An algorithm that requires __________ operations to complete its task on n data elements is said to have linear runtime.

a. n 3 + 9
b. 3 n 2 + 3 n + 2
c. 2 n + 1
d. 6


c. 2 n + 1

Computer Science & Information Technology

You might also like to view...

____ refers to general or company-wide recognition of the existence of a security requirement or concept.

A. Attention B. Awareness C. Accountability D. Training

Computer Science & Information Technology

Which of the following can be used to protect the confidentiality of information?

A) Encryption B) Auditing C) Backups D) Network server redundancy

Computer Science & Information Technology

Which of the following traversals visits the root before visiting the left and right subtrees?

a) Preorder b) Inorder c) Postorder d) Level-order e) none of the above

Computer Science & Information Technology

The default name of a Web site's home page is usually default.html or ________

A) main.html B) web.html C) index.html D) home.html

Computer Science & Information Technology