1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
3 years ago
12

The number of operations executed by algorithms A and B is 40n2 and 2n3, respectively. Determine n0 such that A is better than B

for n ≥ n0.
Computers and Technology
1 answer:
Tom [10]3 years ago
8 0

Answer:

Given that:

A= 40n^2

B = 2n^3

By given scenario:

40n^2=2n^3

dividing both sides by 2

20n^2=n^3

dividing both sides by n^2 we get

20 = n

Now putting n=20 in algorithms A and B:

A=40n^2

= 40 (20)^2

= 40 * (400)

A= 16000

B= 2n^3

= 2 (20)^3

= 2(8000)

B= 16000

Now as A and B got same on n = 20, then as given:

n0 <20 for n =20

Let us take n0 = 19, it will prove A is better than B.

We can also match the respective graphs of algorithms of A and B to see which one leads and which one lags, before they cross at n= 20.

You might be interested in
Ranges of IP address that anyone can use for their internal networks are known as ______.
Rama09 [41]
Since no answer choices, have to deduce it is Private Networks
8 0
3 years ago
Read 2 more answers
I'm skeptical about (b) , is this accurate or the ranges should be listed differently ?​
Inessa05 [86]

Answer:

My guess would be C2-C11, But I may be wrong

Imagine a graph

Hope this helps....

4 0
3 years ago
WHAT BIRD IS SHOWN ON THE ARM OF BLOODHOUND?
ruslelena [56]

Answer:

Looks like a raven to me

Explanation:

4 0
3 years ago
Read 2 more answers
When a web page author includes meta keywords, like sex, that have little to do with the information on the page, the author is
OLga [1]
This practice is known as "ClickBait".
8 0
3 years ago
List 3 characteristics of the ideal encryption scheme
JulsSmile [24]
Three characteristics of an ideal encrytion scheme are:
1. The encryption sheme should be strong: the algorithm is imprevious to direct attack and attempts are derived.
2. The encryption scheme should create unique ciphertext from the same plaintext for each key permutation, among other traits.
3. It should take at least millions of years to break ideal encryption scheme, based on mathematical predictions.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Juliet is trying to increase her savings account and she decides that she is going save an additional $700 every month. If her m
    9·1 answer
  • The data structure used for file directory is called
    7·1 answer
  • Terms that represents the achual speed used by device to transfer data​
    14·1 answer
  • Francis has applied for admission to a computer science program, and one of the requirements for admission is the completion of
    8·2 answers
  • Which type of system is used to analyze, evaluate, and integrate the output of other systems?
    5·2 answers
  • Most 4 year colleges want an applicant's scores for all the following except
    12·1 answer
  • A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type
    7·1 answer
  • 8.11 LAB: Count characters - functions Write a program whose input is a character and a string, and whose output indicates the n
    6·1 answer
  • How many types of window in Qbasic​
    7·1 answer
  • How do you open an application on the macOS?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!