1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allsm [11]
2 years ago
7

Consider the following algorithms. Each algorithm operates on a list containing n elements, where n is a very large integer.

Computers and Technology
1 answer:
DochEvi [55]2 years ago
4 0

We have that the appropriate statement will be

  • An algorithm that accesses only the first 10 elements in the list, regardless of the size of the list. Which of the algorithms run in reasonable time

III only.

Option B

From the question we are told

Consider the following <u>algorithms</u>. Each <u>algorithm</u> operates on a list containing n <em>elements</em>, where n is a very large <u>integer</u>.

I. An algorithm that accesses each <u>element</u> in the list twice.

II. An <em>algorithm </em>that accesses each <u>element </u>in the list n times.

III. An <u>algorithm</u> that accesses only the first 10 elements in the list, regardless of the size of the list. Which of the <em>algorithms </em>run in <em>reasonable </em>time?

<h3>Algorithm  </h3>

Generally In order to get <em>admission </em>to every thing in the list twice, the algorithm has to traverse the listing twice,

which leads to 2*n entry to operations.

And if the every factor is accessed n times, the listing will be traversed n time, which leads to n^2 get right of entry to operations.

If n is a very giant <em>integer</em>, each 2*n and n^2 are plenty larger.

So, there will be <em>solely </em>ten entry to operations and this algorithm will have a sensible jogging time.

Therefore

An algorithm that accesses only the first 10 elements in the list, regardless of the size of the list. Which of the algorithms run in reasonable time

III only.

Option B

For more information on  algorithm  visit

brainly.com/question/950632

You might be interested in
True or False. A compact disc (CD) stores music in a coded pattern of tiny pits 10−7m deep. The pits are arranged in a track tha
vovikov84 [41]

Answer:

True.

Explanation:

Yes it is true. A CD works on exactly the same pattern defined above.

3 0
3 years ago
When you begin typing text, the _________________________ appears on the status bar with an animated pencil writing on paper tha
melomori [17]
Spelling and grammar check icons
3 0
3 years ago
What is the output of the following program?
Minchanka [31]

Answer:

the answer is t

Explanation:

7 0
3 years ago
Authenticating information can be something a user knows, like a password; something a user has, like a smart card; or something
xenn [34]

Answer:. True

Explanation:

yes it is true in my opinion

8 0
2 years ago
Information Security
ziro4ka [17]

Answer:

THEUNITEDSTATESWASATPEACEWITHTHATNATIONANDATTHESOLIC ITATIONOFJAPANWASSTILLINCONVERsATIONWITHITSGOVERNMEN TANDITSEMPERORLOOKINGTOWARDTHEMAINTENANCEOFPEACEINTH EPACIFICINDEEDONEHOURAFTERJAPANESEAIRSQUADRONSHADCOM MENCEDBOMBINGINOAHUTHEJAPANESEAMBASSADORTOTHEUNITEDS TATESANDHISCOLLEAGUEDELIVEREDTOTHESECRETARYOFSTATEAF ORMALREPLYTOARECENTAMERICANMESSAGEWHILETHIsREPLYSTAT EDTHATITSEEMEDUSELESSTOCONTINUETHEEXIsTINGDIPLOMATIC NEGOTIATIONsITCONTAINEDNOTHREATORHINTOFWARORARMEDATTACK

Explanation:

Use this mapping:

abcdefghijklmnopqrstuvwxyz

kfazsrobcwdinuelthqgxvpjmy

6 0
3 years ago
Other questions:
  • To play game, go inside the Grand Theft Auto V folder and right click and runGTAVLauncher as administrator.If you get any missin
    5·1 answer
  • To move one screen to the left press ____.
    9·1 answer
  • Are computer virus and human virus the same​
    6·1 answer
  • Which term means a device that converts one voltage to another?
    13·1 answer
  • When classified data is sent over an unclassified network, what is this incident called?
    5·1 answer
  • URGENT!!! Steve wants to change shooting and exposure settings while on his photo shoot. Which camera part will allow him to do
    12·2 answers
  • What is software piracy?
    11·1 answer
  • What output is generated by this for loop?
    6·1 answer
  • Select the correct answer.
    8·1 answer
  • Use your editor to open the cc_data.js file and study the data stored in the staff object to become familiar with its contents a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!