True or False? O(1) is called constant time.

Answers

Answer 1

Answer:

True

Explanation:

The notation O(n), pronounced big-O of n is an indication of the complexity of an algorithm. It is an indication of the relationship between the processing time and size of input

So O(n) means the time - input relationship is linear. If it takes x time units to process an input of size y then it will take 5x units to process an input of size 5y

O(1) means the time to process is independent of size. It is always constant. For example in computer algorithms, the time to access a value in an array of values is independent of the size of the array because arrays are indexed and access time for any element of the array is the same

O(n²) means that the time taken varies as the square of the input size

and so on

Answer 2
Your mom cuz it’s your mom

Related Questions

What is the full meaning of FORTRAN​

Answers

Answer:

FORTRAN in full is "Formula Translation"

Explanation:

Its a computer programming language created in 1957 by John Backus that shortened the process of programming and made computer programming more accessible

are all counting and calculations done in the system unit

Answers

The ALU (Arithmetic Logic Unit), located in the system unit, is the component of the computer utilized for calculations and comparisons.

Describe ALU.

Arithmetic-logic unit (ALU) definition Arithmetic and logic operations are performed on the operands in computing instruction words by an arithmetic-logic unit, a component of a central processing unit. Some processors separate the ALU into an arithmetic logic unit (AU) and an arithmetic logic (LU).

What are the primary purposes of an ALU?

Simple multiplication, division, addition, subtraction, addition, and logic operations like OR and AND are all performed by the ALU. The data and instructions for the program are stored in memory. Data and instructions are retrieved by the control unit from memory.

TO know more about Arithmetic Logic Unit visit:

https://brainly.com/question/14247175

#SPJ10

Boolean Algebra
Simplify AB'(D'+C'D)+B(A+A'CD) and show all work.

Answers

Answer: B details to simplify A'B(D' + C'D) + B(A + A'CD) start with ( D' +C'D) = (D' + C') likewise (A + A'CD) = (A + CD) This gives A'B(D' + C') + B(A + CD)= ...

4 answers

·

1 vote:

[math]A'B (D'+C'D) + B (A+ A'CD)[/math] [math]= A'B (D'+D)(D'+C') + B (A+ A')(

Explanation:

what do we generally avoid in a many-to-many junction table?
a. two foreign keys
b. an auto increment primary key column
c. data items specific to the many-to-many relationship
d. a logical key

Answers

Not An AUTOINCREMENT primary key column, Data items specific to the many-to-many relationship. When numerous records in one table are linked to several records in another table, this is known as a many-to-many relationship.

What is many to many junction?

When numerous records in one table are linked to several records in another table, this is known as a many-to-many relationship.

The simplest method is to utilize a Junction Table when you need to create a many-to-many link between two or more tables. By referring to the main keys of each data table, a junction table in a database, also known as a bridge table or associative table, connects the databases.

A many-to-many relationship, or type of cardinality, is used in systems analysis to describe the relationship between two entities, such as A and B, where A may have a parent instance for whom there are many offspring in B and vice versa.

To learn more about Many to many junction refer to:

https://brainly.com/question/24092195

#SPJ13

Which of the following is the correct binary representation of the number 2?

Answers

Answer:

10 i think

Explanation:

The control lines in the bus connect the control unit to the CPU.

True
Or False

Answers

Answer:

true

Explanation:

The control bus contains a control line for writing instructions and a control line for reading instructions. When the CPU writes data to the main memory, it transmits a signal to the write command line. The CPU also sends a signal to the read command line when it needs to read.

if you want to assign a user the permission to create schema and run ALTER or any user, what role should you assign to that user?
A. dp_backupoperator
B. db_accessadmin
C. db_securityadmin
D. db_datawriter

Answers

As a database administrator, if you want to assign a user the permission to create schema and run ALTER or any user, the role should you assign to that user is "db_accessadmin" (Option B)

What does it mean to run ALTER?

In SQL, the ALTER command is used to modify a table, view, or the whole database. The ALTER command in SQL allows us to add, change, and delete constraints, columns, and indexes.

It is to be noted that SQL is a computer language developed for managing data in a relational database management system or for stream processing in a relational database management system.

Learn more about database administrator:
https://brainly.com/question/13040754
#SPJ1

If you use a pen down block to instruct a sprite to go to random position and then move 100, what happens? A. The sprite teleports randomly and creates a single line 100 units long. B. The sprite creates a 100-unit line between its starting point and a random location. C. The sprite draws a line to a random position, then creates another line 100 units long. D. The program does not run because these commands can’t be combined.

Answers

Answer:

C

Explanation:

The sprite draws a line to a random position, then creates another line 100 units long

how do you fill different data into different cells at a time in Excel

Answers

The way that you fill different data into different cells at a time in Excel are:

Click on one or a lot of cells that you want to make use of as the basis that is needed for filling additional cells. For a set such as 1, 2, 3, 4, 5..., make sure to type 1 and 2 into the 1st two cells. Then pull the fill handle .If required, select Auto Fill Options. and select the option you want.

How do you make a group of cells auto-fill?

The first thing to do is to place the mouse pointer over the cell's bottom right corner and hold it there until a black + symbol appears. Drag the + symbol over the cells you wish to fill in while clicking and holding down the left mouse button. Additionally, the AutoFill tool rightly fills up the series for you.

Note that  Excel data entering  can be automated and this can be done by: On the Data tab, select "Data Validation," then click "Data Validation." In the Allow box, select "List." Enter your list items in the Source box, separating them with commas. To add the list, click "OK." If you wish to copy the list along the column, use the Fill Handle.

Learn more about Excel from

https://brainly.com/question/25879801
#SPJ1

what does syntax error mean :-;
explain briefly.

thankyou!

Answers

A syntax error is an error in the syntax of a sequence of characters or tokens that is intended to be written in a particular programming language. For compiled languages, syntax errors are detected at compile-time. A program will not compile until all syntax errors are corrected.

This is rigged. I think I'm gonna faint.

Answers

The primary characteristics of the given devices are:

A mouse is a(n) input device.

A printer is a(n) output device.

What is a device?

A device is a piece of hardware or equipment in a computer system that performs computing functions. A device is a physical piece of hardware or software that performs one or even more computing functions within a computer system. It can either provide input to the computer or accept output from it. A device is any electronic element that has some computing capability and can install firmware or third-party software. Devices include your computer's speakers, disc drive, printer, microphone, modem, and mouse. They can all be replaced or installed separately.

To learn more about device

https://brainly.com/question/27013190

#SPJ13

Answer:

The answers are input and output, respectively.

Explanation:

you have a 10vdg source available design a voltage divider ciruit that has 2 vdc , 5vdc , and 8 vdc available the total circuit current is to be 2mA

Answers

If you try to divide 10V in three voltages, the sum of the three voltages must be equal to the total voltage source, in this case 10V. Having said this, 2 + 5 + 8 = 15V, and your source is only 10V. So you can see is not feasible. You can, for example, have 2V, 5V and 3V, and the sum is equal to 10V. Before designing the circuit, i.e, choosing the resistors, you need to understand this. Otherwise, I suggest you to review the voltage divider theory.

For instance, see IMG2 in my previous post. If we were to design a single voltage divider for the 5VDC, i.e, 50% of the 10V source, you generally choose R1 = R2., and that would be the design equation.

Codehs 4.1.8 Using the Point Class​

Answers

Using the knowledge of the computational language in JAVA it is possible to write that Using the Point Class​  to described the correct code.

Writting the code:

{

 public static void main(String[] args)

 {

   extractDigits(2938724);

 }

 public static void extractDigits(int num)

 {

   int digit;

   while( num > 0 )

   {

     digit = num % 10;

     num = num / 10;

     System.out.println(digit);

   }

 }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Answer:

Explanation:

public class Point

{

   private int x;

   private int y;

   

   public Point(int xCoord, int yCoord)

   {

       x = xCoord;

       y = yCoord;

   }

   

   public void move(int dx, int dy)

   {

       x += dx;

       y += dy;

   }

   

   public String toString()

   {

       return x + ", " + y;

   }

}

The programmer wants to change this code so that a third background image appears when the player presses the “B” button. What does the programmer need to do?

Answers

Answer:

i think its B but im not sure

Explanation:

Know the tags to be used for each style or format.​

Answers

Answer:

1. Bold                           <b                    /b>

2. Strong                      <strong    /strong>

3. Italic                          < i              /i >

4. Emphasized             <em           /em>

5. Superscript              <sup         /sup>

6. Subscript                 <sub        /sub>

Explanation:

1. What operating system are you using on your computer?

Answers

Answer:

Windows

Explanation:

Flexible and convenient

Real estate management software

Answers

Answer:

nTireFM

Explanation:

is a comprehensive system for real estate vendors with unique and reliable needs. Real Estate Management Software simplifies your life as a real estate investor monitors the financial performance of each rental property

how adobe photoshop can improve productivity of a organization

Answers

Adobe photoshop allows the process of editing an image to go by much quickly. Instead of taking days, it could take a few hours instead with adobe photoshop

2. Mr. Motladiile is an innovative businessman who came up with an idea of creating a system that can generate electricity using magnets, and he teamed up with Mr. Tangeni who is the sole engineer of the system. Due to finances the project halted, however Mr. Tangeni felt that he was under paid despite the effort he has put leading the project, he then thought of creating the system and sell it to the highest bidder.
a) Explain the protection that Mr. Motladiile can put in place to prevent reproduction of the design and for how long will it last

Answers

Answer:I DONT THE ANSER PLEASE HELP ME

Explanation:PLEASE

to create a public key signature, use the ______ key.

Answers

Private Key is the correct solution to the problem.  To create a public key signature, you would use the Private key. When you have an SSH key, you must also have the public key in order to set up SSH passwordless login with SSH-key. However, if you have lost the public key but still have the private key, you can regenerate the key.

What is a public key signature?

It is a cryptographic key that is associated with a private key and is used with an asymmetric (public key) cryptographic algorithm. The public key is linked to a user and can be made public. When it comes to digital signatures, the public key is used to validate a digital signature signed with the corresponding private key.

In Layman's Terms, A Public Key Signature (PKI Digital Signature) is the modern equivalent of a wax seal that people historically would use to secure sensitive communications.

What is Private Key?

A private key, like a password, is a secret number used in cryptography. Private keys are also used in cryptocurrency to sign transactions and prove ownership of a blockchain address.

A private key is an essential component of bitcoin and altcoins, and its security features aid in preventing theft and unauthorized access to funds.

To know more about public key signature, visit: https://brainly.com/question/18560219

#SPJ4

Which of these statements about Active Directory (AD) are true? Check all that apply.
a. AD includes a tool called the Active Directory Authentication Center, or ADAC.
b. AD is incompatible with Linux, OS X, and other non-Windows hosts.
c. AD can ""speak"" LDAP.
d. AD is used as a central repository of group policy objects, or GPOs.

Answers

All of the statements about Active Directory (AD) that are true include the following:

c. AD can ""speak"" LDAP.

d. AD is used as a central repository of group policy objects, or GPOs.

What is Group Policy Object?

Group Policy Object can be defined as a set of Group Policy settings of the Microsoft Windows NT operating systems that is designed and developed to define what a computer system should look like.

Additionally, Group Policy Object (GPO) controls and sorts all of the end user and computer account features and working environment in general. In order to sort a computer system into a group, it is very essential and important that you set a group sorting criteria, so as to sort systems by IP Address.

In conclusion, Active Directory (AD) can manage Lightweight Directory Access Protocol (LDAP) and it is generally used by network administrators and engineers as a central repository of group policy objects (GPOs).

Read more on Active Directory here: brainly.com/question/28900362

#SPJ1

Distinguish between composition and inheritance.

Answers

Answer:

compotsition: The combining of distinct parts or elements to form a whole

Inheritance: The action of inheriting something

Explanation:

Edil wants to create a document by typing in a few paragraphs of text into his computer. He needs to use a pointing device to click the appropriate
buttons to run the text editor.He also needs to see what he is typing. Which three peripherals will Edil need to perform this task?
keyboard
joystick
speaker
mouse
monitor

Answers

A monitor is a screen that is used, for instance, in airports or television studios, to show specific types of information. He was observing a tennis match on a television screen. Screen, visual display unit, and VDU More alternatives to monitor

Explain about the monitor?

A computer system can be monitored to ensure proactive response, data protection, data collection, and overall system health. Although monitoring doesn't solve issues, it does make computers more dependable and stable.

A computer monitor is a display adapter that shows data from the video card of the computer. Images are displayed on the directly attached monitor after binary data, which consists of 1s and 0s, is converted into images by a video card or graphics card.

The most popular sort of monitor you can find right now, along with LED, is LCD. In order to organize the liquid between the two glass panes that make up an LCD monitor, hundreds of rows of pixels are used.

Monitor helps us to see what we are typing.

To learn more about monitor refer to:

https://brainly.com/question/3927906

#SPJ1

Write a function that uses recursion to raise a number to a power. The function should accept two arguments: the number to be raised and the exponent. Assume that the exponent is a nonnegative integer. Demonstrate the function in a program.

IN C PROGRAM

Answers

Answer:

/*

Program to computea number raised to a power using recursion

base = number and exp is the power to which the number is raised

*/

#include <stdio.h>

int power(int base, int exp);  

int main(){

   int base, exp;

   

   printf("Enter base: ");

   scanf("%d", &base);

   

   printf("Enter exponent: ");

   scanf("%d", &exp);    

   

   

   long result = power(base,exp);  //function call

   printf("%d raised to the power %d = %ld\n", base, exp, result);

   

   return 0;

}

int power(int base, int exp){

   //2 base cases

   // if exp = 0, return 1

   if (exp == 0){

       return 1;

   }

   

   //if exp  1, return base

   if ( exp == 1){

       return base;

   }   //base case when expnent is 0

   

   //otherwise return base * base to the power exp-1

   return  base * power(base, exp-1 );

}

Explanation:

And one well written paragraph, explain how you can put raw data into excel and turn it into something useful that could be used in different Microsoft office applications.

Answers

The way that you can put raw data into excel and turn it into something useful that could be used in different Microsoft office applications are:

Open the Excel file into which the data is to be imported.Now, select the Data tab on the ribbon.Select  the Get Data option. Select From File > From Text/CSV.Through the use of the explorer, Select a CSV file. Lastly, Select the Load button.

What is excel about?

Excel is said to often used to save, analyze, a well as report on large volume of data.

Note that It is often used as a tool by accounting teams for the recording of financial analysis, as well as been used by professional to manage a list of and unwieldy form of datasets. Examples of Excel applications are balance sheets, budgets, etc.

Learn more about Microsoft office applications from

https://brainly.com/question/15131211
#SPJ1

Given the string, s, and the list, lst, associate the variable contains with True if every string in lst appears in s (and False otherwise). Thus, given the string Hello world and the list ["H", "wor", "o w"], contains would be associated with True.

Answers

In this exercise we have to use the knowledge of computational language in python  to write a code that the string, s, and the list, lst, associate the variable contains with True if every string in lst appears in s (and False otherwise)

Writting the code:

lst = ["H", "wor", "o w"]

s = "Hello world"

contains = True

for e in lst:

if not e in s:

contains = False

break

print(contains)

We used the print() function to output a line of text. The phrase “Hello, World!” is a string, and a string is a sequence of characters. Even a single character is considered a string.

See more about python at brainly.com/question/18502436

#SPJ1

When collecting and sharing information, the company must meet all _________________________ for the type of data being collected.
A US laws
B State Laws
C Federal Laws
D Federal or State Laws

Answers

Answer: D Federal and State Laws

Explanation: U.S. Privacy Act of 1974-this act established rules and regulations regarding U.S. government agencies collection, use, and disclosure of personal information.

The Federal Trade Commission govern the collection, use, and disclosure of personal data.

HIPPA- Health Insurance Portability and Accountability provide healthcare and health insurance protection

Answer: D

Explanation:

Witch of the following are true of email communications when compared to
Phone or face to face communications

Answers

The statements which are true of e-mail communications when compared to phone or face-to-face communications is that communications via e-mail are:

more difficult to determine tone or inflection.easily shared.absent of visual cues.

What is communication?

Communication can be defined as a strategic process which involves the transfer of information (messages) from one person (sender) to another (recipient or receiver), especially through the use of semiotics, symbols, signs and network channel.

What is an e-mail?

An e-mail is an abbreviation for electronic mail and it can be defined as a software application (program) that is designed and developed to enable users exchange (send and receive) both texts and multimedia messages (electronic messages) over the Internet.

In this context, we can reasonably infer and logically deduce that in an electronic mail (e-mail) it would be more difficult to determine a person's tone or inflection in comparison with phone or face-to-face communications.

Read more on e-mail here: brainly.com/question/15291965

#SPJ1

Complete Question:

Which of the following are true of e-mail communications when compared to phone or face-to-face communications?

Communications via e-mail are _____.

absent of visual cues

more precise and accurate

limited in efficiency

less likely to be saved

easily shared

more difficult to determine tone or inflection

COPPA regulates personal information that companies can use. Which users does this law protect?

Answers

COPPA is required by law to protect children under the age of 13 years, from having their personal information used by companies.

What is a PII?

PII is an abbreviation for personally identifiable information and it can be defined as any type of information that can be used by individuals or companies on its own or with other relevant data, so as to identify an individual.

In the United States of America, Children's Online Privacy Protection Act (COPPA) is required by law to protect all American children who are under the age of 13 years, from having their personally identifiable information (PII) being used by business organizations (companies).

Read more on COPPA here: https://brainly.com/question/15608567

#SPJ1

Complete Question:

COPPA regulates personal information that companies can use. Which users does this law protect? COPPA protects children under the age of ________ from having their personal information used by companies.

what are the activities usually performed in database operations

Answers

Answer:

The most frequently available operators include PROJECT, JOIN and SELECT. SQL includes DDL (Data Description Language)

Explanation:

Other Questions
If you have the ability to go to the bathroom on your own.....why in the world would you do that in your bed?(this is a real question my teacher asked me...for physics...how should I answer?) [1]My son ......... study mathematics at school next year so that he can join the faculty of engineering.A-needB-has toC-needn'tD-needn't have[2]We... .a family party on Saturday. Would you like to come?A-have B-are havingC-will haveD-are going to have[3]Last year, the farm.. was more than we had expected.A-product B-produced C-productiveD-production[4]The weather report-says it.....cloudy all day.A-will be B-going to beC-isD-is being[5]The woman was ...... blood and rushed to the hospital.A-cough B-coughing up C-coughingD-cough up[6]I won't be able to talk to you all the day tomorrow because I......my homework.A-would be doing B-would do C-will be doing D-may do[7] Her father won't let her leave the room until she..A-will apologiseB-would apologise C-apologisesD-have apologised[8]If you are too tired to cut the grass, I. it for you.A-will cutB-am going to cut C-cutD-am cutting[9]In my opinion, the population of Egypt.. by 20% next yearA-is increasingB-has increasedC-is going to increase D-will increase Fill in the blanks on machines efficiency Efficiency = ____________ energy _________ / ____________ energy ______________ what would be the best pseudocode for an algorithm to do the following? it reads an even number of characters then prints the first character, third character, fifth character, and so on. on a second output line, it prints the second character, fourth character, sixth character, and so on. use two queues to store the characters. Does our data provide enough evidence to prove that New York police are racially biased (in terms of use of force)? Why or why not? Market researchers often report discretionary income. Discretionary income is your disposable income minus your fixed expenses. Your disposable income is $2,920. After you pay fixed expenses of rent, utilities, groceries, and a car payment, you have $900. What percentage of your disposable income is discretionary?. List, one way, the middleKingdom in the old Kingdom werealike, and one way they weredifferent ANSWER QUICK I WILL GIVE BRAINLIEST!Which expression is equivalent to 3(2.4s 3.8)? 7.2s 11.4 7.2s 3.8 0.6s 11.4 0.6s 3.8 Given an industry is producing the socially efficient output level, a tax placed on the industry will result in inefficiency because the market will produce. What is one reason the United States could not pay its debts under the Articles of Confederation?The articles limited the type of taxes the central government could collect.The articles gave the central government no power to collect taxes.The articles required the central government to give tax money to the states.The articles weakened the power of state governments to collect taxes.HELP I HAVE 3 MINIUTES TO TURN THIS IN!!!!!!!!!!!!! What type of cell is illustrated here? In a concise way. Explain what practice/ practices that shows generation gap that the father observed now a days compared during the time he used to be. (Paragraph 1-6 only)Need ko na po ito please hindi ako nagbibiro Solve (2x + 5) 7 = 0 using extracting the square root. The price of fuel may increase due to demand and decrease due to overproduction. Marco is studying the change in the price of two types of fuel, A and B, over time.The price f(x), in dollars, of fuel A after x months is represented by the function below:f(x) = 2.15(0.98)xPart A: Is the price of fuel A increasing or decreasing and by what percentage per month? Justify your answer. (5 points)Part B: The table below shows the price g(m), in dollars, of fuel B after m months:m (number of months) 1 2 3 4g(m) (price in dollars) 4.19 3.98 3.78 3.59 Which relation IS a function? why did England need money? where did they turn to in order to get it? Fin tends to exaggerate. He says if he stacked all the quarters he's ever spent on gumball machines, they would reach to the moon. The distance to the moon is about [tex]3.85 \times {10}^{8} [/tex]m and the width of a quarter is about[tex]1.75 \times {10}^{ - 3} [/tex]m. If Fin's claim were true, how many quarters has he spent on gumball machines? A manufacturer knows that their items have a normally distributed lifespan, with a mean of 13.3 years, and standard deviation of 1.1 years.If you randomly purchase one item, what is the probability it will last longer than 10 years?Use the normal table and round answer to four decimal places A local restaurant serves breakfast. They use 124 cups of pancake mix every hour. It takes 1/4 cups of mix to make one pancake. The pancakes are all equal in size.About how many pancakes can the restaurant make in two hours? The temperature in the morning was 2 F. The temperature in the evening was 9 F higher than it was in the morning. What was the temperature in the evening?