1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
4 years ago
12

The number of operations executed by algorithms A and B is 40n2 and 2n3, respectively. Determine n0 such that A is better than B

for n ≥ n0.
Computers and Technology
1 answer:
Tom [10]4 years ago
8 0

Answer:

Given that:

A= 40n^2

B = 2n^3

By given scenario:

40n^2=2n^3

dividing both sides by 2

20n^2=n^3

dividing both sides by n^2 we get

20 = n

Now putting n=20 in algorithms A and B:

A=40n^2

= 40 (20)^2

= 40 * (400)

A= 16000

B= 2n^3

= 2 (20)^3

= 2(8000)

B= 16000

Now as A and B got same on n = 20, then as given:

n0 <20 for n =20

Let us take n0 = 19, it will prove A is better than B.

We can also match the respective graphs of algorithms of A and B to see which one leads and which one lags, before they cross at n= 20.

You might be interested in
Which of these Logic Statement's are correct for the following diagram? *
Solnce55 [7]

Answer:

A AND B OR C

Explanation:

7 0
3 years ago
Analyzing computer systems to gather potential legal evidence is computer ________
hodyreva [135]
It is called computer forensics.
5 0
3 years ago
A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet in
Vesnalui [34]

Answer:

d. 65536

Explanation:

When the network administrator received the IPV6 prefix for subnetting and we have assumed that the administrator does not subnet into their interface ID portion.So the number of subnets the administrator can create from the /48 prefix are 65536.

Hence the answer to this question is 65536.

3 0
3 years ago
Types of antivirus explain them
Veronika [31]

Answer: an antivirus is a type of program designed  to protect computers from  viruses, spyware, botnets, rootkits, keyloggers and such. There are many versions and types of anti-virus programs which can be very helpful.

Such as:

Norton.

Kaspersky.

Ad Aware.

AVG

Mc Afee

Hope this helps u...

Explanation:

3 0
4 years ago
Select the correct answer.
Korvikt [17]

Answer:

Wireless Internet Access

3 0
3 years ago
Read 2 more answers
Other questions:
  • A security administrator is implementing a SIEM and needs to ensure events can be compared against each other based on when the
    11·1 answer
  • In Python
    15·1 answer
  • Which opera component is a solo performance
    10·2 answers
  • Which one is it A,B,C,D
    10·2 answers
  • Is there anyone willing to sign into my google classroom account and help with my work :( i had surgery on monday and have about
    14·2 answers
  • ACL 1 has three statements, in the following order, with address and wildcard mask values as follows: 1.0.0.0 0.255.255.255, 1.1
    6·1 answer
  • What is character referencing and why is it used?
    8·1 answer
  • In most operating systems what is running application called?
    5·1 answer
  • What method of technical drawing uses converging lines?
    7·1 answer
  • (Shuffle rows) Write a method that shuffles the rows in a two-dimensional int array using the following header: public static vo
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!