1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
13

Suppose you with had two algorithms, A and B, with growth functions fa(n)=200n2 and fb(n)=2n4. If you were to do an exact analys

is on these growth functions, i.e., not simplify them with Big-Oh or tilde approximation, what algorithm would you recommend for which values of n? (Hint: you should be partitioning the domain of n > 0). Explain how you arrived at your answer and why it is correct.
Computers and Technology
1 answer:
anyanavicka [17]3 years ago
7 0

Answer:

For values when n<32 use fb(n) else use fa(n).

See explaination for details

Explanation:

Earlier when n=1 fa(n)=2000 while fb(n)=2. for n=2 fa(n)=2000*22 =2000*4=8000 while fb(n)=2*24=2*16=32. It is observed that fa(n) requires more time than fb(n) for small values.

Now, we will see when fb(n) crosses fa(n). This can happen only when fb(n) values equals or greater than fa(n)

therefore,

2000n2<=2n4

Solving equation we get n2>=1000 which can happen when n>=32.

So for values when n<32 use fb(n) else use fa(n)

You might be interested in
What's your opinion on Pokemon​ and pixeldip
faust18 [17]

Answer:

Its a good game but an amazing show. 10/10

Explanation:

7 0
2 years ago
What was the impetus for corporations to begin entertainment broadcasting on radio?
Sladkaya [172]

To help radio operators on ships stay awake was the impetus for corporations to begin entertainment broadcasting on radio.

e. to help radio operators on ships stay awake

<u>Explanation:</u>

The principal radio station ever on the planet's history was made by Reginald Fessenden on Christmas Eve in 1906 when he radiated a "Christmas show" to the bewildered teams of the boats of the United Fruit Company out in the Atlantic Ocean and the Caribbean Sea.

The main voice and music signals heard over radio waves were transmitted in December 1906 from Brant Rock, Massachusetts (only south of Boston), when Canadian experimenter Reginald Fessenden delivered about an hour of talk and music for specialized onlookers and any radio beginners who may be tuning in.

Radio turned into another type of correspondence and amusement. Between the 1920s and 1950s many radio shows were communicated, and assembling around the radio at night was a typical type of diversion.

4 0
3 years ago
Explain your understanding of distributed object system.
Paraphin [41]

Answer:

In the distributing computing, distributed object system is the process in which the distributed object are get distributed in different address space. The distributed object system is the enhancement of the client server model.

Distributed object are basically refers to the software module which are designed in such a way, so that they work together in the network.

And it is distributed physically within the network area and the methods is executed on the basis of remote host in the distributed system.  

7 0
3 years ago
How to hack my neighboor wireless?​
guapka [62]

Answer:

 

How to Hack your Neighbor’s WiFi Password Using Tools

BY NEVIL PATELLEAVE A COMMENT

Getting a WiFi connection is a major concern once you are addicted to the web and mostly in the online world. When we hear the term hack, it strikes in our mind that it is the job of a high-end technology guy or a hacker. But to “hack WiFi password”, you don’t need to be a skilled technologist because even a non-technical guy can do it with some tricks and methods.

Most people have asked me the procedure to crack WiFi passwords, so today I am here with the solution and tricks for internet hack free WiFi from the major providers like AT&T, Comcast, and Xfinity.

 

wifi-password-hack

P.S. The WiFi password hacker tools are meant for fun/general purpose only and do not contain any functionality to attempt criminal acts. Therefore, you should be very cautious while operating them.

Wifi Hacker tools

(1) WiFi Hacker

WiFi Hacker is a simple and informal tool that makes hacking WiFi easy and safe without having required any technical knowledge. This software can crack WiFi passwords with some clicks and hack unlimited WiFi networks. WiFi Hacker gives you access to multiple offices or school wifi networks, including Comcast, AT&T, etc. which are equipped with tighter security. You can hack any locked password within minutes and anonymously because WiFi Hacker conceals your identity and personal information.

Explanation:

muwhahaha

7 0
2 years ago
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
Other questions:
  • Abigail is interested in connecting her tablet that usually connects to a wireless network, to her personal computer that usuall
    11·2 answers
  • You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control vari
    14·1 answer
  • Look at the slide. How could the slide best be improved? By reducing the number of visual aids by increasing the font size by da
    8·2 answers
  • Over the past week, every time Larry has started his computer, he has noticed that the time is not correct. Larry didn’t conside
    13·2 answers
  • In today's classrooms, computers are generally being used to
    6·1 answer
  • Which shortcut key aligns text to the center of the paige
    5·1 answer
  • Use the_____icon to insert a new record.<br><br> A. *<br> B. X<br> C. =<br> D. &amp;
    11·1 answer
  • What are ip addresses? why are these important for forensic scientists?
    5·1 answer
  • How do you know where the home row of the keyboard is?
    14·2 answers
  • Microsoft Word, Google Chrome, and Windows Media Player are examples of
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!