answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
2 years ago
12

Prove that f(n) = 20n3 + 10nlogn + 5 is O(n3)

Computers and Technology
1 answer:
sp2606 [1]2 years ago
7 0

Answer:

The proof is in the explanation

Explanation:

f(n) is O(n^{3}) if f(n) \leq cn^{3} for n \geq n_{0}.

So, basically, we have to solve the following inequality

f(n) \leq cn^{3}

20n^{3} + 10n\log{n} + 5 \leq cn^{3}

Dividing everything by n^{3} to simplify, we have

20 + \frac{10\log{n}}{n^{2}} + \frac{5}{n^{3}} \leq cn^{3}

I am going to use n = n_{0} = 1. So

20 + 5 \leq c

c \geq 25

There is a solution for the inequality, which proves that f(n) = 20n^{3} + 10n\log{n} + 5 is O(n^{3})

You might be interested in
A(n) _____ can be used to reveal a competitor’s program code, which can then be used to develop a new program that either duplic
Luden [163]
<span>The answer to the above question is a decompiler would be used for that application. Decompilers use executable file as input. They then create a source code that can be recompiled and put back together fairly easily. Due to a decompilers ability to break down original code, that original code can then be used to either duplicate the program, or re-engineer a program that would work in concert with the original program.</span>
5 0
2 years ago
This exercise shows why each pivot (in eli1nination by pivoting) must be in a different row. (a) In Example 7, make the third pi
Darya [45]

Answer:gghggggggggggggg

Explanation:

8 0
2 years ago
What kinds of unstructured data or big data might the BITS corporation want to gather in the future? What kind of devices might
charle [14.2K]

Answer:

Explanation:

There many commercial documents or formats to store like image, video, photos, audio file, web page, PDF, presentations, and we can use some tools to store this commercial data, for example, excel, microsoft access, mysql, sql, mongo db, and any tool to manage, store in our data with some structures and big data.

7 0
2 years ago
The attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the v
Sergeeva-Olga [200]

Answer:

TEARDROP

Explanation:

Teardrop is a form of attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the victim may be tricked into sending messages to and from itself .

Teardrop attack also involves sending fragmented packets to a target machine in which the victim is been tricked into sending messages to and from itself. One of the fields in an IP header is the “fragment offset” field, indicating the starting position of the data contained in a fragmented packet relative to the data in the original packet.

7 0
2 years ago
XYZ Corp.’s facilities in Nashua, New Hampshire, are two office buildings 400 feet apart, each with its own LAN. To connect the
damaskus [11]

Answer:

a: Twisted pair won't span a 400-foot distance.

Explanation:

The maximum distance that twisted pair cables can support without attenuation is 100 meters which is approximately 328 feet and the two office buildings are 400 feet apart, so it is useless to install a twisted pair cable for such a large distance. A much better option would be to install optic fiber. Though it is a bit expensive but it is the best option in this case.

Hence option (a) is the correct reason for installing an optic fiber cable rather than a twisted pair cable.

6 0
2 years ago
Other questions:
  • Steps in creating a folder
    12·1 answer
  • Column A contains numbers from rows 1-20. You can use the formula ----?---- to find the value of the largest number divided by t
    13·1 answer
  • Who are the founders of video-sharing site Dailymotion?
    7·1 answer
  • Julie is working on a spreadsheet with data about the company's profits. They will be sharing this data with customers. She chec
    6·2 answers
  • Which item is essential to know before sketching a navigation menu flowchart? template specifics, such as horizontal or vertical
    12·1 answer
  • What three requirements are defined by the protocols used in network communications to allow message transmission across a netwo
    11·1 answer
  • (1) Output a menu of automotive services and the corresponding cost of each service. (2 pts) Ex: Davy's auto shop services Oil c
    15·1 answer
  • (Package Inheritance Hierarchy) Package-delivery services, such as FedEx®, DHL® and UPS®, offer a number of different shipping o
    10·1 answer
  • Quantum units of information deploy the properties of entanglement and ____ to offer exponentially greater computing power.
    9·1 answer
  • In this question, you will experimentally verify the sensitivity of using a precise Pi to the accuracy of computing area. You ne
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!