1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetllana [295]
3 years ago
10

Suppose we are comparing implementations of insertion sort and merge sort on the same machine. for inputs of size n, insertion s

ort runs in 8ð2 steps, while merge sort runs in 64ð log2 ð steps. for which values of ndoes insertion sort beat merge sort?
Computers and Technology
1 answer:
Ber [7]3 years ago
8 0
Well i think u should give up on school and just  smoke some green fam.
You might be interested in
In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
algol13

Answer:

One of the biggest social media giants has faced many such security and privacy risks in the past 3 years. 10 are listed below:

1. No one can forget the New Zealand attack on the mosque, and it was telecast live via it. And that is certainly a security risk. And if someone is able to stream live, the AI is in question definitely as this cannot be telecast.

2. Can you forget the various US shooting cases in the past 5 years? And many out of them where telecast lives on it. Again the AI, and the authentication is in question.

3. Many evils have many times advertised itself through it, and that is a security risk. This put up the question on the Data Scientists of the company.

4. It's a huge data on it, and many users have been able to misuse it, and that is a security risk. This put up the question mark on the application of the Big Data.

5. Once, the UK parliament questioned it to sell the secret data, and that was a privacy risk.

6. An Engineer was caught negotiating to sell secret users data to a third party, and that is a privacy risk as well as a question on management technology, as its possible now to check these kind of frauds.

7. Its accounts have been hacked many times, as well as millions of user-profiles, were stolen. This is a security and privacy risk.

8. Its data is still not safe as evils have proved they can break the authentication. However, it has reacted well, and they look like being a safe destination now.

9. Once, someone from Russia was caught collecting a lot of data from it. That was a security and privacy risk. And surely if someone is uploading a lot of complicated and confidential data, must be checked through proper AI implementation.

10. In India too there have been claims that a lot of personal information during elections 2014 was sold. That was a security and data risk. And the data scientists were proved vulnerable again. Its quite sure hence, a lot of work has to be done in Data Science and Artificial intelligence still.

However, its owner is one of the finest souls on earth. He donated all his money when he was blessed with a child. Some out of his team cheated, and else some technology failure or the huge amount of data was the reason for the fault. However, other companies are also facing such problems. And hence, he cannot be blamed for this. And the company now definitely has recovered from the nightmare that they faced in the past 3 years.

Explanation:

The answer is self explanatory.

8 0
3 years ago
What types of storage can be used to access your data on another computer?
allochka39001 [22]
A USB drive is portable and can be used.
4 0
4 years ago
Read 2 more answers
A program called a ( n ) ____ translates instructions written in high-level languages into machine code.
Mazyrski [523]
A program called an compiler
5 0
4 years ago
PLEASE HELP WHATS THE ANSWER
Mkey [24]

Answer:

C

Explanation:

A ends the whole html stuff

B starts a link

D is just the file extension for html files

4 0
3 years ago
Read 2 more answers
Why is it important to organize your computer files?<br><br> “With a explanation”
Gwar [14]

Answer: So then every thing is not cluster together and you have everything where you can get to it faster and it just makes everything  100 times better then it not being organized :) hope this helped and if it didn't I'm so sorry

Explanation:

7 0
3 years ago
Other questions:
  • What is alphabet symmetry
    12·2 answers
  • In a formatted text file, ________ signal(s) the beginning and end of a formatting command.
    12·1 answer
  • When a communication exchange that does not verify the identity of the endpoints of a communication and accepts any properly for
    10·1 answer
  • As a computer science student, which career you will select and what do you predict about the future of that specific IT-Career.
    8·1 answer
  • Information technology has powerful effects on social behavior. Which of the following issues should NOT be expected when intera
    11·1 answer
  • Write code using the range function to add up the series 20, 30, 40, ... 90 and print the resulting sum each step along the way.
    9·1 answer
  • Which line of code will cause the loop to execute exactly one time?
    13·1 answer
  • Gn guys have an Amazing day!
    12·2 answers
  • A good look of a web page depends upon?​
    8·1 answer
  • What is an IF statement used for?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!