1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
15

Give big-O estimate for the number of operations (multiplication or addition) used in the following algorithm segment (ignore co

mparisons to check while conditions).
i =1
t = 0
while i <= n
i = t+i
t = 2i
Computers and Technology
1 answer:
Novay_Z [31]3 years ago
6 0
<span>'m pretty sure the big O is actually O(log n) Not really a proof but anyway. If you write out the values before each iteration of the loop you get. L - iteration number L i t 1 1 0 2 1 2 3 3 6 4 9 18 5 27 54 6 81 162 So if n was 80 it would take 6 iterations You can see i is growing like 3^(L-2) So if n was 1000 1000 = 3^(L-2) log(1000) [base 3] = L - 2 log(1000) [base 3] + 2 = L 8.287709822868152 = L and if you ceil the answer you get L = 9 and just to check with the table 6 81 162 7 243 486 8 729 1458 9 2187 ... The table isn't perfect but hopefully you get the main idea.</span>
You might be interested in
What is the term for the typical layout of the keys on a keyboard?
stepan [7]
I think the answer is B
3 0
3 years ago
Read 2 more answers
John typed 545 words in 35 minutes, what is his typing speed
Katarina [22]

Answer: 545 words per 35 mins

Explanation:

4 0
3 years ago
Read 2 more answers
The decryption broker feature is supported by which three Palo Alto networks firewall series
dalvyx [7]

Answer:

See the explanation section

Explanation:

Decryption broker features is supported for the following:

PA-7000 Series devices

PA-5200 Series devices

PA-3200 Series devices

The model supported by the decryption broker features include:

VM-300 model

VM-500 model

VM-700 models.

They usually requires SSL Forward Proxy decryption to be enabled, where the firewall is established as a trusted third party to session traffic.

3 0
3 years ago
What is the famous saying among computer programmers?
USPshnik [31]
The famous saying is garbage in , garbage out .
3 0
3 years ago
What are storage devices? write two such devices​
Ira Lisetskai [31]

Answer:

two types of storage devices used with computers a primary storage device such as r a m and the secondary storage device such as a hard drive secondary storage can be removable internet or external

Explanation:

hope it is helpful for you please make me brilliant only if you like this answers

8 0
2 years ago
Read 2 more answers
Other questions:
  • Which program or security application prevents access between a private and trusted network, and other untrusted networks?
    8·2 answers
  • How people have contributed to the advancement of science
    7·1 answer
  • What is the internet?
    5·2 answers
  • In linear​ programming, choices available to a decision maker are called
    12·1 answer
  • The ____ criteria filter requires the records displayed to start with the specified text string
    14·1 answer
  • Review the two e-mail messages below for their adherence to the guidelines for professional e-mail correspondence you have learn
    6·1 answer
  • What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
    15·1 answer
  • Produce definition in computer
    9·2 answers
  • Define input hardware​
    12·1 answer
  • What are the two compatibility issues that may arise between computer systems while transferring presentations? different video
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!