1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
2 years ago
9

30 POINTS PLS HELLLLPPP WILL GIVE BRAINLIEST What behavior do elements in a stack follow? first in, last out, or FILO behavior l

ast in, first out, or LIFO behavior first in, first out, or FIFO behavior last in, last out, or LILO behavior
Computers and Technology
1 answer:
ArbitrLikvidat [17]2 years ago
6 0

Answer:

Explanation:

A stack item behaves like Last In First Out, which is equivalent to First In Last Out. FIFO and LILO are also equivalent, but they describe a queue.

You might be interested in
Who has a brainpop acct. can i pls use it !
RSB [31]

Answer:

Союз нерушимый республик свободных

Сплотила навеки Великая Русь.

Да здравствует созданный волей народов

Единый, могучий Советский Союз!

Славься, Отечество наше свободное,

Дружбы, народов надежный оплот!

Знамя советское, знамя народное

Пусть от победы, к победе ведет!

Сквозь грозы сияло нам солнце свободы,

И Ленин великий нам путь озарил.

Нас вырастил Сталин - на верность народу

На труд и на подвиги нас вдохновил.

Славься, Отечество чаше свободное,

Счастья народов надежный оплот!

Знамя советское, знамя народное

Пусть от победы к победе ведет!

Skvoz grozy siialo nam solntse svobody,

I Lenin velikij nam put ozaril.

Nas vyrastil Stalin - na vernost narodu

Na trud i na podvigi nas vdokhnovil.

Slavsia, Otechestvo chashe svobodnoe,

Schastia narodov nadezhnyj oplot!

Znamia sovetskoe, znamia narodnoe

Pust ot pobedy k pobede vedet!

Мы армию нашу растили в сраженьях,

Захватчиков подлых с дороги сметем!

Мы в битвах решаем судьбу поколений,

Мы к славе Отчизну свою поведем!

Славься, Отечество наше свободное,

Славы народов надежный оплот!

Знамя советское, знамя народное

Пусть от победы к победе ведет!Explanation:

8 0
3 years ago
Three types of neurons and their function
kramer

<u>Efferent Neurons:</u> efferent neurons are motor neurons that carry neural impulses away from the central nervous systme and towards muscles to cause movement.

<u>Interneurons: </u> a neuron which transmits impulses between other neurons, especially as part of a reflex arc

<u>Astrocytes:</u> Astrocytes are the most numerous cell type within the central nervous system (CNS) and perform a variety of tasks, from axon guidance and synaptic support, to the control of the blood brain barrier and blood flow. To perform these roles, there is a great variety of astrocytes.

Explanation:

7 0
3 years ago
Who else hates it when Edgenuity has technical problems with international students?
konstantin123 [22]

Answer: ya it sucks

AI used to be a A student until edgenuity had to be used.

Explanation:

7 0
3 years ago
Which sentence is true about artificial neural networks
kirill [66]

Answer:

Oct 30, 2018 — ... design? A) difficulty level B) level duration C) perspective D) player-adjusted time. ... Add answer+5 pts. Log in to add comment. jonathanwilson is waiting for your help. Add your answer and earn points. ... New questions in Computer Science. answer ... classified the computer on the basic of operations​.Explanation:

8 0
3 years ago
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
Other questions:
  • Write a program, NumberStatistics.java, that reads an unspecified number of integers. The program ends with the input 0. The pro
    14·1 answer
  • To change to the completed application’s directory, we opened a command window and used the ________ command to change to the di
    7·1 answer
  • Weather satellites orbit Earth at an altitude of 1,400,000 meters. What is this altitude in kilometers?
    7·1 answer
  • When you receive a rejection message from an employer, you should?
    5·1 answer
  • What kinds of online behaviors could be considered cyberbullying?
    7·2 answers
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • What is company NDR?​
    11·1 answer
  • Which of these is NOT a usual result of having friends at work?
    8·1 answer
  • Multiple choice:
    12·2 answers
  • Select the correct answer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!