1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
3 years ago
13

Indicate whether the first function of each of the following pairs has a smaller, same or larger order of growth (to within a co

nstant multiple) than the second function. Justify your answer
1. n(n+1) and 2000 n
2 + 34 n 2. In n and Ign
3. 2n-1 and 2n
4. 2 n² and 0.001 n3 - 2 n
Computers and Technology
1 answer:
Aloiza [94]3 years ago
5 0

Answer:

1. The first function n^2 + n has the same order of growth as the second function 2000n^2 + 34n within a constant multiple.

2. The first ln(n) \\  and the second log(n) logarithmic functions have the same order of growth within a constant multiple.

3. The first function \frac{1}{2}2^{n} has the same order of growth as the second function 2^n within a constant multiple.

4. The first function 2n^2\\ has a smaller order of growth as the second function 0.001n^3 - 2n within a constant multiple.

Explanation:

The given functions are

1. n(n +1 ) and 2000n^2 + 34n

2. ln(n) \\ and log(n)

3. 2^{n-1} and 2^n

4. 2n^2\\ and 0.001n^3 - 2n

The First pair:

n(n +1 ) and 2000n^2 + 34n

The first function can be simplified to

n(n +1 )  \\\\(n \times n) + (n\times1)\\\\n^2 + n

Therefore, the first function n^2 + n has the same order of growth as the second function 2000n^2 + 34n within a constant multiple.

The Second pair:

ln(n) \\ and log(n)

As you can notice the difference between these two functions is of logarithm base which is given by

log_a \: n = log_a \: b\: log_b \: n

Therefore, the first ln(n) \\  and the second log(n) logarithmic functions have the same order of growth within a constant multiple.

The Third pair:

2^{n-1} and 2^n

The first function can be simplified to

2^{n-1} \\\\\frac{2^{n}}{2}  \\\\\frac{1}{2}2^{n}  \\\\

Therefore, the first function \frac{1}{2}2^{n} has the same order of growth as the second function 2^n within a constant multiple.

The Fourth pair:

2n^2\\ and 0.001n^3 - 2n

As you can notice the first function is quadratic and the second function is cubic.

Therefore, the first function 2n^2\\ has a smaller order of growth as the second function 0.001n^3 - 2n within a constant multiple.

You might be interested in
What are the missing whole numbers on this number line? Enter your answers in the boxes. plz show work I'm I need answer 3rd gra
adell [148]
1 3 and 4... you are just counting up from 0
5 0
3 years ago
One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
vagabundo [1.1K]

Answer: provided in the explanation part.

Explanation:

This is actually quite long but nevertheless i will make it as basic as possible.

Question (a)  

Attack A:

One way property of hash means that we can't find the input string if given the hash value. The calculation of hash from input string is possible but it is not possible to calculate the input string when given the hash. If the hash function is properly created to have one-way property then there is no way of finding the exact input string. So this attack won't work as the one-way property of hash function can't be broken if the hash function is properly created.

Attack B:

Suppose h() is the hash function. And h(x) = m where x is the string and m is the hash. Then trying to find another string y such that h(y) = m is called finding out the second pre-image of the hash.

Although we can't know the exact initial string for sure, we can by using brute force method find out a second preimage.

This attack will take a very long time. It has the time complexity of 2n. It requires the attacker to have an idea about the kind of passwords that might be used and then brute force all of them to find the string that has the same hash. Each try will have a chance of 1/2n to succeed.

Rainbow attack using rainbow table is often used for such brute-force attack. This comprises a rainbow table which contains passwords and their pre-hashed values.

Therefore, it is not possible to determine the second preimages of h so easily.

Attack C:

Collisions refer to finding out m and m' without knowing any of them. Finding out collisions is easier than finding preimages. This is because after finding out 2n pairs of input/output. The probability of two of them having the same output or hash becomes very high. The disadvantage is that we can't decide which user's hash to break. However, if I do not care about a particular user but want to get as many passwords as possible, then this method is the most feasible.

It has the time complexity of 2n/2.

Hence, this is the attack which has the most success rate in this scenario.

Question (b)

The brute force way of finding out the password usually involves using a rainbow attack. It comprises a rainbow table with millions of passwords and their hashes already computed. By matching that table against the database, the password can be recovered.

Therefore it is often preferred to salt the password. It means we add some random text to the password before calculating the hash.

The salts are usually long strings. Although users usually do not select long passwords, so a rainbow table with hashes of smaller passwords is feasible. But once salt is used, the rainbow table must accommodate for the salt also. This makes it difficult computationally. Although password might be found in the rainbow table. The salt can be anything and thus, make brute-force a LOT more difficult computationally.

Therefore salt is preferred to be added to passwords before computing their hash value.

Question (c)

A hash output length of 80 means there can be exactly 280 different hash values. This means there is at least one collision if 280+1 random strings are hashed because 280 values are used to accommodate all the possible strings. It is not hard with today's computation power to do match against more than this many strings. And doing so increases the probability of exposing a probable password of a user.

Hence, 80 is not a very secure value for the hash length.

cheers i hope this helps!!!!

6 0
4 years ago
Help me please! (*18* points!)
miss Akunina [59]

Answer:

Databars and Sparkliness are key types of conditional formatting in excel.

Explanation:

Databars show the relative magnitude of values in a dataset. Sparkliness are tiny charts that reside in a cell in excel. These charts are used to show the trend over the time or variation in the dataset.

3 0
3 years ago
A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
melomori [17]

A(n) access point is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

<h3>What is an access point?</h3>

An access point is known to be a kind of device that makes a wireless local area network, or WLAN, and it is often done in an office or big  building.

Therefore, A(n) access point is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

Learn more about access point from

brainly.com/question/14306861

#SPJ12

6 0
2 years ago
The function below takes two arguments: a dictionary of strings (keys) to integers (values) a_dict and a list of strings key_lis
vitfil [10]

Answer:

  1. def getData(a_dict, key_list):
  2.    result = []
  3.    for key in key_list:
  4.        result.append(a_dict[key])
  5.    
  6.    return result  
  7. result = getData( {"puffin": 5, "corgi": 2, "three": 3} , ["three", "corgi"])
  8. print(result)

Explanation:

Let's define a function <em>getData() </em>with two parameters,<em> a_dict </em>and <em>key_list</em> as required by the question (Line 1).

Since the function is to return a list of associated values of dictionaries, a new list,<em> result</em>,  is declared and initialized with empty values (Line 2).

Next, use for-loop to traverse through every string in the input <em>key_list </em>(Line 4) and use the traversed key to address the value in the<em> a_dict </em>and add it to the <em>result</em> list (Line 5)

At last, return the <em>result </em>list as output (Line 7)

We can test the function using the test case from the question and we shall see the output as follows:

[3, 2]

8 0
3 years ago
Other questions:
  • A slightly tapered thread is characteristic of a _______ tap.
    15·1 answer
  • Which are appropriate uses for special effects in presentations?
    14·1 answer
  • How is typing speed measured
    12·2 answers
  • What does social protocol means in network?
    9·1 answer
  • What are copyright laws? Authority to reprint an original work as long as it's not for profit Entitlement to use and sell anothe
    15·2 answers
  • Which graph is the solution to the system 2x – 3 and y &lt; 2x + 4?
    5·2 answers
  • File:///media/fuse/drivefs-0142e6928396ed2afff070ead0fbbbcd/root/JerooLessonFourLabA_1.pdf
    6·1 answer
  • The complete process for learning through repetition is to read, write, say, rest and revisit the information. Please select the
    12·2 answers
  • Complete the function favoriteFlower(). Note that the program will not run as is because the function is incomplete. The purpose
    15·1 answer
  • What is the console.log function for?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!