1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
3 years ago
9

What are the overheads associated with recursive algorithms? [

Computers and Technology
1 answer:
Agata [3.3K]3 years ago
8 0

Answer:

Lot of Stack place,Performance

Explanation:

recursive  algorithm is an algorithm which calls itself till some condition satisfied.Recurssion takes a lot of stack space as each time a method calls itself.it effects the performance of the application if there are more number of function calls . Because each function call uses a lot of system resources for execution. So it will make your application to run slower

You might be interested in
Different between client server architecture and peer to peer architecture​
Vilka [71]

Answer:

In Client-Server Network, Centralized server is used to store the data.

8 0
3 years ago
Which programming term describes the various characteristics of an object, such as its size and color?
SashulF [63]

Answer:

A

Explanation:

6 0
4 years ago
Which tool can be used to code basic HTML?<br><br> Text editor<br> JavaScript<br> CSS<br> HTML
luda_lava [24]

Answer:

Java Script

Explanation:

3 0
3 years ago
Read 2 more answers
What is a limitation of the flash memory card?
mrs_skeptik [129]
Hope I helped with your question.

3 0
4 years ago
Read 2 more answers
The Wired Equivalent Privacy standard had what significant disadvantage?
Ivanshal [37]

Answer:

Wired equivalent privacy standard has the significant disadvantages as, it is uses the static encryption keys. Wired equivalent privacy are the security and the privacy protocol which are used for designing the wireless local area network. And the static encryption key are used to set up the router for encrypting the packet in the device. The main disadvantage is that it enables the MAC address and it is easily detectable by the hackers.  

 

6 0
3 years ago
Read 2 more answers
Other questions:
  • There is no reason to study the works of famous photographers because they will make you less creative.
    5·2 answers
  • Question 1<br> a node is.<br> •a sever<br> A Cell Phone<br> A Laptop<br> a device on a network
    13·1 answer
  • The dfs replication engine uses a form of replication called
    6·1 answer
  • Riser cards on some proprietary systems plug into a unique socket or slot on the motherboard. These are also called________
    6·1 answer
  • Example of a question that could NOT be answered with a binary message
    10·2 answers
  • The person who suggested that the continents were once a supercontinent, called Pangaea, but slowly drifted apart was who
    10·2 answers
  • Write a C++ program that would take 10 integers and outputs mean, median, and range. Create at least three functions: one for so
    7·1 answer
  • Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able t
    13·2 answers
  • Which elements of text can be changed using automatic formatting? Check all that apply.
    8·1 answer
  • A large retailer is asking each customer at checkout for their zip code. if the zip code is the only recorded variable, what is
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!