Why are you hesitant to commit

Assignment Help Computer Engineering
Reference no: EM13699439

Question: In an accident, the Ohio phonebook has gotten mixed up. The names are now really out of order. You and your enthusiastic, but naive, assistant Carl must fix the problem. No one can use the phonebook while you are sorting it, so every extra second of sorting time will cost the city billions in economic damage.

Carl has implemented two programs, P1 and P2. Both will do the job correctly. You must decide which one will be faster.

Part a: Carl picks 20 random names and finds that P1 sorts them faster than P2. "We're using P1!" exclaims Carl. Why are you hesitant to commit?

Part b: Trying to please you, Carl is now sorting 10,000 names with each program. (a) If P1 is still faster on this larger set, will you then agree it will be faster on the whole million-name phonebook? (b) What if P2 is now faster - does that mean P2 is the best choice for the whole phone book? Explain.

Part c: Your computer explodes and Carl puts together a new one from spare parts. The new computer is much faster at arithmetic, but is slower at reading and writing to the disk. Might this affect which program you should use? Discuss.

Part d: In deciding which program to use, is it safer to run lots of tests or read the source code? Or should you do both? Explain.

Solve these questions in details and provide examples to support your rationale.

Reference no: EM13699439

Questions Cloud

Use oracle, list all system privileges assigned to user hr : Use Oracle, list ALL system privileges assigned to user HR. Please show screen shot if you can make it!
Describe all system privileges found in sql server : Describe all system privileges found in SQL Server
Write summary on measuring reliability of software products : Write a summary on "Measuring Reliability of Software Products" and write three interesting points about the paper, You will, for example, point out strengths, point out weaknesses, compare with other approaches and also questions you have about t..
Create an application for kochs cottages : Create an application for Koch's Cottages, a weekend getaway resort that rents boats and cottages to use on the local lake.
Why are you hesitant to commit : Carl picks 20 random names and finds that P1 sorts them faster than P2. "We're using P1!" exclaims Carl. Why are you hesitant to commit?
Create an application with a jframe : Create an application with a JFrame that holds five labels describing reasons that acustomer might not buy your product (for instance, "Too expensive").
Write a java program that computes and prints the value : Write a Java program that computes and prints the value of 6!/5! using Scanner.
Calculate the volume by formula : Write program in C++ : - write a class VolumeOfBox that calculate the volume by this formula : length * breadth * height this class has three data member ,and the member function which calculates the volume and print the result by using pointer to..
Need to prepare a c++ program of class swap : Class Swap contains tow data members num1 , num2 and member function swapping ,the aim of this function is swapping num1 and num2 values , swapping should done by using pointer , i.e. if num1= 20 and num2 =5 they become : num1= 5 and num2=20.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Could an until loop sometimes never execute

could an until loop sometimes never execute.

  Different access methods like ofdma sdma tdma cdma and fdma

different access methods such as ofdma sdma tdma cdma and fdma rely on cross-layer optimization to different degrees.

  How to allocate for the management reserve

How much would you allocate for the management reserve? What are your assumptions about these reserves.

  How can be secure mail infrastructure using identities

How can be secure mail infrastructure using identities.What may be a new approach to secure mail infrastructure?

  A painter is standing on a work platform that is 27 feet

a painter is standing on a work platform that is 27 feet above ground level. for fall protection the workers safety

  Demonstrate that this mac scheme is not secure

Demonstrate that this MAC scheme is not secure for variable length messages - Write pseudocode for an algorithm, F, that, given a tagging oracle

  Findout which one is false statement

Findout which one is false statement.

  Questionconsider an adt called squarematrix the matrix can

questionconsider an adt called squarematrix. the matrix can be represented by a two-dimensional array of integers with

  Develop a checkout lane simulation

Develop a checkout lane simulation that can be used to determine the optimal number of lanes that Cougar Mart should have open.

  Why lexical analysis is separated from syntax analysis

What do you mean by the term aliasing mean?why Lexical analysis is separated from syntax analysis.

  Questionwrite down a program visual basic format that has a

questionwrite down a program visual basic format that has a key form with following attributes-a main form with these

  Use an appropriate parameter passing mechanism

Use an appropriate parameter passing mechanism. Your function will not do any cin or cout. Do not write a main function. Make sure to properly format all your code.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd