1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
1 year ago
11

Consider the following algorithms. Each algorithm operates on a list containing n elements, where n is a very large integer. An

algorithm that accesses each element in the list twice an algorithm that accesses each element in the list n times an algorithm that accesses only the first 10 elements in the list, regardless of the size of the list which of the algorithms run in reasonable time?.
Computers and Technology
1 answer:
anastassius [24]1 year ago
3 0

We have that the appropriate statement will be

An algorithm that accesses only the first 10 elements in the list, regardless of the size of the list. Which of the algorithms run in reasonable time

Generally The algorithm must traverse the listing twice in order to gain access to everything in the list twice. This results in the operations entry 2*n.

Additionally, if a given component is used n times, the list will need to be traversed n times, resulting in n2 access operations.

Each 2*n and n2 is significantly larger if n is a really large integer. Thus, this algorithm will only require ten entry-level operations and run quickly.

An algorithm is a process used to carry out a computation or solve a problem. In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially.

Learn more about algorithm:

brainly.com/question/24953880

#SPJ4

You might be interested in
How can netiquette help you communicate when texting or instant messaging?
Yanka [14]

1. D

2. C

it allows citizens to submit anonymous tips to the police

5 0
3 years ago
Which pane is used to modify the actual content of the SmartArt graphics as opposed to the layout and design?
Zigmanuir [339]
Text i belive thats the answer
7 0
3 years ago
What is the output of the second println statement in the main method, public class foo { int i ; static int s ; public sttic vo
Sedaia [141]

Answer:

b) f2.i is 1 f2.s is 2

Explanation:

i is an instance variable and s is static, shared by all objects of the Foo class.

6 0
4 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
3 years ago
Other questions:
  • How can the connection to salesforce be restricted only to the employee portal server? Universal containers (UC) uses a legacy E
    13·1 answer
  • If you need to reprogramming your gps after you begin driving __.
    15·2 answers
  • Given a normally distributed data set of 500 observations measuring tree heights in a forest,
    6·1 answer
  • One cost of starting your own business is _____.
    12·1 answer
  • A(n) ____ is an entry in a cell that contains text such as "2016 Sales" or "Travel Expenses."
    10·1 answer
  • Software people commonly use in the workplace to make their life easier is called?
    11·2 answers
  • Where do you get your news? Is it owned by a large conglomerate does it matter to you who own your local news outlets? why or wh
    5·1 answer
  • The component of an information system consisting of raw facts is the definition for which of the following?
    14·2 answers
  • Write a JavaScript program to create a multiplication table for numbers 1 to 12 using a while loop. I’ll mark brainliest, thanks
    9·1 answer
  • Scripting languages are unique computer languages with a specialized function. explain what scripting languages do, and how this
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!