1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zysi [14]
3 years ago
14

Suppose that a particular algorithm has time complexity T(n) = 3 \times 2^nT(n)=3×2 ​n ​​ and that executing an implementation o

f it on a particular machine takes tt seconds for nn inputs. Now suppose that we are presented with a machine that is 64 times as fast. How many inputs could we process on the new machine in tt seconds?
Computers and Technology
1 answer:
Digiron [165]3 years ago
3 0
Hope this helps!

https://www.chegg.com/homework-help/questions-and-answers/suppose-particular-algorithm-time-complexity-t-n-3-x-2-n-executing-implementation-particul-q18423534
You might be interested in
Which statement describes what the Conditional Formatting option in Excel 2016 allows users to do?
jeyben [28]

Answer:

It automatically applies formatting based on specific rules or conditions being met. It automatically applies highlighting to selected cell ranges based on specific rules or conditions being met.

Explanation:

6 0
3 years ago
Read 2 more answers
How can i become an ailen?
DIA [1.3K]
Go to a different state as a migrant and then your a alien
8 0
3 years ago
Read 2 more answers
The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center v
Tasya [4]

Answer: Virtual desktop infrastructure

Explanation:

The virtual desktop infrastructure is the virtualization technology in which the host desktop OS (operating system)  is in the centralized server of the data center. The virtual desktop infrastructure is also known as server based computing as it include the variation in the computing model such as client - server model.

The example of the virtual desktop infrastructure is wallpapers, toolbars, window and folder is the stored in the server remotely.

All the other options does not involve with this technology so that is why option (D) is correct.

4 0
3 years ago
The OSI model is a useful tool in troubleshooting a network because it enables you to isolate a problem to a particular software
lutik1710 [3]

Answer:

1)  Layer 4, transport

2) Layer 2, datalink

3) Layer 5, session

4) Layer 7, application

Description of Problems are as below:

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Explanation:

OSI Model is a reference model to determine how applications communicate over a network. OSI consists of seven layers, and each layer performs a particular network function. The seven layers are:

   Layer 7 - Application.

   Layer 6 - Presentation.

   Layer 5 - Session.

   Layer 4 - Transport.

   Layer 3 - Network.

   Layer 2 - Data Link.

   Layer 1 - Physical.

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

Layer 4, transport

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

Layer 2, Data Link

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

Layer 5, session

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Layer 7, application

7 0
3 years ago
8.3 code practice edhesive PLEASE HELP AND HURRY
NemiM [27]

Answer:

numbers = '14 36 31 -2 11 -6'

nums = numbers.split(' ')

for i in range(0, len(nums)):

  nums[i] = int(nums[i])

print(nums)

8 0
2 years ago
Other questions:
  • The following program includes fictional sets of the top 10 male and female baby names for the current year. Write a program tha
    15·1 answer
  • Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the databas
    6·1 answer
  • Remy’s manager has asked him to change the background color scheme from reds to blues in the standard template the company uses
    15·2 answers
  • \What will the weather most likely be like the day after a warm front? (4 points) The temperature will be cool or cold, and ther
    7·2 answers
  • What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to di
    11·1 answer
  • Lexi wants to buy a $300 painting. when she gets to the store, she finds that it is on sale for 40% off. how much does Lexi spen
    10·1 answer
  • The major difference between a template and another document is in _____.
    7·1 answer
  • Select the correct answer from each drop-down menu.
    7·2 answers
  • 2. Who created the first photograph? How was this done?
    14·2 answers
  • A _____ is an Access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!