefront trying to protect against it and it starts with protecting networks as well as devices that are in use. Network security is a cornerstone to any computer database and this security needs to stay prepared for any cyber threat that will try to take advantage of its users.            Having a reliable network requir...
Information Highway  Sending and receiving information on the internet does have its snags at times and having ways to help determine what causes them can help make that information travel better. I have used ping and traceroute extensively due to my line of work. I work for an internet service provider and running ping tests can come in handy when a customer is experiencing slow internet speeds. When you run a ping test to a certain destination you are sending packets to that place and awaiting a response. This can help determine if the line of communication to that destination is a clear one and if there isn’t a clear route for that packet it can be lost. If the packet of information doesn’t make it to its destination it could be resent causing a slight delay to that information. Traceroute is used to see the number of places a packet must hit before reaching its destination. Each server it hits is marked down along with the amount of time it took to reach that server. I did a ...
 Network Security      There are several security threats to those that jump on any network even when it isn’t connected to the internet. The number of computing devices out there can all be targeted and if these threats are not checked the damage can be very costly. The threats to one’s network, devices, and even information come in many forms. These threats are serious but there are a few tried and true methods to help avert them. This paper will cover two specific threats in detail as well as outline some protective measures to help.            One of the threats that are very popular in the cyberworld is called phishing. Phishing is a scam that runs on the internet to try to exploit a user’s sensitive information (Vahid & Lysecky, 2017). These types of threats are mainly targeted at a specific user of a device that can connect to a network or internet. Once a breach has happened the user’s information can be...