1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
8

Express the worst case run time of these pseudo-code functions as summations. You do not need to simplify the summations. a) fun

ction(A[1...n] a linked-list of n integers) for int i from 1 to n find and remove the minimum integer in A endfor endfunction
Computers and Technology
1 answer:
ser-zykov [4K]3 years ago
5 0

Answer:

The answer is "O(n2)"

Explanation:

The worst case is the method that requires so many steps if possible with compiled code sized n. It means the case is also the feature, that achieves an average amount of steps in n component entry information.

  • In the given code, The total of n integers lists is O(n), which is used in finding complexity.
  • Therefore, O(n)+O(n-1)+ .... +O(1)=O(n2) will also be a general complexity throughout the search and deletion of n minimum elements from the list.
You might be interested in
Why CD-ROM is more reliable than floppy disk?​
irakobra [83]

Answer:

See explanation below.

Explanation:

The CD-ROM is a hard surface. Data is burned into the CD-ROM using a laser. The information in the CD-ROM is pretty stable and usually safe for a long time.

A Floppy Disk is a less hard surface. It is a thin film of magnetic material. Data is stored on the Floppy Disk using a targeted magnetic field. The information can be damaged by getting the disk close to a magnetic source. Even small grains of dust can cause a Floppy Disk to lose data.

This is why a CD-ROM is more reliable than a Floppy Disk.

Hope this helps! Have an Awesome Day!! :-)

3 0
3 years ago
Please write an Introduction on intrusion detection system and prevention system<br> PLEASE
77julia77 [94]

Answer:

An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious activity from false alarms.

6 0
2 years ago
When you select an object in the Visual Studio Designer, the object's size, color, text, and other characteristics are displayed
harina [27]

Answer:

the main window if that`s not correct sorry

Explanation:

3 0
3 years ago
What is renewable energy
faust18 [17]

Answer:

Energy that can be used over again

Explanation:

Examples include biofuel,hydroelectric power,and wind.

8 0
4 years ago
Read 2 more answers
It's nothing about a problem just about another thing. How do I change my name for this? I'm just not sure so I need some assist
Mrac [35]
You can’t really change your name but you can make a new account
8 0
3 years ago
Read 2 more answers
Other questions:
  • Josh needs to write a research report for his Civics class. Which file type will allow him to save his file?
    12·2 answers
  • In the lecture, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why do you
    10·1 answer
  • I'm looking for the best free chat website to Answer computer and statistic question and answers
    10·2 answers
  • What is considered to be the core of the Unix operating system ?
    14·1 answer
  • Which U.S. government agency first funded the development of the Internet?
    12·2 answers
  • The methodology used by web project teams is usually:
    9·1 answer
  • private members of a class are accessible only from _____________ of the same class or from their friends
    12·1 answer
  • The following method is intended to remove all values from the ArrayList a that have the same value as val; however, this method
    8·1 answer
  • What is the missing line of code?
    13·1 answer
  • What is range work book​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!