1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lostsunrise [7]
3 years ago
5

How does a linear algorithm perform compared to a quadratic one on our imaginary race track?

Computers and Technology
1 answer:
mixer [17]3 years ago
4 0

Answer:

The linear algorithms have the efficiency O(n). And their speed is always constant. And we need to calculate the efficiency of each of the algorithms for better management and application performance. If the input is big enough then quadratic algorithms O(N*N) always perform below a linear algorithm. And hence, linear programs are better.

Explanation:

Let us take an example of single for loop.

for i in range (1,10):

    print(x)

and second one:

for i in range (1,10):

 for j in range(1,10):

     print(i*j)

In the first single for look the algorithm is linear and it runs for 10 times, and when we increase range to 100 then it runs for 100 times. or O(N) times. However, when we consider two for loops in nested form then, it runs for 10 *10 =100 times and when we increase to 100 then it becomes, 100*100=10000 times. Thus, its complexity is O(N*N). Hence, quadratic algorithms are more complex and takes longer time to be solved.

You might be interested in
Which of these statements most accurately describes cookies?
horsena [70]
A cookie(s), on a website, is a small text file that is placed on a computer by a website. Most websites online use cookies to track data. A person can turn off their cookie tracking by going into the settings and turning it off. You can directly choose to not have cookies placed on your computer or phone. However, some website does require the cookies to be enabled before you can visit the website. The correct answer will be C. 
5 0
3 years ago
One of the ways attackers can access unencrypted data being transmitted on your network is by
nikdorinn [45]
<span>One of the ways attackers can access unencrypted data being transmitted on your network is by </span>collecting electronic emissions that come from your networking closet or Ethernet cables. 
5 0
3 years ago
What does XML do with a data wrapped in the tags?
Arlecino [84]

Answer:

Especificación para diseñar lenguajes de marcado, que permite definir etiquetas personalizadas para descripción y organización de datos. ¿Para que sirve XML? Representar información estructurada en la web (todos documentos), de modo ... Las etiquetas se definen para crear los documentos, no tienen un significado

Explanation:

5 0
3 years ago
Convert 4.5 strides to girth
n200080 [17]

There are 0.5 strides in one girth
so 4.5 strides will be equal to 9 girth
hope it helps
3 0
3 years ago
With ____ editing, word automatically displays a paste options button near the pasted or moved text.
lyudmila [28]

Answer:

With drag-and-drop editing, word automatically displays a paste options button near the pasted or moved text.

Explanation:

<u>Option A:</u> Cut and paste option is invalid because, cut and paste option does not provide paste symbol near the copied text. This option and cut and paste a selected text.

<u> Option C :</u> Inline is invalid in this context

<u>Option D: </u>Copy and Carry is not valid because the option “copy” is available where as carry is not available.

<u>Option B:</u> Drag and drop is the right answer because, it provides paste option by using this feature. A text can be drag and drop by selecting the text and dragging the mouse with the left click

8 0
3 years ago
Other questions:
  • Janeal spends her day looking at the stock and bond markets and evaluating how the portfolios of the businesses she serves will
    5·1 answer
  • What is client server relationship is the basic form of what
    6·1 answer
  • How to reset your password if you changed your email and dont remember password?
    6·1 answer
  • What do radio telescopes use to gather and focus radio waves?
    14·2 answers
  • The computer stores a program while the program is running, as well as the data thatthe program is working with, in _____.
    10·1 answer
  • Assume you are a network consultant for a company that is designing a private WAN to communicate between five locations spread t
    10·1 answer
  • Marla wants to transfer photos from her digital camera to her computer. She has plugged the camera's cord into the USB port. Wha
    11·2 answers
  • I need help with this chart !
    5·1 answer
  • What do people in the movie e.t think about the character E.T
    9·1 answer
  • A row-level trigger requires use of the _____ keywords and is executed once for each row affected by the triggering statement.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!