1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
13

Determine the efficiency and big-O notation for the following algorithm:

Computers and Technology
1 answer:
Anon25 [30]3 years ago
8 0

Answer and Explanation:

To calculate Big O, go through each line of code and determine O(!), O(n) and return your calculation.

For example,

In O (5 +6n), where 6 5 represent five instances of O(1), and 6 represent the 6 O(n).

We compute the time complexity of the algorithm. We get the result, just an estimation. In given algorithms, run time in milliseconds has been provided, such as in T (1) algorithm process in 512 milliseconds and T(2) algorithms process 8129 milliseconds. But big O notation not measured in milliseconds. Information given is not enough to calculate the big O notation.

       

You might be interested in
So, I have strict parents & need help, if u don’t know how to fix this after u read it, leave. I don’t want u getting points
nikklg [1K]

Well if you forgot your password you can click "Forgot Password" at the bottom and it should ask you some questions and send you an email with the password

8 0
4 years ago
Read 2 more answers
Access Office Equipment has shifted to sales and service of laptops and PCs, where it has the potential to triple the number of
AleksAgata [21]

Answer:

Access Office Equipment is implementing a growth strategy.

Explanation:

Growth strategy can be defined as the strategy whose goal is to win market shares in a greater quantity. The earnings in growth strategy might be short-termed. The common growth strategies include:

  • product expansion
  • market expansion
  • market penetration
  • acquisition and diversification

I hope it will help you!

4 0
4 years ago
What is the term for the error caused when one end of an unshielded twisted-pair (UTP) cable is terminated in the T568A configur
FinnZ [79.3K]

Answer:

A transposition is the correct answer.

Explanation:

A transposition is the type of encryption that caused when one side of the unshielded twisted pair cable is finished in the configuration of  T568A and at the other side of the configuration of T568B, it is also termed as error or cipher. So, that's why the following answer is true.

7 0
3 years ago
A range in which a measuring instrument or controller does not respond is the
cricket20 [7]

Answer:

Dead band

Explanation:

In Instrumentation, dead band is defined as a range in which a measuring instrument or controller does not respond. It is also known as the neutral zone or dead zone and it is usually caused by packing friction or unbalanced forces.

4 0
3 years ago
How does Frankenstein feel about his creation?
velikii [3]

Answer:

he just regrets that he made a monster and deeply feels guilty that it is in pain of reliving

Explanation:

8 0
4 years ago
Other questions:
  • What are the benefits of organizing your thoughts before you begin your speech
    14·1 answer
  • Can you know what time someone retweeted
    5·1 answer
  • True or false?
    13·1 answer
  • What should you remember when using the thesaurus to replace words?
    8·2 answers
  • A writing team wants to present the six-month sales figures for its company's 14 sales representatives in a report. Because mana
    11·1 answer
  • Please help!!
    8·1 answer
  • Which information purpose uses video from a security camera?
    15·1 answer
  • What is Naptha used for?
    9·2 answers
  • True or False
    11·1 answer
  • Explain the difference between social engineering and reverse social engineering.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!