1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
3 years ago
12

Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in

any lecture hall. We wish to schedule all the activities using as few lecture halls as possible. Give an efficient greedy algorithm to determine which activity should use which lecture hall.
Computers and Technology
1 answer:
laiz [17]3 years ago
8 0

Answer:

By Using the Greedy- Activity- Selection algorithm

Explanation:

The Greedy- Activity- Selection algorithm in this case involves

First finding a maximum size set S1, of compatible activities from S for the first lecture hall.

Then using it again to find a maximum size set S2 of compatible activities from S - S1 for the second hall.

This is repeated till all the activities are assigned.

It requires θ(n2) time in its worse .

You might be interested in
Rest or take a break every __ minutes when typing. Please help!
Talja [164]
Maybe like 3-5 I think im right
3 0
4 years ago
Read 2 more answers
What Windows PowerShell commands should you use to create a simple volume of the same size on disk 3 using the drive letter G:?
emmainna [20.7K]
The solution for this problem is 

<span>Create a new partition on disk 1

</span>PS C:\> New-Partition -DiskNumber 1<span> -UseMaximumSize -AssignDriveLetter
</span>
This command lets you create a new partition disk and the same time uses the maximum available space as well as the automatically assigning it into a drive.
7 0
3 years ago
You can separate words in a macro name by using the ____ character
Maru [420]
You can separate words in a macro name by using the underscore character.

A macro is considered as a small reusable computer program. It is efficient as it helps you save time by automating any repeated task.
In order to create a macro, you do not need to be an expert in programming, however, a little knowledge about it will help.

8 0
3 years ago
Read 2 more answers
photographers shooting in raw can be assured their information can be read by converting the file to which format upon upload?
KiRa [710]

Photographers shooting in RAW can be assured their information can be read by converting the file to JPEG.

JPEG is a popular technique for lossy compression for digital images, especially for pictures taken with a digital camera. Adjustable compression levels allow you a choice between storage capacity and image quality. Camera raw images are pictures or files that have not been processed. The images are just as they were captured without any formatting or editing. To prevent the loss of these data, the files can be saved in JPEG. Therefore, Photographers shooting in RAW can be assured their information can be read by converting the file to JPEG.

To know more about photography, visit;

brainly.com/question/13600227

#SPJ4

8 0
1 year ago
Subtract the following the Hex numbers:<br><br> 67h<br><br> 2Ah<br><br> Result is =
-BARSIC- [3]

Answer:

3D ( in hexadecimal )

Explanation:

Converting the given hexadecimal numbers to decimal:

 67 (HEX) = 16*6 + 7 = 103 (Decimal)

 2A (HEX) = 2*16 + 10 = 42 (Decimal)

Subtracting the two numbers: 103 - 42 = 61 (Decimal)

Converting the result to Hexadecimal format:

61 = 16* 3 + 13

13 corresponds to D in hexadecimal.

So result in hex is 3D.

To summarize, the subtraction result for the two given hexadecimal numbers is 61 in decimal format or 3D in hexadecimal.

4 0
4 years ago
Other questions:
  • What is the difference between deta security and privecy ?
    12·2 answers
  • One of the visual tools that provides a graphical representation of the dataset object and enables you to set relationships betw
    13·1 answer
  • An online service provider provides its users with hosted computers, an operating system, and a database management system (DBMS
    12·1 answer
  • To create bold shadows, which lighting choice would work best.
    7·1 answer
  • Creating a Graphical User Interface in Java
    11·1 answer
  • Each of the following code fragments contains a number of security vulnerabilities. For each fragment, identify these security v
    13·1 answer
  • Draw AND, OR, XOR and XNOR gates with truth table and logic gates.<br><br>.​
    11·1 answer
  • Try drawing the bass clef sign by tracing over the dotted lines. then draw five more on your own
    13·1 answer
  • What is an Array? 20 POINTS!!!
    15·1 answer
  • URGENT!! thank you!!!!!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!