1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
4 years ago
13

Suppose you with had two algorithms, A and B, with growth functions fa(n)=200n2 and fb(n)=2n4. If you were to do an exact analys

is on these growth functions, i.e., not simplify them with Big-Oh or tilde approximation, what algorithm would you recommend for which values of n? (Hint: you should be partitioning the domain of n > 0). Explain how you arrived at your answer and why it is correct.
Computers and Technology
1 answer:
anyanavicka [17]4 years ago
7 0

Answer:

For values when n<32 use fb(n) else use fa(n).

See explaination for details

Explanation:

Earlier when n=1 fa(n)=2000 while fb(n)=2. for n=2 fa(n)=2000*22 =2000*4=8000 while fb(n)=2*24=2*16=32. It is observed that fa(n) requires more time than fb(n) for small values.

Now, we will see when fb(n) crosses fa(n). This can happen only when fb(n) values equals or greater than fa(n)

therefore,

2000n2<=2n4

Solving equation we get n2>=1000 which can happen when n>=32.

So for values when n<32 use fb(n) else use fa(n)

You might be interested in
What is the term for water wave that is created by an underwater earthquake
Mashutka [201]
A tsunami/tidal wave is a huge wave caused by an earthquake.
7 0
3 years ago
When you first launch presentation software, how many blank slides will appear on your screen?
nataly862011 [7]

one, the title slide

6 0
3 years ago
Read 2 more answers
What is the bleed space in a design?
pav-90 [236]

Answer:

The bleed is the part on the side of a document that gives the printer a small amount of space to account for movement of the paper, and design inconsistencies. Artwork and background colors often extend into the bleed area. After trimming, the bleed ensures that no unprinted edges occur in the final trimmed document.

Explanation:

8 0
3 years ago
The process of adding a header to the data inherited from the layer above is called what option below
Tom [10]

Answer:

The correct answer to the following question will be "Encapsulation".

Explanation:

The wrapping of the data into a single unit or the method by which a header is applied to the data inherited from the above layer is termed as Encapsulation.

While relating to networking, encapsulation would be the method of storing and converting data through one protocol into another, so that the data can proceed over a network. A TCP/IP package contained under an ATM system, for example, is indeed a kind of encapsulation.

Therefore, Encapsulation is the right answer.

4 0
3 years ago
1. Do you believe that films today are still art? Why or why not?
erastovalidia [21]
No because your not learning anything
6 0
3 years ago
Other questions:
  • Bit rate is a measure of how many bits of data are transmitted per second. Compared to videos with a higher bit rate, the same v
    13·1 answer
  • In most signal "timing diagrams" (like the one below) the signals do not change from low to high, or from high to low, abruptly.
    5·1 answer
  • What does carefully controlled research on cell phone conversations suggest about hands-free devices?
    7·1 answer
  • Which do switches create?<br> Networks<br> Wireless access points<br> Routes<br> Collision domains
    12·1 answer
  • What is the first step in planning a multi-table query?
    14·1 answer
  • What are the pros and cons of using the Internet for researching career information?
    14·2 answers
  • On the Cities worksheet, click cell H13 and enter the function that calculates the total costs for the first city. Copy the func
    14·1 answer
  • In a _______ format, the date line and the signature block are centered.
    6·1 answer
  • How are status reports useful
    6·1 answer
  • The Home editions of Windows 7 do not include the Local Security Policy or Print Management.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!