1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
4 years ago
13

There are two algorithms called Alg1 and Alg2 for a problem of size n. Alg1 runs in n2 microseconds and Alg2 runs in 100n log n

microseconds. Alg1 can be implemented using 4 hours of programmer time and needs 2 minutes of CPU time. On the other hand, Alg2 requires 15 hours of programmer time and 6 minutes of CPU time.
1. If programmers are paid 20 dollars per hour and CPU time costs 50 dollars per minute, how many times must a problem instance of size 500 be solved using Alg2 in order to justify its development cost?

Computers and Technology
1 answer:
nataly862011 [7]4 years ago
8 0

The answer & explanation for this question is given in the attachment below.

You might be interested in
Hello, can you help me answer these questions?
Anna35 [415]

Answer:

Ans 1.To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed. A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers.

Ans 2.Data travels across the internet in packets. Each packet can carry a maximum of 1,500 bytes. ... When you send an e-mail to someone, the message breaks up into packets that travel across the network. Different packets from the same message don't have to follow the same path.

Ans 3.protocol is a set of rules that governs the communications between computers on a network. A network protocol defines rules and conventions for communication between network devices.

Ans3 A protocol is a set of rules that governs the communications between computers on a network. A network protocol defines rules and conventions for communication between network devices.

Hope this fine

<h2>Pls Make me a brainlest </h2>
8 0
3 years ago
Read 2 more answers
The first popular personal computer with a graphical user interface was the Apple Macintosh. Compaq Presario. IBM PC. NeXT works
Pavlova-9 [17]

Answer:

The answer is the Apple Macintosh

Explanation:

The Apple Macintosh PC was the first widely sold and most popular PC with a GUI. It was based on its earlier predecessor called the Apple Lisa which was later killed by the Apple Macintosh OS. Prior to the Apple Macintosh was the Xerox PARC which was the first PC to support an OS that was based on GUI. However, the Xerox was not a popular commercial product  and was intended for University research only

7 0
3 years ago
7. The data selected to create a chart must include
dybincka [34]
Answer is: B (column titles and row labels)
3 0
4 years ago
Read 2 more answers
A(n) ____ is the equivalent of a field in a file system.
andrew-mc [135]
<span>An attribute is the equivalent of a field in a file system. That is what they call a field because it is a component of a file. In information technology, and relating to data files in particular, file systems use attributes to define their files and make them more specific and easily identified within a data system as a whole.</span>
6 0
4 years ago
What landforms are likely to form at this boundary
Paha777 [63]
<span>Landforms that could be created at convergent boundaries would consist of: volcanoes, mountains, trenches, volcanic islands, and even deserts could result from effects of converging boundaries. The landforms are mountains.</span>
3 0
3 years ago
Other questions:
  • (Financial application: compound value) Suppose you save $100 each month into savings account with an annual interest rate of 5%
    6·1 answer
  • Why is it important for people to express resentments in the workplace?
    9·1 answer
  • Which of the following software is unique to a Mac?
    15·2 answers
  • After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued
    14·1 answer
  • The three devices you are going to install are a 2u server, a 1u keyboard tray, and an 8u space for a rack mounted moitor. Given
    6·1 answer
  • A jeweler designing a pin has decided to use five stones chosen from diamonds, rubies, and emeralds. In how many ways can the st
    9·1 answer
  • In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
    9·1 answer
  • An array of Strings, names, has been declared and initialized. Write the statements needed to determine whether any of the array
    9·1 answer
  • What is an undirected graph?
    13·1 answer
  • The cpu stores the results of computations in ________.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!