1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
4 years ago
15

Give big-O estimate for the number of operations (multiplication or addition) used in the following algorithm segment (ignore co

mparisons to check while conditions).
i =1
t = 0
while i <= n
i = t+i
t = 2i
Computers and Technology
1 answer:
Novay_Z [31]4 years ago
6 0
<span>'m pretty sure the big O is actually O(log n) Not really a proof but anyway. If you write out the values before each iteration of the loop you get. L - iteration number L i t 1 1 0 2 1 2 3 3 6 4 9 18 5 27 54 6 81 162 So if n was 80 it would take 6 iterations You can see i is growing like 3^(L-2) So if n was 1000 1000 = 3^(L-2) log(1000) [base 3] = L - 2 log(1000) [base 3] + 2 = L 8.287709822868152 = L and if you ceil the answer you get L = 9 and just to check with the table 6 81 162 7 243 486 8 729 1458 9 2187 ... The table isn't perfect but hopefully you get the main idea.</span>
You might be interested in
Advancements in nuclear science have led to technological advances which are both harmful and beneficial. Which would be conside
ExtremeBDS [4]
<span>C) magnetic resonance imaging (MRI) 

hope it helped

</span>
5 0
4 years ago
Select the correct answer.
Andrei [34K]

Answer: The answer is C

Explanation: When it comes to research papers your topic shouldnt be too broad. Your topic should be broad enough you can find a good amount of information but not too focused that you can't find any information.

7 0
3 years ago
PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.txt
Mrac [35]

Answer:

pgp --encrypt "my-message.txt" --recipient (Sean) --output ("secret-message.txt.gpg")

Explanation:

PGP encryption from the command line can be done using the following format:

  • pgp --encrypt (input) --recipient (user) --output (output file)

Therefore, PGP command line syntax to encrypt the my-message.txt file for a specific user (Sean) and save the output as secret-message.txt.gpg is:

  • pgp --encrypt "my-message.txt" --recipient (Sean) --output ("secret-message.txt.gpg")
6 0
3 years ago
Which term is used to describe a software application that is secretly placed on a user system to gather information and relay i
BARSIC [14]

Answer: Spyware?

Explanation:

6 0
3 years ago
Enter just the letter of the correct answer
astraxan [27]

purchase a router from the aisle

8 0
3 years ago
Other questions:
  • The mathematical order of operations is used in Excel when formulas are evaluated. This order of operations states the order to
    9·2 answers
  • Which option is referred to by the Animals tag?
    5·1 answer
  • The ________ multiple-selection PHP statement is used to handle decision making and can be used to replace multiple if and if...
    12·1 answer
  • How do solar cells translate heat energy into mechanical energy
    13·1 answer
  • _____ is a program that allows a person using one computer to access files and run programs on a second computer that is connect
    11·1 answer
  • How do new sources of power assist in the development of inventions?
    15·1 answer
  • The need to strike a<br>- among work, life, family, and other responsibilities is<br>universal.​
    15·1 answer
  • What is income?
    10·2 answers
  • Compare and contrast Charles bebbage and Blaise Pascal inventions<br>​
    14·1 answer
  • What is the cpu used for
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!