1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
3 years ago
9

Give a big-O estimate for the number of comparisons used by the algorithm that determines the number of 1s in a bit string of le

ngth n by examining each bit of the string to determine whether it is a 1 bit.
Computers and Technology
2 answers:
larisa [96]3 years ago
7 0
The answer is "n". 
Algorithms are considered to be process or a bunch or rules that is to be followed in computing or calculating. This is used to solve operational problems especially by a computer. Algorithms perform data processing, calculation<span>, </span><span>or/and </span>automated reasoning<span> activities. </span><span>

</span>
Illusion [34]3 years ago
3 0
The notation would be O (n-1) because there would be no need to compare with the first bit however this notation is most commonly noted as O (n) but the first is also technically correct
You might be interested in
When you sustain program implementation by staying true to the original design, it is termed A. Goals and objectives B. Program
Naya [18.7K]

Answer:

Program fidelity

Explanation:

7 0
3 years ago
how could environmental and energy problem Kenya faces as far computer installations are concerned be avoided​
ipn [44]

The environmental and energy problem Kenya faces as far computer installations are concerned can be avoided​ by

  • Knowing and finding out the key aspect of ICT strength.
  • Create an holistic judgements in the assessment of ICT capability. Promote the use of solar power.

<h3>How can we overcome ICT challenges?</h3>

There are a lot of Energy Challenges in terms of ICT  in Kenyan and it is good the government and the people work towards energy in terms of sustainable ICT.

Therefore, The environmental and energy problem Kenya faces as far computer installations are concerned can be avoided​ by

  • Knowing and finding out the key aspect of ICT strength.
  • Create an holistic judgements in the assessment of ICT capability. Promote the use of solar power.

Learn more about computer installations from

brainly.com/question/11430725

#SPJ1

7 0
2 years ago
If a document reaches you, and requires you to perform some action, you should do it immediately if ________.
ankoles [38]
<span>You should do it if C. it will take less than two minutes to complete </span>
6 0
3 years ago
Read 2 more answers
How is your day going?Technology affects the learning experience of students by helping them
Alex_Xolod [135]

Answer:

is this technology or

Explanation:

computer

5 0
3 years ago
Read 2 more answers
What do presentation and word processing software have in common?
Elza [17]
D seems like the best answer because both Microsoft Word and Power Point can do that.

6 0
3 years ago
Read 2 more answers
Other questions:
  • When a typist changes from a conventional typewriter to a word processor, his typing schema will have to _____ to incorporate th
    12·1 answer
  • In the space below, write the formula that needs to be added to the blank cells under the fourth column of the table.
    13·1 answer
  • Which resources could be used a lot when installing a desktop app for synchronization purposes? Choose two answers.
    5·1 answer
  • Why is a memory hierarchy of different memory types used instead of only one kind of memory?
    13·1 answer
  • The repeated use of electronic communications, such as chat rooms and email, to seek out, harass, or frighten someone is called
    12·1 answer
  • Create a class named Invoicing that includes three overloaded computeInvoice() methods for a book store: see pages 196 for examp
    7·1 answer
  • Why is failure important when you are designing a solution to a problem?
    6·2 answers
  • Which type of app is the best choice when it is critical to be able to use the device's features but performance is not critical
    5·1 answer
  • What does getfenv() do?
    11·2 answers
  • Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes su
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!