1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
9

(20 points) Given a collection of n nuts and a collection of n bolts, arranged in an increasing order of size, give an O(n) time

algorithm to check if there is a nut and a bolt that have the same size. The sizes of the nuts and bolts are stored in the sorted arrays NUT S[1..n] and BOLT S[1..n], respectively. Your algorithm can stop as soon as it finds a single match (i.e, you do not need to report all matches).
Computers and Technology
1 answer:
Blababa [14]3 years ago
6 0

Answer:

Check the explanation

Explanation:

Keep two iterators, i (for nuts array) and j (for bolts array).

while(i < n and j < n) {

if nuts[i] == bolts[j] {

We have a case where sizes match, output/return

}

else if nuts[i] < bolts[j] {

what this means is that the size of nut is lesser than that of bolt and we should go to the next bigger nut, i.e., i+=1

}

else {

what this means is that the size of bolt is lesser than that of nut and we should go to the next bigger bolt, i.e., j+=1

}

}

Since we go to each index in both the array only once, the algorithm take O(n) time.

You might be interested in
A browser is an example of a. :
UNO [17]
A browser is an example of a system application
5 0
3 years ago
In Tynker, it is not possible to create a/an __________.
xz_007 [3.2K]

Answer:

yes

Explanation:

7 0
2 years ago
Read 2 more answers
colby lives a very career-driven lifestyle. he works long hours and enjoys making a lot of money by working overtime. after he a
just olya [345]

The role of being a father will decrease Colby’s income and decrease the career-driven nature of his lifestyle.

8 0
3 years ago
Read 2 more answers
CompX Inc. is an online retailer of electronic products, including laptops and tablets. The company is known for its unique appr
Dafna1 [17]

Answer:

Differentiation

Explanation:

Differentiation is a business strategy used by organizations for gaining a competitive edge over competitors in the market.

During this approach, the organizations/business introduces a special strategy which goal is to differentiate their product or service in a positive way, from other products that are alike.

In this scenario the organization(CompX Inc) is offering a superior customer support.

6 0
3 years ago
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
Other questions:
  • 23. For the 16-bit binary number 1001 0101 1100 0011, show the effect of: a. A right shift of 4 bits with zero fill. b. A right
    13·2 answers
  • A viral video is one that can infect your computer with malware. <br> a. True <br> b. False
    6·1 answer
  • The invention of the transistor was important to the development of computers because
    14·1 answer
  • How do u use this app?
    15·2 answers
  • What is ana absolute adress
    11·1 answer
  • Un producto tecnológico puede ser tangible o intangible?
    6·1 answer
  • How to give a file name as an argument in function in python.
    11·1 answer
  • Anyone have any website ideas I could use for my computing website project? Thank you.
    15·2 answers
  • View One | View All
    10·1 answer
  • Simon would have regarded with impotent fury the disturbance between the North and the South, as it left his descendants strippe
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!