Assume that an O(log2N) algorithm runs for 10 milliseconds when the input size (N) is 32. What input size makes the algorithm run for 14 milliseconds

Answers

Answer 1

Answer:

An input size of N = 128 makes the algorithm run for 14 milliseconds

Explanation:

O(log2N)

This means that the running time for an algorithm of length N is given by:

[tex]F(N) = c\log_{2}{N}[/tex]

In which C is a constant.

Runs for 10 milliseconds when the input size (N) is 32.

This means that [tex]F(32) = 10[/tex]

So

[tex]F(N) = c\log_{2}{N}[/tex]

[tex]10 = c\log_{2}{32}[/tex]

Since [tex]2^5 = 32, \log_{2}{32} = 5[/tex]

Then

[tex]5c = 10[/tex]

[tex]c = \frac{10}{5}[/tex]

[tex]c = 2[/tex]

Thus:

[tex]F(N) = 2\log_{2}{N}[/tex]

What input size makes the algorithm run for 14 milliseconds

N for which [tex]F(N) = 14[/tex]. So

[tex]F(N) = 2\log_{2}{N}[/tex]

[tex]14 = 2\log_{2}{N}[/tex]

[tex]\log_{2}{N} = 7[/tex]

[tex]2^{\log_{2}{N}} = 2^7[/tex]

[tex]N = 128[/tex]

An input size of N = 128 makes the algorithm run for 14 milliseconds


Related Questions

From which panel can you insert Header and Footer in MS Word?​

Answers

Answer:

Insert tap is the answer

the answer is ..

insert tab

Complete the calcAverage() method that has an integer array parameter and returns the average value of the elements in the array as a double.(Java program)

Ex: If the input array is:

1 2 3 4 5
then the returned average will be:

3.0

Answers

Answer:

Explanation:

The following Java program has the method calcAverage(). It creates a sum variable which holds the sum of all the values in the array and the count variable which holds the number of elements in the array. Then it uses a For Each loop to loop through the array and go adding each element to the sum variable. Finally it calculates the average by dividing the sum by the variable count and returns the average to the user. A test case has been created in the main method using the example in the question. The output can be seen in the image attached below.

class Brainly {

   public static void main(String[] args) {

       int[] myArr = {1, 2, 3, 4, 5};

       System.out.println(calcAverage(myArr));

   }

   

   public static double calcAverage(int[] myArr) {

       double sum = 0;

       double count = myArr.length;

       for (int x: myArr) {

           sum += x;

       }

       double average = sum / count;

       return average;

   }

}

In the forward chaining technique, used by the inference engine component of an expert system, the _____ condition is evaluated first.

Answers

Answer:

"if" is the right response.

Explanation:

Forward chaining is being utilized just to split the logical sequential order down as well as operate throughout every component once the preceding one is accomplished, from start to finish.Its whole algorithm begins with proven information that activates all the rules, which are fulfilled as well as makes established realities even more complete.

A strategy that adopts interface standards that are defined by and widely used throughout industry to facilitate the update of components with new technology is __________. Open systems Non-developmental items Software-embedded systems Automated Information Systems

Answers

Answer:

The right approach is Option d (Automated information systems).

Explanation:

A technology that collects as well as disseminates knowledge or material throughout a range or variety of computerized systems, they are determined as an Automated information system.Oftentimes virtually minimal individual personal interference is necessary except perhaps construction as well as services.

Other choices aren't related to the given scenario. So the above is the appropriate one.

The message signal m(t) = 10cos(1000t) frequency modulates the carrier c(t) = 10cos(2fct). The modulation index is 10.
1) Write an expression for the modulated signal u(t).
2) What is the power of the modulated signal.
3) Find the bandwidth of the modulated signal.

Answers

Answer:

1) 10cos ( 2πfct + 10sin 2πfmt )

2) 50 watts

3) 1000 Hz

Explanation:

m(t) = 10cos(1000πt)

c(t) = 10cos(2πfct )

modulation index (  = 10

1) expression for modulated signal ( u(t) )

u(t) = Ac(cos 2πfct ) + A (cos 2πfct m(t) ) Am cos2πf mt

      = 10cos 2πfct + 100 cos 2πfct  cos2π500t

      = 10cos ( 2πfct + 10sin 2πfmt )

2) power of modulated signal

power of modulated signal  μ^2 / 2 ]

           = 10^2/2 ]

           = 50 watts

3) Bandwidth

B = 2fm  = 2 * 500 = 1000 Hz

Illustrate why Sally's slide meets or does not meet professional expectations?
Describe all the things Sally can improve on one of her slides?
Suggest some ways Sally can learn more PowerPoint skills.

Answers

The correct answer to this open question is the following.

Unfortunately, you did not provide any context or background about the situation of Sally and the problem with her slides. We do not know it, just you.

However, trying to be of help, we can comment on the following general terms.

When someone does not meet professional expectations, this means that this individual did not prepare her presentation, lacked technical skills, did not included proper sources, or missed the proper visual aids to make the presentation more attractive and dynamic.

What Sally can improve about her slides is the following.

She can design a better structure for the presentation to have more congruence.

Sally has to clearly establish the goal or goals for her presentation.

She has to add many visuals instead of plain text. This way she can better capture the interest of her audience.

If she can use more vivid colors instead of pale or dark ones, that would be best.

No paragraphs unless necessary. She better uses bullet points.

Take care of the tone of her voice. During her practice, she can record her vice to check how it sounds.

A security administrator currently spends a large amount of time on common security tasks, such aa report generation, phishing investigations, and user provisioning and deprovisioning This prevents the administrator from spending time on other security projects. The business does not have the budget to add more staff members.
Which of the following should the administrator implement?
A. DAC
B. ABAC
C. SCAP
D. SOAR

Answers

Answer: SOAR

Explanation:

SOAR (security orchestration, automation and response) refers to compatible software programs wfuvg allows an organization to collect data that has to do with security threats and also enables them respond to security events without the needs of a human assistance.

Since the administrator doesn't have time on other security projects, the SOAR will be vital in this regard.

2. Which tab is used to edit objects on the Slide Master and layouts?
A. View
B. Insert
C. Shape format
D. Design

Answer is not A. View
It’s B. Insert

Answers

Answer:

it is....insert tab..B

Explanation:

insert tab includes editing options

An e-mail program allows?
A. users to access and view web pages on the internet.
B. geographically separated people to transfer audio and video.
C. real-time exchange of messages or files with another online user.
D. transmission of messages and files via a network such as the internet.​

Answers

Answer:

C

Explanation:

Real time exchange of messages or files with another online user

When rating ads, I should only consider my personal feelings on the ad.

Answers

Answer:

yes when rating ads you should only consider your personal feelings on the ad

You've arrived on site to a WAN installation where you will be performing maintenance operations. You have been told the WAN protocol in use allows multiple Layer 3 protocols and uses routers that use labels in the frame headers to make routing decisions. What WAN technology is in use

Answers

Answer:

The answer is "MPLS".

Explanation:

The MPLS stands for Multiprotocol Label Switching. This packet switching method facilitates the generation of easier personal backbones using a less physical channel, which sends information from one source to its destination with labels rather than IP addresses. Many of these WAN services are sold through huge companies. It is also a technology for data transfer that boosts speed and regulates network traffic flow. The information is directed with this technology via a label rather than needing complicated surveys at every stop in a route cache.

g 1-1 Which network model layer provides information about the physical dimensions of a network connector like an RJ45

Answers

Answer:

Physical layer

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

In the OSI model, the physical layer is the first and lowest layer. Just like its name physical, it addresses and provides information about the physical characteristics such as type of connector, cable type, length of cable, etc., of a network.

This ultimately implies that, the physical layer of the network (OSI) model layer provides information about the physical dimensions of a network connector such as a RJ45. A RJ45 is used for connecting a CAT-5 or CAT-6 cable to a networking device.

Write a recursive function that returns 1 if an array of size n is in sorted order and 0 otherwise. Note: If array a stores 3, 6, 7, 7, 12, then isSorted(a, 5) should return 1 . If array b stores 3, 4, 9, 8, then isSorted(b, 4) should return 0.

Answers

Answer:

The function in C++ is as follows:

int isSorted(int ar[], int n){

if ([tex]n == 1[/tex] || [tex]n == 0[/tex]){

 return 1;}

if ([tex]ar[n - 1][/tex] < [tex]ar[n - 2][/tex]){

 return 0;}

return isSorted(ar, n - 1);}

Explanation:

This defines the function

int isSorted(int ar[], int n){

This represents the base case; n = 1 or 0 will return 1 (i.e. the array is sorted)

if ([tex]n == 1[/tex] || [tex]n == 0[/tex]){

 return 1;}

This checks if the current element is less than the previous array element; If yes, the array is not sorted

if ([tex]ar[n - 1][/tex] < [tex]ar[n - 2][/tex]){

 return 0;}

This calls the function, recursively

return isSorted(ar, n - 1);

}

Which line could be added to the lesson plan to strengthen the teacher’s point?

Different languages and communication styles might hinder your ability to benefit from global learning.
The digital divide will likely prevent you from having a major impact in the global communications environment.
Language and cultural differences will likely make it too frustrating to have an effective learning experience.
Learning in a global community enables you to expand your horizons and learn new languages.

Answers

Answer:

ムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダ

Answer:

Learning in a global community enables you to expand your horizons and learn new languages.

Explanation:

Im not sure what the teacher's point is, but the other options seem to hinder students from wanting to learn in a global community. If her goal is to convince students to learn globally then option D is your answer :)

Dynamic addressing: __________.
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated in dial-up networks
c. has only one standard, bootp
d. is always performed for servers only
e. can solve many updating headaches for network managers who have large, growing, changing networks

Answers

Explanation:

jwjajahabauiqjqjwjajjwwjnwaj

E. can solve many updating headaches for network managers who have large, growing, changing networks

Your network has four Hyper-V hosts, which are running three domain controllers and about 10 member servers. Three of the member servers named HR1, HR2, and HR3 are running on a Windows Server 2012 R2 Hyper-V host; the others are running on Windows Server 2016 Hyper-V hosts. All VMs are running Windows Server 2016. You are currently running an enterprise human resources application on the HR1, HR2, and HR3 servers. You are considering upgrading this application to a new version that was recently released. Before you proceed with the upgrade, you set up a test environment consisting of a Windows Server 2016 Hyper-V host and three VMs. You haven't been using checkpoints on any of your VMs, but you want to start doing so as an extra form of disaster recovery in the event of VM corruption or errors introduced by updates. On your test environment, you want to use checkpoints while you are testing the new application. What type of checkpoints should you use throughout your live network and test network? Explain.

Answers

Answer:

Explanation:

Write a simple nested loop example that sums the even and odd numbers between 5 and 15 and prints out the computation.

Answers

Answer:

for e in range(6, 15, 2):

for o in range(5, 15, 2):

calc = e+o

print(e, "+", o, "=", calc)

Explanation:

Cardinality ratios often dictate the detailed design of a database. The cardinality ratio depends on the real-world meaning of the entity types involved and is defined by the specific application. For the binary relationships below, suggest cardinality ratios based on the common-sense meaning of the entity types. Clearly state any assumptions you make.
Entity 1 Cardinality Ratio Entity 2
1. Student SocialSecurityCard
2. Student Teacher
3. ClassRoom Wall
4. Country CurrentPresident
5. Course TextBook
6. Item (that can
be found in an
order) Order
7. Student Class
8. Class Instructor
9. Instructor Office
10. E-bay Auction item E-bay bid

Answers

Solution :

ENTITY 1               CARDINALITY RATIO                                     ENTITY 2

1. Student                        1 to many                                     Social security card

                      A student may have more than one          

                     social security card (legally with the

                      same unique social security number),

                     and every social security number belongs

                   to a unique.

2. Student                   Many to Many                                    Teacher

                    Generally students are taught by many

                    teachers and a teacher teaches many students.

3.ClassRoom               Many to Many                                   Wall

                      Do not forget that the wall is usually

                      shared by adjacent rooms.

4. Country                 1 to 1                                             Current President

                       Assuming a normal country under normal

                       circumstances having one president at a

                      time.

5. Course               Many to Many                               TextBook

                        A course may have many textbooks and

                       text book may be prescribed for different

                      courses.

6. Item                             Many to Many                           Order

                        Assuming the same item can appear

                         in different orders.

7. Student                       Many to Many                          Class

                        One student may take several classes.

                        Every class usually has several students.

8. Class                                 Many to 1                             Instructor

                       Assuming that every class has a unique

                        instructor. In case instructors were allowed

                        to team teach, this will be many-many.

9. Instructor                  1 to 1                                             Office

                       Assuming every instructor has only one

                      office and it is not shared. In case of offices

                     shared by 2 instructors, the relationship

                    will be 2-1. Conversely, if any instructor has a joint

                    appointment and offices in both departments,

                    then the relationship will be 1-2. In a very general

                  case, it may be many-many.

10. E-bay Auction item             1-Many                           E-bay bid

                        1 item has many bids and a bid is unique

                        to an item.

Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing attacks.

Replying to an e-mail requesting your user ID and password Phishing victim Not a phishing victim

Answers

Answer:

Phishing Victim

Explanation:

Replying to this email could make you a victim of a phishing scam. Phishing attacks are common challenges on security that internet users are faced with. It could lead to others getting hold of sensitive information like your password or bank details. email is one way the hackers used to get this information. replying to such an email could lead one to an unsecure website where information could be extracted

vacuum tubes produced a large amount of

Answers

Answer: suck

Explanation:

sucktion    

Sophia is putting together a training manual for her new batch of employees.Which of the following features can she use to add a document title at the top of each page?
A) Heading style
B) Page margin
C) References
D) Header and Footer

Answers

Answer:

A heading style to add a document title

The feature can she use to add a document title at the top of each page is - Heading style. Therefore option A is the correct resposne.

What are Header and Footer?

A footer is a text that is positioned at the bottom of a page, whereas a header is text that is positioned at the top of a page. Usually, details about the document, such as the title, chapter heading, page numbers, and creation date, are inserted in these spaces.

A piece of the document that appears in the top margin is called the header, while a section that appears in the bottom margin is called the footer. Longer papers may be kept structured and made simpler to read by including more information in the headers and footers, such as page numbers, dates, author names, and footnotes. Each page of the paper will have the header or footer text you input.

To read more about Header and Footer, refer to - https://brainly.com/question/20998839

#SPJ2

How does OOP keep both code and data safe from outside interference and
incuse?

Answers

Answer:

it is the process that binds together the data and code into a single unit and keeps both from being safe from outside interference and misuse. In this process, the data is hidden from other classes and can be accessed only through the current class's methods

Definition of digital

Answers

Answer:

There are two definitions from

Explanation:

1.) (of signals or data) expressed as series of the digits 0 and 1, typically represented by values of a physical quantity such as voltage or magnetic polarization.

2.) (of a clock or watch) showing the time by means of displayed digits rather than hands or a pointer.

I'm not sure if you meant "Digit". But if you did it would mean numbers or the places where numbers would go.

Hope this helps! (If not so sorry)

Answer:

adjective

1.

(of signals or data) expressed as series of the digits 0 and 1, typically represented by values of a physical quantity such as voltage or magnetic polarization.

relating to, using, or storing data or information in the form of digital signals.

"digital TV"

involving or relating to the use of computer technology.

"the digital revolution"

The HEIGHT variable will be used to hold the index numbers of the rows in a multidimensional array. The WIDTH will be used to hold the index numbers of the columns. Which of the following completed for loop could fill that previously declared anArray multidimensional array with the value 0 in each position?(a) for (int n=0; n < HEIGHT; n++) { for (int m=0; m < WIDTH; m++) { int anArray[0][0]; }}(b) for (int n=0; n < HEIGHT; n++) { for (int m=0; m < WIDTH; m++) { } anArray[n][m] = 0; }(c) for (int n=0; n < WIDTH; n++) { for (int m=0; m < HEIGHT; m++) { int anArray[n][m] = { {0,0,0}{0,0,0}{0,0,0}{0,0,0|}{0,0,0}}; }}(d) for (int n=0; n < HEIGHT; n++) { for (int m=0; m < WIDTH; m++) { anArray[n][m] = 0; }}

Answers

Answer:

(d) for (int n=0; n < HEIGHT; n++) { for (int m=0; m < WIDTH; m++) { anArray[n][m] = 0; }}

Explanation:

Given

HEIGHT [tex]\to[/tex] rows

WIDTH [tex]\to[/tex] columns

Required

Fill the array with zeros

Assume the array has already been declared

First, we iterate through the rows; using:

for (int [tex]n=0[/tex]; [tex]n < HEIGHT[/tex]; [tex]n++[/tex]) {

Next, we iterate through the columns

for (int [tex]m=0[/tex]; [tex]m < WIDTH[/tex]; [tex]m++[/tex]) {

Then we fill the array with the iterating variables of rows and the columns

anArray[n][m]

Lastly, close the loops

}}

uuhdcnkhbbbbhbnbbbbnnnnnnnnnfddjkjfs

Answers

Answer:

The answer is "Option c"

Explanation:

In PHP to remove all the session variables, we use the session_destroy() function. It doesn't take any argument is required and then all sessions variables could be destroyed by a single call. If a particular clinical variable is now to be destroyed, the unset() function can be applied to unset a session variable. Its session doesn't unset or unset the session cookie by either of the local variables associated with it.

A recursive method may call other methods, including calling itself. Creating a recursive method can be accomplished in two steps. 1. Write the base case -- Every recursive method must have a case that returns a value or exits from the method without performing a recursive call. That case is called the base case. A programmer may write that part of the method first, and then lest. There may be multiple base cases.Complete the recursive method that returns the exponent of a given number. For e.g. given the number 5 and the exponent 3 (53) the method returns 125. Note: any number to the zero power is 1. Note: Do not code for the example. Your method must work for all given parameters! Use this as your method header: public static int raiseToPower(int base, int exponent)

Answers

Answer:

Explanation:

The following code is written in Java. It creates the raiseToPower method that takes in two int parameters. It then uses recursion to calculate the value of the first parameter raised to the power of the second parameter. Three test cases have been provided in the main method of the program and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       System.out.println("Base 5, Exponent 3: " + raiseToPower(5,3));

       System.out.println("Base 2, Exponent 7: " + raiseToPower(2,7));

       System.out.println("Base 5, Exponent 9: " + raiseToPower(5,9));

   }

   public static int raiseToPower(int base, int exponent) {

       if (exponent == 0) {

           return 1;

       } else if (exponent == 1) {

           return base;

       } else {

           return (base * raiseToPower(base, exponent-1));

       }

   }

 

}

fill in the blanks Pasaline could ----- and ------- very easily.​

Answers

Answer:

Hot you too friend's house and be safe and have a great time to take care of the following is not a characteristic it was a circle whose equation o

A pharmaceutical company is using blockchain to manage their supply chain. Some of their drugs must be stored at a lower temperature throughout transport so they installed RFID chips to record the temperature of the container.

Which other technology combined with blockchain would help the company in this situation?

Answers

Answer:

"Artificial Intelligence" would be the correct answer.

Explanation:

Artificial intelligence through its generic definition seems to be a topic that integrates or blends computer technology with sturdy databases to resolve issues.Perhaps it covers particular fields of mechanical acquisition including profound learning, which can sometimes be referred to together alongside artificial intellect.

Thus the above is the correct answer.

Which statement describes data-sharing in a blockchain?

Answers

Answer:

wheres the statement

Explanation:

The__________is an HTML tag that provides information on the keywords that represent the contents of a Web page.

Answers

Answer:

Meta tag

Explanation:

Other Questions
what are the rules in forming irregular nouns The owner of a golf course wants to determine if his golf course is more difficult than the one his friend owns. He has 8 golfers play a round of 18 holes on his golf course and records their scores. Later that week, he has the same 8 golfers play a round of golf on his friend's course and records their scores again. The average difference in the scores (treated as the scores on his course - the scores on his friend's course) is 9.582 and the standard deviation of the differences is 15.9274. Calculate a 90% confidence interval to estimate the average difference in scores between the two courses.1) (13.73,-0.65).2) (-10.359,-4.021).3) (-9.259,-5.121).4) (-13.745,-0.635).5) (13.745, -0.635). When the spacecraft is at the halfway point, how does the strength of the gravitional force on the spaceprobe by Earth compre with the strength If the volume of the gas is increased to 9.6 L , what will the pressure be? how do i answer this? One reason that Mendel chose garden peas for his experiments on heredity was because:A. pea plants are haploid organisms.B. peas are a popular vegetable.C. pea plants usually self-fertilize.D. peas have no recessive traits. A plaintiff has brought an action for personal injuries against a store, in connection with an incident in which he slipped and fell after the store's linoleum floors had been mopped. A major issue at trial is the degree of moisture that remained on the floor, because it had been mopped 45 minutes before the plaintiff walked on it. The store offers the testimony of an expert, who will testify about an experiment he conducted measuring the amount of time necessary for a linoleum floor to dry completely after having been mopped. Under what condition should the court admit this testimony A heel travels 850 miles in 28 gallons of gas. How many miles does it travel in one gallon of gas hElP mEh What integer does the arrow indicate?-9-14-36 sentences are true or false. i. Living together means knowing each others Amazon Corporation has preferred stock outstanding that pays a $11.45 annual dividend. It price is $147. What is the required rate of return (yield) on the preferred stock? Escoge la mejor respuesta, segn el contexto. Qu ___ en la television ahora? a. mires b. miraras c. ests mirando d. has mirado According to the text and classroom discussions, Victim Advocates are often self supported by writing their own grants. Group of answer choices True False TIME REMAINING49:02What is the value of h?The graph shows that f(x) = 3* is translated horizontallyand vertically to create the function g(x) = 3*- h + k.81%O-2O-1O 1O 2f(x)001)What is the answer to this photo Ron has a family history of high blood pressure. He has studied the causes, signs, and possible outcomes of the disease. What kind of strategy has he used to improve his health?A. He has found immediate and cumulative risks.B. He has set long-term and short-term goals.C. He has incorporated risk reduction into his life.D. He has increased his knowledge. If you are camping in a rural setting and look up at the night sky, it can appear as if ________. If you multiply 0.47 3.2, then what is the answer? 3( + 4) + 8 = 3solve proportional linear relationships can be represented in how many different forms Thirty years ago, the original owner of Greenacre, a lot contiguous to Blueacre, in fee simple, executed and delivered to his neighbor an instrument in writing which was denominated "Deed of Conveyance." In pertinent part it read, "[The owner] does grant to [the neighbor] and her heirs and assigns a right-of-way for egress and ingress to Blueacre." If the quoted provision was sufficient to create an interest in land, the instrument met all other requirements for a valid grant. The neighbor held record title in fee simple to Blueacre, which adjoined Greenacre. Twelve years ago the owner's son succeeded to the original owner's title in fee simple in Greenacre and seven years ago the neighbor's daughter succeeded to the neighbor's title in fee simple to Blueacre by a deed which made no mention of a right-of-way or driveway. At the time the neighbor's daughter took title, there existed a driveway across Greenacre which showed evidence that it had been used regularly to travel between the main road and Blueacre. Blueacre did have frontage on a side road, but this means of access was seldom used because it was not as convenient to the dwelling situated on Blueacre as was the main road. The driveway originally was established by the neighbor. The neighbor's daughter has regularly used the driveway since acquiring title. The period of time required to acquire rights by prescription in the jurisdiction is ten years. Six months ago the son notified the neighbor's daughter that the son planned to develop a portion of Greenacre as a residential subdivision and that the daughter should cease any use of the driveway. After some negotiations, the son offered to permit the daughter to construct another driveway to connect with the streets of the proposed subdivision. The daughter declined this offer on the ground that travel from Blueacre to the main road would be more circuitous. The neighbor's daughter brought an appropriate action against the son to obtain a definitive adjudication of the respective rights of the daughter and the son. In such lawsuit the son relied upon the defense that the location of the easement created by the grant from the original owner to the neighbor was governed by reasonableness and that the son's proposed solution was reasonable.The son's defense should:____________