This method uses the < and > operators to compare array subscripts, as when index is compared against the length of the array, a.length. The method also uses these operators to compare array elements against each other, for example, in an expression such as a[scan-1]>unSortedValue. What would happen if we change every < operator to >, and change every > operator to

Consider the following implementation of insertion sort:

```
public static void insertionSort(int [ ] array)
{
int unsortedValue; // The first unsorted value
int scan; // Used to scan the array

// The outer loop steps the index variable through
// each subscript in the array, starting at 1. This
// is because element 0 is considered already sorted.
for (int index = 1; index < array.length; index++)
{
// The first element outside the sorted segment is
// array[index]. Store the value of this element
// in unsortedValue
unsortedValue = array[index];

// Start scan at the subscript of the first element
// outside the sorted segment.
scan = index;

// Move the first element outside the sorted segment
// into its proper position within the sorted segment.
while (scan > 0 && array[scan-1] > unsortedValue)
{
array[scan] = array[scan - 1];
scan --;
}

// Insert the unsorted value in its proper position
// within the sorted segment.
array[scan] = unsortedValue;
}
}

```

A) Instead of sorting in ascending order, the method would sort in descending order
B) The method would throw an array index out of bounds exception
C) The method would return, leaving the array unmodified
D) The method would modify the array, but the array would likely not be sorted correctly

C) The method would return, leaving the array unmodified

Computer Science & Information Technology

You might also like to view...

A mouse and keyboard are the most common input devices used to interact with on-screen elements in GUI programs

Indicate whether the statement is true or false

Computer Science & Information Technology

If a password contains eight upper and lower-case letters and digits, how many possible passwords might an attacker need to try to gain access?

What will be an ideal response?

Computer Science & Information Technology