1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
13

Suppose you with had two algorithms, A and B, with growth functions fa(n)=200n2 and fb(n)=2n4. If you were to do an exact analys

is on these growth functions, i.e., not simplify them with Big-Oh or tilde approximation, what algorithm would you recommend for which values of n? (Hint: you should be partitioning the domain of n > 0). Explain how you arrived at your answer and why it is correct.
Computers and Technology
1 answer:
anyanavicka [17]3 years ago
7 0

Answer:

For values when n<32 use fb(n) else use fa(n).

See explaination for details

Explanation:

Earlier when n=1 fa(n)=2000 while fb(n)=2. for n=2 fa(n)=2000*22 =2000*4=8000 while fb(n)=2*24=2*16=32. It is observed that fa(n) requires more time than fb(n) for small values.

Now, we will see when fb(n) crosses fa(n). This can happen only when fb(n) values equals or greater than fa(n)

therefore,

2000n2<=2n4

Solving equation we get n2>=1000 which can happen when n>=32.

So for values when n<32 use fb(n) else use fa(n)

You might be interested in
_____________________ denotes the use of human interactions to gain any kind of desired access. Most often, this term involves e
pishuonlain [190]

Answer:

Social engineering

Explanation:

<u>Social engineering</u> involves exploiting existing relationships and <u>manipulating people to reveal certain confidential information or to grant access to such information, systems, or networks</u>, usually for fraudulent reasons.

4 0
3 years ago
Which of the following formats can algorithms NOT be written in:
umka2103 [35]
Hello there.

Which of the following formats can algorithms NOT be written in:

Answers: Flow Chart 
5 0
2 years ago
Read 2 more answers
The process of redefining the functionality of a built-in operator, such as , -, and *, to operate on programmer-defined objects
Ksenya-84 [330]

It should be noted that the process of redefining the functionality of a built-in operator to operate is known as <u>operator overloading</u>.

Operator overloading simply means polymorphism. It's a manner in which the operating system allows the same operator name to be used for different operations.

Operator overloading allows the operator symbols to be bound to more than one implementation. It's vital in redefining the functionality of a built-in operator to operate on programmer-defined objects.

Read related link on:

brainly.com/question/25487186

3 0
2 years ago
In five to ten sentences, explain what netiquette is and how it improves efficiency and productivity in the workplace.
dlinn [17]

Netiquette is a form of communication done correctly online. Good netiquette involves respecting others privacy, using correct grammar, and not doing anything online that will annoy or disrupt others. It is important to have netiquette while online, because communication online is non verbal and you can’t tell how someone is reacting. Having netiquette is important. It implies that you have polite behaviors, and want to build up relationships with people in your work space or at a party you plan on attending. Netiquette is one way to show respect to a person, and to show that you deserve respect. It improves how you organize your writing, and shows how productive you can be. By helping you to become polite online and respectful to other users of the internet, Netiquette is especially important for future letters, emails, or other writing forms.


4 0
3 years ago
Read 2 more answers
How many possible mac addresses are there?
oksian1 [2.3K]
There are 6 octects ( 8 bit numbers ) in a MAC address, so there's 256^6 possible addresses.
6 0
3 years ago
Other questions:
  • Privileged instructions 1) generate an interrupt so they can execute before non-privileged instructions. 2) are valid only when
    5·1 answer
  • Proxy data:
    12·1 answer
  • Cobbling together elements from the previous definition and whittling away the unnecessary bits leaves us with the following def
    7·1 answer
  • which of the following is a malicious program that can replicate and spread from computer to computer? A. Email B. Virus C. Spam
    15·1 answer
  • Which of the following takes place during the research phase
    7·1 answer
  • Write a program to complete the task given below: Ask the user to enter any 2 numbers in between 1-10 and add both of them to an
    8·1 answer
  • You are requesting information about wireless connectivity for your workplace computers. Because you expect the information to b
    15·1 answer
  • . How is using 0 / 1 or true / false in specifying digital an abstraction?
    11·1 answer
  • Which feature is used to change how a presentation moves from slide to slide?
    14·1 answer
  • What are the benefits of computer literacy?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!