Sort is a necessary concept that we need to learn in any programming language. Most sorting is done on arrays involving numbers and is a stepping stone to master the techniques of traversing and accessing data in arrays.
The sorting technique type we are going to discuss in today’s article is bubble sorting.
Bubble sort
Bubble sorting is a simple sorting algorithm that works by repeatedly exchanging adjacent elements if the order of adjacent elements is incorrect. This array sorting method is not suitable for large datasets because the time complexity is very high in average and worst-case scenarios.
Bubble sorting algorithm:
- Bubble sorting organizes arrays by sorting multiple times.
- First pass: The largest element moves to the last position, its correct position.
- Second pass: The second largest element moves to the penultimate position and continues to follow-up passes.
- Each time you pass, only the unsorted parts of the array are processed.
- After k passes, the largest k elements are in the correct position in the last k slots.
- During each pass:
- Compare adjacent elements in unsorted sections.
- If a larger element appears before a smaller element, the element is swapped.
- At the end of the traversal, the largest unsorted element moves to the correct position. Repeat this process until the entire array is sorted.
How does bubble sort work?
Below is the implementation of bubble sorting. If the inner loop does not cause any exchange, it can be optimized by stopping the algorithm.
// Easy implementation of Bubble sort #include <stdio.h> int main(){ int i, j, size, temp, count=0, a[100]; //Asking the user for size of array printf("Enter the size of array you want to enter = \t"); scanf("%d", &size); // taking the input array through loop for (i=0;i<size printf the element scanf unsorted list you entered is : for i size count="1;" j if> a[j 1]) { //swapping elements temp=a[j]; a[j]=a[j 1]; a[j 1]=temp; count = 1; } } // If no two elements were swapped by inner loop, // then break if (count == 1) break; } // printing the sorted list printf("\nThe sorted list is : \n"); for (i=0;i<size printf return><h2>Output:</h2> <p> ** <img src="/static/imghw/default1.png" data-src="https://img.php.cn/upload/article/001/246/273/173284165217950.jpg" class="lazy" alt="Bubble sorting in C"></p> <h2> Complexity analysis of bubble sorting:</h2> <p> Time complexity: o(n2)<br> Auxiliary space: o(1)</p> <h2> Advantages of Bubble Sort:</h2> <ul> <li> Bubble sorting is easy to understand and implement.</li> <li> No additional memory space is required.</li> <li> It is a stable sorting algorithm, which means that elements with the same key value maintain their relative order in the sorting output.</li> </ul> <h2> Disadvantages of Bubble Sort:</h2> <ul> <li> The time complexity of bubble sort is o(n2), which makes it very slow for large datasets.</li> <li> Bubble sorting is a comparison-based sorting algorithm, meaning it requires a comparison operator to determine the relative order of elements in the input dataset. In some cases it limits the efficiency of the algorithm.</li> </ul> <p> If you have any questions, please comment! !<br> All discussions will be appreciated :)</p></size></size></stdio.h>
The above is the detailed content of Bubble sorting in C. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Ethereum is a decentralized application platform based on smart contracts, and its native token ETH can be obtained in a variety of ways. 1. Register an account through centralized platforms such as Binance and Ouyiok, complete KYC certification and purchase ETH with stablecoins; 2. Connect to digital storage through decentralized platforms, and directly exchange ETH with stablecoins or other tokens; 3. Participate in network pledge, and you can choose independent pledge (requires 32 ETH), liquid pledge services or one-click pledge on the centralized platform to obtain rewards; 4. Earn ETH by providing services to Web3 projects, completing tasks or obtaining airdrops. It is recommended that beginners start from mainstream centralized platforms, gradually transition to decentralized methods, and always attach importance to asset security and independent research, to

The most suitable tools for querying stablecoin markets in 2025 are: 1. Binance, with authoritative data and rich trading pairs, and integrated TradingView charts suitable for technical analysis; 2. Ouyi, with clear interface and strong functional integration, and supports one-stop operation of Web3 accounts and DeFi; 3. CoinMarketCap, with many currencies, and the stablecoin sector can view market value rankings and deans; 4. CoinGecko, with comprehensive data dimensions, provides trust scores and community activity indicators, and has a neutral position; 5. Huobi (HTX), with stable market conditions and friendly operations, suitable for mainstream asset inquiries; 6. Gate.io, with the fastest collection of new coins and niche currencies, and is the first choice for projects to explore potential; 7. Tra

The real use of battle royale in the dual currency system has not yet happened. Conclusion In August 2023, the MakerDAO ecological lending protocol Spark gave an annualized return of $DAI8%. Then Sun Chi entered in batches, investing a total of 230,000 $stETH, accounting for more than 15% of Spark's deposits, forcing MakerDAO to make an emergency proposal to lower the interest rate to 5%. MakerDAO's original intention was to "subsidize" the usage rate of $DAI, almost becoming Justin Sun's Solo Yield. July 2025, Ethe

What is Treehouse(TREE)? How does Treehouse (TREE) work? Treehouse Products tETHDOR - Decentralized Quotation Rate GoNuts Points System Treehouse Highlights TREE Tokens and Token Economics Overview of the Third Quarter of 2025 Roadmap Development Team, Investors and Partners Treehouse Founding Team Investment Fund Partner Summary As DeFi continues to expand, the demand for fixed income products is growing, and its role is similar to the role of bonds in traditional financial markets. However, building on blockchain

Table of Contents Crypto Market Panoramic Nugget Popular Token VINEVine (114.79%, Circular Market Value of US$144 million) ZORAZora (16.46%, Circular Market Value of US$290 million) NAVXNAVIProtocol (10.36%, Circular Market Value of US$35.7624 million) Alpha interprets the NFT sales on Ethereum chain in the past seven days, and CryptoPunks ranked first in the decentralized prover network Succinct launched the Succinct Foundation, which may be the token TGE

A verbal battle about the value of "creator tokens" swept across the crypto social circle. Base and Solana's two major public chain helmsmans had a rare head-on confrontation, and a fierce debate around ZORA and Pump.fun instantly ignited the discussion craze on CryptoTwitter. Where did this gunpowder-filled confrontation come from? Let's find out. Controversy broke out: The fuse of Sterling Crispin's attack on Zora was DelComplex researcher Sterling Crispin publicly bombarded Zora on social platforms. Zora is a social protocol on the Base chain, focusing on tokenizing user homepage and content

Directory What is Zircuit How to operate Zircuit Main features of Zircuit Hybrid architecture AI security EVM compatibility security Native bridge Zircuit points Zircuit staking What is Zircuit Token (ZRC) Zircuit (ZRC) Coin Price Prediction How to buy ZRC Coin? Conclusion In recent years, the niche market of the Layer2 blockchain platform that provides services to the Ethereum (ETH) Layer1 network has flourished, mainly due to network congestion, high handling fees and poor scalability. Many of these platforms use up-volume technology, multiple transaction batches processed off-chain

The failure to register a Binance account is mainly caused by regional IP blockade, network abnormalities, KYC authentication failure, account duplication, device compatibility issues and system maintenance. 1. Use unrestricted regional nodes to ensure network stability; 2. Submit clear and complete certificate information and match nationality; 3. Register with unbound email address; 4. Clean the browser cache or replace the device; 5. Avoid maintenance periods and pay attention to the official announcement; 6. After registration, you can immediately enable 2FA, address whitelist and anti-phishing code, which can complete registration within 10 minutes and improve security by more than 90%, and finally build a compliance and security closed loop.
