1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
4 years ago
7

a program p takes time proportional to log where nlogn is the input size. if the program takes 100 ms to process input of size 1

,000,000, how many seconds does it take to process input of size 100
Computers and Technology
1 answer:
Eddi Din [679]4 years ago
3 0

Answer:

The time is 4 \times 10^7 \ microseconds.

Explanation:

\ The \ requires \ time \ be \ t \ microseconds, \\\\\ \ formula: \\\\ time \propto \ nlog_n \Rightarrow \ time \ = \ knlogn \\\\

\ 10 \ = \ 100 \ log(100) \ \ \ \ \ \ \ \ \ k= 10^2 \ log\ ( \ 10^2\ ) \ k\\\\t=100,000,000 \log \ ( \ 100,000,000\ ) \ k = \ 10^8 \ log\ (\ 10^8\ )\ k \\\\\rightarrow \frac{t}{10} \ =\frac{10^8\ log \ (10^8)k}{10^2\ log\(10^2\ ) k} \\\\\rightarrow \frac{t}{10} \ =\frac{10^8\ log \ (10)\times 8 \times k}{10^2\ log\(10) \times 2 k} \\\\\rightarrow \frac{t}{10} \ =\ 4\times 10^6\\\\\rightarrow \ t \ =\ 4\times 10^6 \times 10 \\\\\rightarrow \ t \ =\ 4\times 10^7 \ microseconds \\\\

You might be interested in
Commercial websites have domain names so that users can easily access the web pages by typing the domain names instead of the IP
WINSTONCH [101]

The given statement is true.

<u>Explanation:</u>

IP address is really tough to remember by each and everyone, and even if you misspell one number, then the navigation will not go for the desired website. It is equivalent to remember phone numbers during the earlier days. As said the domain name has 4 parts.

They are,  

  • TLD – Top level domain (eg: .com, .org, .net, etc) .
  • Mid level domain – It is the part that comes after www keyword which is before the Top level domain name.
  • www is the machine name which is common for all the domain. It is a standard that needs to be used.
  • Second level domain .
8 0
3 years ago
Look at the slide. How could the slide best be improved? By reducing the number of visual aids by increasing the font size by da
azamat

Answer:

b.  by providing more information

Explanation:

5 0
3 years ago
Read 2 more answers
How secure is a password protected word document?
tensa zangetsu [6.8K]
Secure enough to keep someone out who get on your pc but you should encrypted it so no one o the pc or remotely access it with out a password or with out decrypting it
8 0
4 years ago
Programming CRe-type the code and fix any errors. The code should convert non-positive numbers to 1.
LUCKY_DIMON [66]

Answer:

Given

The above lines of code

Required

Rearrange.

The code is re-arrange d as follows;.

#include<iostream>

int main()

{

int userNum;

scanf("%d", &userNum);

if (userNum > 0)

{

printf("Positive.\n");

}

else

{

printf("Non-positive, converting to 1.\n");

userNum = 1;

printf("Final: %d\n", userNum);

}

return 0;

}

When rearranging lines of codes. one has to be mindful of the programming language, the syntax of the language and control structures in the code;

One should take note of the variable declarations and usage

See attachment for .cpp file

Download cpp
5 0
4 years ago
What does every shot have with regards to depth?
djyliett [7]

This can be used to capture a larger area of acceptably sharp images. This can also be referred to as a deep depth of field, and some cinematographers will simply use the term “depth” to describe shots with a large DOF. It can also be referred to as deep focus.
5 0
3 years ago
Other questions:
  • Which button do you use to put data in a specific order A.Insert
    6·2 answers
  • Write code that inserts useritems into the output string stream itemsoss until the user enters "exit". each item should be follo
    15·1 answer
  • To minimize the invasion of privacy, _____.a.organizations should not modify data once it is entered into an information systemb
    14·1 answer
  • To insure QoS of a network, an alternative to “prioritizing traffic” is to __________, which means holding back traffic from non
    8·1 answer
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    14·2 answers
  • What should you consider when looking at houses to buy? A. Location B. Size and condition of the yard C. Size, features, and con
    12·2 answers
  • Which search phrase is the most effective to find out about the most popular pizza chains worldwide in 2019?
    9·2 answers
  • write an algorithm and draw a flowchart to calculate the sum of of the first 10 natural numbers starting from 1​
    13·1 answer
  • Given a MxN matrix.Print the elements in odd rows from left to right and the elements in even rows from right to left.(Java or C
    11·1 answer
  • Which approach to bandwidth usage consumes all of the available frequencies on a medium to transmit data
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!