1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AURORKA [14]
3 years ago
5

An algorithm takes 0.5 ms for input size 100. How long will it take for input size 500 if the running time is the following (ass

ume low-order terms are negligible);
a. linear
b. O(N log N)
c. quadratic
d. cubic
Computers and Technology
1 answer:
VikaD [51]3 years ago
6 0

Answer:

a) 2.5 ms

b) 3.37 ms

c) 12.5 ms

d) 62.5 ms

Explanation:

Determine how long it takes for an input size of 500

<u>a) Linear </u>

For an input size of 500

time taken =  ( ( 0.5 / 100 )* 500 ) ms = 2.5 ms

<u>b) 0(N log N ) </u>

First step : determine number of instructions For an input size ( N ) = 100

Log N = 6.65

∴ N log N = 665 instructions

i.e. 665 instructions is passed during 0.5ms

For

N log N = 500

N500 =  4483 instructions

time taken = (4483 * 0.5)/665 = 3.37 ms.

<u>c) Quadratic </u>

lets take N = 100

N^2 = 10000 steps per 0.5 ms

For N = 500

N^2 = 250,000  steps

time taken =  (25000*0.5) / 10000 = 12.5 ms

<u>d) cubic .</u>

lets take N = 100

N^3 = 1,000,000 steps per 0.5 ms

hence for N = 500

N^3 = 125*10^6 steps

hence time taken = ( (125*10^6)*0.5 / 10^6) =  62.5 ms

You might be interested in
A new company will have 40 workstations in one building sharing a single network. All users must be able to share ¬les and print
kobusy [5.1K]

Answer:

Domain Networking.

Explanation:

A domain in networking refers to any group of workstation,users,printers devices ,database servers and computers which share different type of data via resources of network.

Hence domain networking will be the best option for the company having 40 workstation in a single building sharing a single network.

6 0
3 years ago
_____ is used to temporarily hold small units of program instructions and data immediately before, during, and after execution b
Mazyrski [523]

Answer: A register

Explanation:

Registers are small memory used to store data or values and supply them to the processor as and when needed. These register hold the data temporarily and hold small units of program instructions. So whenever the CPU wants to work on data they have to be made available through the registers. Even after a arithmetic operation the registers serve as buckets for holding the value.

There are different types of registers such as register A, B, C etc and these registers lie in close proximity to the CPU so that we could provide the data immediately and much faster when asked by the CPU.

Therefore we can say that registers are used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).

8 0
4 years ago
Explain<br> the three types of periodic<br>maintanance. .​
LenaWriter [7]

Answer:

poop i think

Explanation:

6 0
3 years ago
What wireless security technology contains significant flaws and should never be used?
aalyn [17]

The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

<h3>What is the primary weakness of Wired Equivalent Privacy WEP )?</h3>

Wired Equivalent Privacy (WEP) is known to be a kind of a security protocol, that is seen in the IEEE Wireless Fidelity (Wi-Fi) standard known to be 802.11b.

Note that the primary weakness of wired equivalent privacy (WEP) is that It functions only on some given brands of APs and as such, The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

Learn more about wireless security from

brainly.com/question/25633298

#SPJ1

5 0
1 year ago
What type of device is characteristic of an enterprise environment? Question 14 options: a) A workstation used by a retired pers
sertanlavr [38]

Answer:

A workstation used at an engineering firm is characteristic of an enterprise environment.

4 0
4 years ago
Other questions:
  • Given the function definition below, what is the effect of thecall:
    7·2 answers
  • What country threatens Denmark at the beginning of Hamlet as evidenced in Marcellus’s question, "Why this same strict and most o
    13·1 answer
  • A smart phone is always a _____.<br> client<br> server<br> network<br> process
    10·1 answer
  • Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists? St
    5·1 answer
  • Who created apple and in what year was it created
    9·2 answers
  • _________________ ___________________ is an encrypted code that a person, website, or organization attaches to an electronic mes
    9·1 answer
  • CMS is a content management system that collects, organization, publishes, and manages creative content. Right...?
    9·1 answer
  • One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
    12·1 answer
  • I don't know if this is supposed to go here or art but i need help with photoshop, basically you can create whatever you want bu
    7·1 answer
  • What is the answer ????​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!