1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ss7ja [257]
3 years ago
13

Which statement best describes a scientific theory?

Computers and Technology
1 answer:
lisov135 [29]3 years ago
6 0

Answer:

It is supported by many different experiments.

Explanation:

Scientific theory is based on different experiments and tested in different situations and environment will all aspects. If the experiment finds true then observations will become theory. It can be changed in future if it does not meet the newly proposed conditions. But It does not means that, every theory can be changed.

You might be interested in
Algorithmic Complexity: what is the asymptotic complexity (Big-O) of each code section? Identify the critical section of each.\
AleksandrR [38]

Answer:

Check the explanation

Explanation:

1) f(n) = O( 1 ), since the loops runs a constant number of times independent of any input size

there is no critical section in the code, as a critical section is some part of code which is shared by multiple threads or even processes to modify any shared variable.This code does not contain any variable which can be shared.

2) f(n) = O( log n! ), the outer loop runs for n times, and the inner loop runs log k times when i = k,ie the total number of print will be – log 1 + log2 +log3 +log4+…...+ log n = log (1 . 2 . 3 . 4 . ……. . n ) =log n!

there is no critical section in the code, as a critical section is some part of code which is shared by multiple threads or even processes to modify any shared variable.This code does not contain any variable which can be shared.

Note : Log (m *n) = Log m + Log n : this is property of logarithm

3) f(n) = O( n^2 ), since both outer and inner loop runs n times hence , the total iterations of print statement will be : n +n+n+…+n

for n times, this makes the complexity – n * n = n2

there is no critical section in the code, as a critical section is some part of code which is shared by multiple threads or even processes to modify any shared variable.This code does not contain any variable which can be shared.

4 0
4 years ago
NEED HELP WILL MARK BRAINLIEST AND 100 POINTS FOR ANSWER Which LIKE operator would match a single character?
marin [14]

Answer:

1st choice

Explanation:

3 0
3 years ago
Read 2 more answers
Why is it important to minimize cable clutter in a rack?
V125BC [204]

Answer: Cable clutter is the mess created due to cables of the operating system units in the rack.The reduction in the cable clutter is important because it make the computing environment clear and prevent the blockage in flow of air, reducing the litter in rack environment etc  

The clearance of the cable clutter can be done with the help of cable managers for collecting the cables and tying them into one section, organizing and clearing the cabinets of rack.

8 0
3 years ago
How do you implement instruction level parallelism
netineya [11]

Answer:

To obtain substantial performance enhancements, we must exploit ILP across multiple basic blocks.

Explanation:

8 0
3 years ago
.Write a program that reads in the length and width of a rectangular yard (in meters) and the length and width of a rectangular
nata0808 [166]
What is the language you want for the code?
3 0
3 years ago
Other questions:
  • Who controls communication ethics?
    13·1 answer
  • How has the development of personal computer hardware and software reversed some of the trends brought on by the industrial revo
    15·1 answer
  • Which of the following is the java comparison operator for "not equal to"
    10·1 answer
  • THE bestValue PROBLEM Using the Camera structure defined in file p1.cpp, write the function named bestValue(). The function take
    13·1 answer
  • The GeForce GTX 1060 graphics card requires 120 W of power. You plan to install it in a PCIe 3.0 ×16 slot. Will you need to also
    13·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • The write-ahead logging (WAL) protocol simply means that Select one: a. the log record for an operation should be written before
    7·1 answer
  • Write a program to
    5·1 answer
  • How to recover deleted photos after deleting from recently deleted
    13·2 answers
  • when you arrived at the unit today and listened to the change of shift report, you heard about a patient named jane w. according
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!