1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ostrovityanka [42]
4 years ago
5

Order the following list of functions by the big-Oh notation. Group together those functions that are big θ of one another.6nlog

n 2^100 loglogn log^2n 2log^n2^2^n (√n) n^0.01 1/n 4n^3/23n^0.5 5n 2nlog^2n 2^n nlog4n4^n n^3 n^2logn 4^logn √logn
Computers and Technology
1 answer:
KatRina [158]4 years ago
5 0

Answer:

The increasing order of growth

1. 1/n

2. 2^100

3. Log log n

4. Sqrt(log n)

5. Log^2 n

6. n^0.01

7. ceil(sqrt(n)), 3n^0.5

8. 2^log n , 5n

9. n log4n, 6 n log n

10. floor (2 n log^2 n)

11. 4 n^3/2

12. 4^log n

13. n^2 log n

14. n^3

15. 2^n

16. 4^n

17. 2˄2n

Explanation:

When in doubt about two functions f(n) and g(n), consider log f(n) and log g(n).

Also note that Exponential growth is faster than polynomial.

i.e. the higher the degree of polynomial, the faster the growth.

I hope this helps, cheers.

You might be interested in
Define get_date() function.
lyudmila [28]

Answer:

I believe it returns the current database system date and time, in a 'YYYY-MM-DD hh:mm:ss.mmm' format.

8 0
4 years ago
(1) Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a
Sergeu [11.5K]

Answer:

import java.util.Scanner;

public class num3 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Favorite color");

       String word1 = in.next();

       System.out.println("Enter Pet's name");

       String word2 = in.next();

       System.out.println("Enter a number");

       int num = in.nextInt();

       //Point One

       System.out.println("You entered: "+word1+" "+word2+

               " "+num);

       //Point Two

       String passwordOne = word1+"_"+word2;

       String passwordTwo = num+word1+num;

       System.out.println("First password: "+passwordOne);

       System.out.println("Second password: "+passwordTwo);

       //Point Three

       int len_passwrdOne = passwordOne.length();

       int len_passwrdTwo = passwordTwo.length();

       System.out.println("Number of characters in "+passwordOne+" :" +

               " "+len_passwrdOne);

       System.out.println("Number of characters in "+passwordTwo+" :" +

               " "+len_passwrdTwo);

   }

}

Explanation:

  • This question is solved using java programming language
  • The scanner class is used to receive the three variables (Two string and one integer)
  • Once the values have been received and stored in the respective variables (word1, word2 and num), Use different string concatenation to get the desired output as required by the question.
  • String concatenation in Java is acheived with the plus (+) operator.
3 0
3 years ago
A set of communication rules for the computer to follow is called, what?
Irina-Kira [14]

The answer to this question is protocol

5 0
3 years ago
Read 2 more answers
What type of authentication does the dod require to access sensitive data on mobile devices and/or e-mail?
motikmotik
<span>Actually dod requires a digital type of authentication and a secure password inorder to access sensitive data on mobile devices and email, which may in the form of two step authentication code, then in the form digital phone calls, and then in the form of alphanumeric passwords and finally in the form of finger prints authentications or face recognition verification..</span>
8 0
3 years ago
What is Computer categories
MA_775_DIABLO [31]
Computer Categories are like

Supercomputers, mainframe computers, microcomputers, mobile computers, minicomputers.

I hope that this is the type of answer that you were looking for.
5 0
3 years ago
Other questions:
  • If using the md5 hashing algorithm, what is the length to which each message is padded?
    11·1 answer
  • It is generally safe to provide your social security number to
    7·2 answers
  • This type of technology does not come with a keyboard or mouse for input
    11·2 answers
  • what notation system supports presenting the largest numbers using fewest digits; Binary, decimal or hexadecimal?
    11·1 answer
  • Extending the web server functionality implies that the web server and the web-to-database middleware will properly communicate
    10·1 answer
  • Typing which capitals and exclamation points in an email is an example of
    14·1 answer
  • 1.
    13·1 answer
  • A user finished working on a computer in the lab. What should the user do so
    15·1 answer
  • WILL MARK BRAINLIEST FOR ANYONES ANSWER!
    12·1 answer
  • Typically, hybrid drives use SSD to store the operating system and applications and hard disks to store videos, music, and docum
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!