Consider the two extreme cases of how we could distribute m accesses across n elements.