1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jolli1 [7]
2 years ago
13

Please help me here: h t t p s : / / t i n y u r l . c o m / y t 7 r 3 y a m

Computers and Technology
1 answer:
AysviL [449]2 years ago
4 0

Why would you even be promoting this

You might be interested in
Give a big-O estimate for the number additions used in this segment of an algorithm.
rjkz [21]
Big-O notation is a way to describe a function that represents the n amount of times a program/function needs to be executed. 

(I'm assuming that := is a typo and you mean just =, by the way) 

In your case, you have two loops, nested within each other, and both loop to n (inclusive, meaning, that you loop for when i or j is equal to n), and both loops iterate by 1 each loop.

This means that both loops will therefore execute an n amount of times. Now, if the loops were NOT nested, our big-O would be O(2n), because 2 loops would run an n amount of times.

HOWEVER, since the j-loop is nested within i-loop, the j-loop executes every time the i-loop <span>ITERATES. 
</span>
As previously mentioned, for every i-loop, there would be an n amount of executions. So if the i-loop is called an n amount of times by the j loop (which executes n times), the big-O notation would be O(n*n), or O(n^2). 

(tl;dr) In basic, it is O(n^2) because the loops are nested, meaning that the i-loop would be called n times, and for each iteration, it would call the j-loop n times, resulting in n*n runs.

A way to verify this is to write and test program the above. I sometimes find it easier to wrap my head around concepts after testing them myself.
3 0
3 years ago
. What is piracy? ???????????????????​
Delicious77 [7]

Answer: a practice similar to piracy but in other contexts, especially hijacking.

"air piracy"

the unauthorized use or reproduction of another's work.

Explanation:

8 0
3 years ago
Jemima has finished formatting her main headings. She now wants to format her two subheadings. She wants to apply the format of
klasskru [66]

Answer:

the Format Painter feature

6 0
3 years ago
Which of the following are common data types? Check all that apply.
aliya0001 [1]

Answer:

integers

booleans

characters

floating-point numbers

alphanumeric strings

Explanation:

7 0
2 years ago
Using an API means that games take a performance hit, but are able to render more CPU intensive graphics.
Sergio [31]
Yes that is correct. Was there a specific question you wanted answered...
7 0
3 years ago
Read 2 more answers
Other questions:
  • Python
    14·1 answer
  • What does the following function return? void index_of_smallest(const double all, int startindex, int numberOfSlots); A. a doubl
    7·1 answer
  • The main disadvantage of using this device is its negative impact on network performance,resulting from the fact that any incomi
    10·1 answer
  • What type of IPv6 address should you use when you have multiple routers on a subnet and want hosts to use the nearest router for
    7·1 answer
  • Explain the basic method for implementing paging.
    13·1 answer
  • According to your text, three factors are responsible for the rapid rise in new product development. They are faster and more ec
    9·1 answer
  • Teniendo en cuenta la realidad mundial acerca de la pandemia, ¿cómo crees que impacta
    9·1 answer
  • Some scientists say that robots my become self - aware in the near future Do you think this is possible?​
    10·1 answer
  • How do you think we could print a sentence that uses a variable along with other text (ie: “My name is Joe” where ‘Joe’ is a var
    14·1 answer
  • What is the most complex part of a PC?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!