1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NikAS [45]
4 years ago
15

Someone claims that the big O notation does not make sense at all, and they give the following example. An algorithm A that proc

esses an input set of N elements takes time, in seconds, given by T(N) = 10000*N + 0.00001*N^3. They say that the large constant (10000) associated with the N will always dominate over the small constant (0.00001) associated with the N^3. You say that this algorithm A is:_____
Computers and Technology
1 answer:
Svetllana [295]4 years ago
7 0

Answer:

Big Oh notation is used to asymptotically bound the growth of running time above and below the constant factor.

Big Oh notation is used to describe time complexity, execution time of an algorithm.

Big Oh describes the worst case to describe time complexity.

For the equation; T(N) = 10000*N + 0.00001*N^3.

To calculate first of all discard all th constants.

And therefore; worst case is the O(N^3).

You might be interested in
what is the largest possible number of internal nodes in a redblack tree with black height k? what is the smallest possiblenumbe
Elina [12.6K]

Answer:

A Red Black Tree is a type of self-balancing(BST) in this tree ,each node is red or black colored. The red black tree meets all the properties of the binary search tree, but some additional properties have been added to a Red Black Tree.

A Red-Black tree's height is O(Logn) where (n is the tree's amount of nodes).

In a red-black tree with black height k

The maximum number of internal nodes is 2^{2k} -1.

The smallest possible number is 2^{k} -1.

7 0
3 years ago
Computer a sends a packet intended to reach computer f. along its path it arrives at computer
disa [49]
<span>To the computer f, this answer is because when reading the statement I assume that there is no type of connection and / or communication between the computer a and c; therefore to be profitable the computer c should return the package sending it back to computer f.</span>
5 0
3 years ago
_____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.
sineoko [7]
Hello <span>Rfieldgrove1102 </span><span>

Answer: EDI enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.


Hope that helps
-Chris</span>
4 0
4 years ago
When a site is unsafe , it means?
jeka57 [31]
When a site is unsafe, it means that the personal  information may be used in ways that is not proper.
7 0
4 years ago
Read 2 more answers
What is the name of the organization responsible for assigning public ip​ addresses?.
IgorC [24]

The worldwide body in charge of managing and supervising the coordination of the Internet's domain name system  is called the Internet Corporation for Assigned Names and Numbers (ICANN).

The Internet Engineering Task Force (IETF) is a sizable, open, and global community of network architects, operators, vendors, and academics with a focus on the development of the Internet architecture and the efficiency of its operation. Any anybody with an interest is welcome to join the IETF.

The IETF's working groups, which are categorized into various sections by topic, carry out the technical work for the organization (e.g., routing, transport, security, and more). Three times a year, the IETF organizes meetings, but the majority of the work is done via mailing list.

To know more about Internet  click here:

brainly.com/question/5787501

#SPJ4

6 0
1 year ago
Other questions:
  • Sasha has decided to start a consulting business. She will need space for large meetings and a receptionist. Which of the follow
    14·1 answer
  • ____ is a practice where a user in enticed by possible rewards and then asked to provide personal information.
    14·1 answer
  • Kayle is building a web form. He has included space where users can input their phone numbers and email addresses. However, he w
    15·1 answer
  • When coding, how do you get animations to work??
    9·1 answer
  • A common practice is to create a(n) _____ on any field that is used as a search key, in comparison operations in a conditional e
    6·1 answer
  • Which graph or chart shows changes in the value of data?
    10·2 answers
  • Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the
    12·2 answers
  • A(n) _____________ changes the order in which instructions are carried out by directing the computer to execute a statement else
    12·1 answer
  • You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of va
    12·2 answers
  • Trying to make the baseplate red and turn off can collide then the game waits 5 seconds and turns on can collide, making the bas
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!