1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
3 years ago
9

Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and

then dequeue 2 elements. Which indices of the internal array elements hold the remaining elements
Computers and Technology
1 answer:
ASHA 777 [7]3 years ago
3 0

The indices of the internal array elements that hold the remaining elements is c) 2 to 4

<h3>Calculations and Parameters:</h3>

For us to create a capacity of 10 for the queue, we would enqueue:

We would create a queue of capacity 10:

<h3>Queue q(10);</h3>

We add elements/enqueue 5 elements to the queue :

  • q.queueEnqueue(10);
  • q.queueEnqueue(5);
  • q.queueEnqueue(8);
  • q.queueEnqueue(9);
  • q.queueEnqueue(2);

Printing this would give:

q. queueDisplay()

10, 5, 8, 9, 2

Next, we would remove elements/dequeue 2 elements from the queue :

q. queuedequeue();

q. queuedequeue();

Printing it would be:

q. queueDisplay()

8 ,9, 2

Observing this, the deletion/dequeue starts from the front/first index.

The remaining indices of the internal array elements are: 2, 3, 4 or 2 to 4

Read more about arrays and enqueue here:

brainly.com/question/24188935

#SPJ1

You might be interested in
_________ is a business strategy in which a company purchases its upstream suppliers to ensure that its essential supplies are a
Korvikt [17]

Answer:

Vertical Integration

Explanation:

Vertical Integration is a business strategy in which a company purchases its upstream suppliers to ensure that its essential supplies are available as soon as the company needs them.  This enables the business to exercise higher control over supply related uncertainties and to optimize supplies based on changing demand or business priorities.

An example can be a textile manufacturer purchasing a dye manufacturing unit.

4 0
4 years ago
Why does my Office Computer send packet #1? What device responds by sending back packet #2? What information does my Office Comp
AleksandrR [38]

Answer:

The office computer is part of a network.

The server responds with a packet when a request packet is sent by a client.

The computer confirms the IP address and port number to retrieve the encapsulated data, for a specific application in the system.

Explanation:

The computer network is the communication of two or more devices. There are two forms of network, there are peer to peer and client/server networks.

The peer to peer network allows for each computer to send and receive data, while the client/server network have a dedicated server to send resources to clients that request for it. Data transferred are encapsulated in the network, transport and data-link layer PDU headers and would be decided in the destination system to retrieve the data.

4 0
3 years ago
Do i have to buy affinity photo on windows and mac
nikdorinn [45]
no you don’t have to buy that
6 0
3 years ago
Why might you need to convert a file to another file type?
Elis [28]
c i belive that is the right answer

5 0
3 years ago
Read 2 more answers
At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?
Natalka [10]

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

6 0
3 years ago
Other questions:
  • Making each password unrelated to the previous password provides an additional level of security through _____.
    7·1 answer
  • What are the importance of switches in our electron device
    15·1 answer
  • Rachael has been posting negative comments on several of her peers' social media pages. Which of the six Ps is Rachael abusing?
    15·1 answer
  • How many times does the following loop execute?int upperCaseLetters = 0;String str = "abcdEfghI";boolean found = false;for (int
    5·1 answer
  • Technology deals with...
    12·1 answer
  • Many everyday objects (such as amusement park rides, cars, elevators, and ovens) that you might not normally associate with a co
    7·1 answer
  • The image below is an example of a
    6·1 answer
  • Example of vector image format​
    12·1 answer
  • Write features of Fifth Generation of computer?​
    12·2 answers
  • Why aren't my skullcandy bluetooth headphones connecting to my school chromebook if I turned on both the headphones and the blue
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!