1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lbvjy [14]
3 years ago
13

Does time complexity depend on, which base arithmetic you use? like base 10, 2 or whatever else? Does time coplexity depned on t

hose?
Computers and Technology
1 answer:
bazaltina [42]3 years ago
6 0

Answer:

No. Time complexity does not depend on which base arithmetic is used.

Explanation:

No. Time complexity does not depend on which base arithmetic is used.This is because log n to the base 10 and log n to the base 2 differ by the multiplicative factor log 10 to the base 2 which is a constant value independent of n. Similar is the case while transforming from one base to any other base. Moreover multiplication by a constant value does not change the overall time complexity. So time complexity is independent of base arithmetic.

You might be interested in
The what toolbar can be customized to the preferences of the user
schepotkina [342]
Is this a multiple choice question?
7 0
3 years ago
Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?
lilavasa [31]

Answer: C) DNS poisoning

Explanation: DNS poisoning or DNS cache poisoning is the type of attacking tendency towards the URL of the computer. These attempt to attack the URL using the spam mails and the user usually end up clicking on the URL provided by the attacker which invokes attack in the computer.

This mechanism takes place in the emails as well as the selected websites which can be accessed by the users easily.These attacks once enter the system seems like the real thing and become prone to many risks .

6 0
3 years ago
Once you turn 18, if you choose one of the 4 options for accessing credit, how will you be sure you use that credit responsibly?
dmitriy555 [2]

Answer:

hm not sure man

Explanation:

sorry, give me crown and 5 stars  tho

6 0
2 years ago
What are some of the challenges that could arise from setting up a file management system on a computer?
Arisa [49]
It could fail, it would take a long time setting it up and aslo it could be easily hacked.
3 0
3 years ago
If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system a
Alisiya [41]

Explanation:

Recovery phase is the last phase in any disaster recovery process.

According to the given situation it is better to call System administrator so that the system is recovered properly which even avoids damage of important data stored in the system.

Always it is important to keep credentials for important data or system to avoid unauthorized access. So in the recovery phase, the System administrator would login with the credentials and check for possibility of recovering maximum data out of the system.

4 0
3 years ago
Other questions:
  • Building relationships during your career exploration is called
    9·2 answers
  • Henry has to create software that manages a database of all his clients of his firm. He wishes to run software on another comput
    10·2 answers
  • What role do you think mobile devices have played in shaping the world?
    13·1 answer
  • What ip class is this address: 128-191.255.255.255?
    5·1 answer
  • Write a program named as calcPrice.c that formats product information entered by the user and calculate the total amount of purc
    5·1 answer
  • You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy o
    15·1 answer
  • Write a function nexthour that receives one integer argument, which is an hour of the day, and returns the next hour. This assum
    6·1 answer
  • A tornado destroyed many
    6·2 answers
  • 9. What command do you enter in the Explorer search box to access the Remote Admin share on the computer named Fin?
    7·1 answer
  • FS EVERFI:
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!