Premium Essay

Nt1330 Unit 5 Lab Report

Submitted By
Words 1300
Pages 6
6.1 ALGORITHM

STEP 1:-

Start

STEP 2:-

Load a file or write a c++ code in text editor.

Select file Using (OpenFileDialog op = new OpenFileDialog () ;)
If (C++ File EXIST)
{
LOAD FILE IN TEXT EDITOR(c++ file);
}

STEP 3

Setting up each line in SFC Table.

If (Text Editor != "")
{
Add rows in SFC table (LENGTH OF TOTAL NO. LINES);
For (int i = 0; i < LENGTH OF TOTAL NO. LINES; i++)
{
{
ROW OF SFC TABLE[i].CELLS OF SFC TABLE [0].Value = i + 1;
ROWS OF SFC TABLE[i].CELLS OF SFC TABLE [1].Value = TOTAL LINES OF TEXT EDITOR[i];
}
}
Else
{
SHOW MSG ("First load/write or select an algorithm.", "Text editor is empty");
}

STEP 4

Each line will then be checked and according to its syntax, a primitive steps, frequency (min and max) and count …show more content…
Best case, Average case and Worst case will show the efficiency of algorithm of sorted array, unsorted array and array in descending order.

7. Summary will provide the result of overall testing.

6.3 COMPLEXITY

6.3.1 WORST CASE

1 + 1 + 1 + 1 + N + N + 1 + N + N + 5N + N + N + 5N + N + N + 5N + N + N + 6N + N + N + N + N + N + N + N + N + N + N + N + N + N + N + N + 1

Worst Case = 6 + 46N

6.3.2 BEST CASE

1 + 1 + 0 + 0 + 0 + 0 + 0 + N + N + 0 + N + N + 0 + N + N + 0 + 0 + N + 0 + N + N + 0 + N + N + 0 + N + N + 0 + N + N + 0 + N + N + 0 + 1

Best Case = 3 + 17N

6.3.3 ANALYSIS OF ALGORITHMS W.R.T. DISTINCTION

There are three types of cases to represents the complexity of “Complexity Analyzer”.
• Best Case
• Worst Case
• Average Case
6.3.3.1 BEST CASE

There are inputs considered in which the maturities are minimal. The running time in worst case is a lower bound on the running time. Basically in the Best-case defines the lower bound on running time of an algorithm. We need to know about the case that causes smallest number of actions to be implemented. The best-case analysis is rarely performed.

Best Case is equal to the first element in the array is searched  Number of comparisons is V (n) = 1

FOR

Similar Documents

Premium Essay

Test

...Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure...

Words: 2305 - Pages: 10