1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
otez555 [7]
3 years ago
11

Merge sort has a o(n log2(n)) complexity. if a computer can sort 1,024 elements in an amount of time x, approximately how long w

ill it take the computer to sort 1,024 times that many, or 1,048,576 elements?
Computers and Technology
1 answer:
Musya8 [376]3 years ago
6 0
<span>1,048,576 is 1,024 times 1,024, 1,024 * 1,024 or 1,024 squared or 1,024^2. If a computer takes x amount of time to sort 1,024 elements then the relationship is a 1 to 1. Therefore the computer will take x times x or x^2 (x squared) amount of time to sort 1,048,576.</span>
You might be interested in
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine
jek_recluse [69]

Answer:Obscurity

Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.

The functioning of the security through obscurity(STO) works by hiding the  flaws and errors related to security  of the operating system.Thus , Signe is willing to use obscurity system.

 

6 0
4 years ago
the list of available fonts in the fonts gallery may differ, depending on what fonts you have installed and the type of printer
aalyn [17]
I believe the correct answer is true. The <span>list of available fonts in the fonts gallery may differ, depending on what fonts you have installed and the type of printer you are using. Not all fonts would be available in all computers and for all printers. It should be installed first before use.</span>
5 0
3 years ago
1.5 question 3 on edhesieve
morpeh [17]

Answer:

ppl

Explanation:

asfafgdffsghsdfghdgsghdfghtrbd54445 ddfgg

7 0
3 years ago
An application team plans to follow the 10-phase SDLC model. After the team identifies both functionality and security requireme
Valentin [98]

Answer:

The team did not adequately formalize the software's design

Explanation:

The most logical reason for this confusion is the fact that the team did not adequately formalize the the software design.

The design approach has to do with clearly defining the architectural modules of the application. The requirements in the software requirement specification document would serve as input for the next phase. The documents are prepared and they give a definition of the overall system architecture.

The team got confused because they did not go through this phase of the 10-phase SDLC model.

3 0
3 years ago
A call to a value-returning function with an empty formal parameter list has the form ________ .
gizmo_the_mogwai [7]
The correct answer is D
4 0
3 years ago
Other questions:
  • Which of the following are true statements about collisions in hashing? Linear probing can cause secondary collisions. Higher sp
    6·1 answer
  • What happens if i receive a text while my phone is off?
    15·1 answer
  • for what reason do some security professionals consider insiders more dangerous than outside intruders?
    8·1 answer
  • Heelo how do u do python syntax lesson 11 on code academy
    12·1 answer
  • In Java
    6·1 answer
  • Methods that require you to use an object to call them are called ____ methods.1. accessor
    7·1 answer
  • How do you think computers have helped improve documentation, support and services within the healthcare industry
    13·1 answer
  • When backing up a database, what is added to the file name?<br> On g metrix
    9·1 answer
  • I’ll mark brainliest if correct
    10·1 answer
  • All the network nodes are connected to each other
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!