Consider the two extreme cases of how we could distribute
m
accesses across
n
elements.