1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
3 years ago
10

Deterime the minimum number of multiplication operations needed to compute the following. Show the order of the computations.

Computers and Technology
1 answer:
Lady bird [3.3K]3 years ago
7 0

Answer:

The minimum umber of multiplication operations needed to compute is 1242.

Explanation:

Solution

Given that:

Now,

(A1*(A2*A3))*(A4A5)

Thus

A2*A3 = 7*30*2 = 420 operations. It will create 7*2 matrix.

A1*(A2*A3) = 3*7*2 = 42 operations. It will create 3*2 matrix

A4*A5 = 2*10*30 = 600 Operations. It will create 2*30 matrix.

(A1*(A2*A3))*(A4A5) = 3*2*30 = 180 operations. It will create 3*30 matrix

Hence

The total number of multiplications are is given below

420+42+600+180 = 1242

You might be interested in
The program is to be answered in Java Programming not C++ Please answer the following: Modify the BarChart program to accept the
Solnce55 [7]

Answer:

import java.util.Scanner;

public class BarChart {

public static void main(String[] args) {

Scanner sc=new Scanner(System.in);

//take input from user

System.out.println("Enter Score");

int score=sc.nextInt();

int count=score/10;

int i=1;

//print horizontal bar

//if you want to print vertical bar then simply change into print which is replace by println

while(i<=count)

{

System.out.print("*");

i++;

}

}

}

Explanation:

6 0
3 years ago
Find examples of conic sections in art and architecture. Visit Web sites to find pictures of artwork or buildings that illustrat
liubo4ka [24]

The question above wants to assess your interpretation of conic shapes and sections in art and architecture. For that reason, I can't write an answer for you, but I'll show you how to write it.

The conical sections can be seen in structures that assume one of the shapes considered conical. These formats are easy to identify, especially in architecture, where they are very popular. These shapes can be classified as Parabola, Circle, Ellipse, and Hyperbole

In this case, to write your answer, you should search for architectural works or works of art that present one of these types of conic sections and show how the use of this format is important for these works.

Some examples of works that use conic sections are:

  • Parabola: Eiffel Tower.
  • Circle: Farmer's Cottage Deluxe Summer House
  • Ellipse: Tycho Brahe Planetarium.
  • Hyperbole: McDonnell Planetarium

More information:

brainly.com/question/2285436

8 0
2 years ago
Yo, how can I bypass the securely filter on a chromebook?
OLga [1]
Open your Chromebook and press the power button for 30 seconds. This should bypass the admin block.

Proxy Websites. Probably one of the oldest methods of bypassing web filters, proxy websites enable users to anonymously connect to websites through outside servers. ...
VPNs. VPNS or Virtual Private Networks, work as a tunnel between two devices. ...
Browser Extensions. ...
Stolen Passwords. ...
Firefox from USB. ...
5 0
2 years ago
What will happen when a user attempts to login to salesforce from an ip address that is outside the login ip range on the user's
podryga [215]

Answer:

The answer to this question is option "d".

Explanation:

The answer is user will not be able to login at all. The user wants to log in to the salesforce by its IP address. But in the server, all the IP addresses will be registered for their special work. When the user inserting their IP address to log in to the salesforce. The first server will be checking into there database. If IP address doesn't match it will not permit to access salesforce because in their server it is not a valid IP address. It is registered in sever but not for this user.

So the answer to this question is option "d".

7 0
3 years ago
Helen has no experience in security. She would like to earn a certification that demonstrates that she has the basic knowledge n
rewona [7]

Answer:

Option C. Security+ is the correct answer.

Explanation:

8 0
2 years ago
Other questions:
  • Using either a UNIX or a Linux system, write a C program that forks a child process that ultimately becomes a zombie process. Th
    8·1 answer
  • What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
    5·1 answer
  • The first known permanent photograph was called "View from the Window at Le Gras." True False
    9·1 answer
  • Windows displays a(n)
    11·1 answer
  • A prefab allows you to reuse game objects over and over, while their component data remains intact. (1 point)
    14·1 answer
  • To convert microseconds to nanoseconds: a. Take the reciprocal of the number of microseconds. b. Multiply the number of microsec
    13·1 answer
  • There are several design goals in building an operating system; for example, resource utilization, timeliness, robustness and so
    11·1 answer
  • Phishing is ____________. When hackers overwhelm a website with too many requests. A network of private computers infected with
    7·1 answer
  • 6.16 LAB: Find largest number (EO) Write a method, findMax(), that repeatedly reads in integers until a negative integer is read
    9·1 answer
  • Cable inside the computer transferring data between the mother board and storage devices.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!