1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
3 years ago
14

We investigated a program which is probably used as one component of a bigger password breaking algorithm. We determined that th

e program can input arbitrary N-bit queue and for actual N-bit input also the program output will be always N bits long. Additionally we noticed that the longer program input is, the longer will be the output calculating time. After performing some repeating tests we also determined that the program working time depends only and exactly on input length, not on the input itself.
Finally we fixed some actual working times:



-for N=10 - 10.576 seconds;

-for N=20 - 11.087 seconds;

-for N=25 - 13.544 seconds;

-for N=30 - 27.442 seconds;

-for N=35 - 1 minute 46.059 seconds;

-for N=40 - 9 minutes 10.784 seconds.



Task:



a) Find the program working time for N=50.

b) Please derive the mathematical formula using which is possible to calculate actual working time for arbitrary N.
Computers and Technology
1 answer:
Svetlanka [38]3 years ago
3 0

Answer:

i dont know

Explanation:

You might be interested in
How can the function abcfunc change the address in its local copy of intpoint?
Sophie [7]

Answer:

the correct answer is it cannot

7 0
3 years ago
Ben would like to let everyone in the class know about the topic his group is researching.
Rasek [7]
I think the best way is to email
6 0
3 years ago
Who would be a tippee for purposes of insider trading? a. a janitor who gathers information by reading files on corporate counse
vesna_86 [32]

Answer:

Option A is correct.

Explanation:

A janitor that collects data through reviewing reports on a business counsel's desk could be a tippee for insider trading activities.

Probably, the justification for insider trading remains wrong being that it offers each insider the undue benefit on and around the marketplace, gets the insider's preferences beyond them for which they assume the trustee responsibility, as well as enables the insider to unfairly manipulate the cost of the inventory of a business.

So, the following are the reason the other options are not correct according to the given scenario.

3 0
3 years ago
The project manager of a software development team needs to hire someone to review every part of the software to make sure it wo
Zielflug [23.3K]

Answer:

code reviewer

Explanation:

In this scenario, the project manager should advertise for a code reviewer. Usually a development team has at least 2 code reviewers that are very familiar with the code that is being written for the project. Once sections of code have been completed it is usually the case that both the project lead and a code reviewer both review the entire software to look for bugs and note improvements that can be made to make the code more efficient.

4 0
3 years ago
What is the different between the simple statement and compound statement ?​
OverLord2011 [107]

Answer:

Following is the difference between Simple and Compound statement; Simple statement (sentence) is one which has only one subject and one predicate. A Compound statement (sentence) is one which has two or more independent clauses consisting of their own subject and predicate.

Explanation:

hope it helps you

Mark as brainliest.

And follow for a follow back

4 0
3 years ago
Other questions:
  • How do forensic pathologist determine time of death
    13·1 answer
  • Robert needs to apply formatting from one set of text to multiple other sets of text throughout the document. Which option shoul
    7·1 answer
  • You find that you are missing a very important file. After much searching, you have determined that it is no longer on your comp
    13·2 answers
  • Samantha wants to create a network group that allows open sharing of data without restrictions. What type of network should she
    9·1 answer
  • A user tells a help desk technician that their browser is displaying a message that a site can't be
    14·1 answer
  • The computer stores currently used programs and data in ________.
    9·2 answers
  • How can I master networking my home/business computer(s) - Tv's - iot devices and make the whole system as secure as possible?
    12·1 answer
  • Consider the following implementation of a search method:
    13·2 answers
  • 1. The letters that appear after the dot after a file name are called the:
    15·1 answer
  • Integrity constraints are enforced by Group of answer choices A. The operating system B. The end user C. The database designer D
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!