1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
13

Suppose you are consulting for a bank that's concerned about fraud detection, and they come to you with the following problem. T

hey have a collection of n bank cards that they've confiscated, suspecting them of being used in fraud. Each bank card is a small plastic object, containing a magnetic stripe with some encrypted data, and it corresponds to a unique account in the bank. Each account can have many bank cards corresponding to it, and we'll say that two bank cards are equivalent is they correspond to the same account. It's very difficult to read the account number off a bank card directly, but the bank has a high-tech "equivalence tester" that takes two bank cards and, after performing some computations, determines whether they are equivalent. Their question is the following: among the collection of n cards, is there a set of more than n/2 of them that are all equivalent to one another? Assume that the only feasible operations you can do with the cards are to pick two of them and plug them in to the equivalence tester. Show how to decide the answer to their question with only O(n log n) invocations of the equivalence tester.
Computers and Technology
1 answer:
iren [92.7K]3 years ago
8 0

Answer:

Explanation:

( n cards are there initially )

we pick out the first card in random it takes n-1 comparisons to figure out

its Equivalence card - n-1 steps

Two cards have been eliminated ( this leaves us with 2 and n-2 cards)

we pick out the 2nd card in random it takes n-3 comparisons to figure out

its Equivalence card - n-3 steps

we continue to do this.. till all cards are exhausted ( leaves us with 2

and n-4 cards again)

the last comparison will

have

- n-(n-3)

the sum of all these steps - (n-1) + (n-3) + (n-5) + .........+

(n-(n-3))

if you draw this in the form of a tree.

n - n

2

n-2 - n

2

n-4 - n-2

2

n-6 - n-4

2

n-8 - n- 6

the height of the tree will be log n , sum @ each level is at most n

You might be interested in
Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
amid [387]

The L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

<h3>What is vpn?</h3>

VPN is known as a Virtual Private Network extends a private network across a public network and activates users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

The main difference between VPN proxy and a VPN is encryption and VPNs hides all the web activities performed by the user as well as user's private IP address.

Therefore, the L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

Learn more about VPN here:

brainly.com/question/17272592

#SPJ4

3 0
2 years ago
Which of the following Federal labor laws apply to
Allisa [31]

We can actually deduce here that the following Federal labor laws apply to workers under 18:

  • Federal Minimum Wage
  • Equal Employment Opportunity
  • Occupational Safety and Health
  • Child Labor Laws.

<h3>What is employment?</h3>

Employment is actually known as the process of hiring someone for a particular job and compensating them in return in form of salaries, wages, or royalties.

In the United States, the Fair Labor Standards Act (FLSA) has set out certain standards of employment for persons under 18. It has set standards that will enable people under 18 enjoy better working conditions. Such standards are found in federal minimum wage, equal employment opportunity, occupational safety and health and child labor laws.

Learn more about employment on brainly.com/question/1991900

#SPJ1

4 0
2 years ago
Read 2 more answers
During critical thinking, the evaluation of information should use
nexus9112 [7]
False any critical thinking shouldn’t involve emotions
6 0
3 years ago
Read 2 more answers
Paula needs to ensure that an animation she has created is repeated. Which option should she use to achieve this?
SCORPION-xisa [38]

Answer:

1.

Explanation:

The option Paula can choose to ensure that the animation she has created in her presentation repeats is the transition. She can find the option of transition from the Transitions tab.

After selecting the Transitions tab, choose the effect you want to create in your presentations. You can also choose the sound of transition, or either you want to create on one slide or all slides, etc.

Therefore, option 1 is correct.

5 0
3 years ago
Documents stored on the world wide web are written and linked together using
FrozenT [24]
Using the hypertext transfer protocol
3 0
3 years ago
Other questions:
  • Which statement is true
    12·1 answer
  • Write a program that uses a two dimensional array to store the highest and lowest temperatures for each month of the calendar ye
    10·1 answer
  • What is plagiarism?<br> EXPLAIN IT
    15·2 answers
  • When 2 or more computers are connected it is called?
    14·1 answer
  • Assume the following variable definition appears in a program:
    8·1 answer
  • Mario wants to use computer.what is the first thing needs to know<br><br>​
    6·1 answer
  • A Variable can only hold numbers<br><br> True<br><br> False
    15·2 answers
  • A collection of computers, printers, routers, switches, and other devices
    15·1 answer
  • The L-exclusion problem is a variant of the starvation-free mutual exclusion problem. We make two changes: as many as L threads
    15·1 answer
  • It is a set of computer instructions​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!