1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
8

A stack is initially empty, then the following commands are performed: push 5, push 7, pop, push 10, push 5, pop, which of the f

ollowing is the correct stack after those commands (assume the top of the stack is on the left)? A. 5, 10, 7, 5.
B. 5, 10.
C. 7, 5.
D. 10, 5.
Computers and Technology
1 answer:
MatroZZZ [7]3 years ago
6 0

Answer:

d

Explanation:

You might be interested in
_____ is a markup language designed to transport and store data on the Web. Group of answer choices Standard Generalized Markup
Kisachek [45]

<u>Extensible Markup Language (XML)</u> is a markup language designed to transport and store data on the Web.

Explanation:

  • Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable
  • Extensible means that the language is a shell, or skeleton that can be extended by anyone who wants to create additional ways to use XML.
  • Markup means that XML's primary task is to give definition to text and symbols.
  • It is a textual data format with strong support, Unicode for different human languages.
  • Extensible Markup Language (XML) is used to describe data.
  • The design goals of XML emphasize simplicity, generality, and usability across the Internet.
  • It is a text-based markup language derived from Standard Generalized Markup Language (SGML).
4 0
3 years ago
A bag of biscuit can hold 22 biscuit, and a container can hold 70 bags of biscuit. Write a program that prompts the user to ente
Marta_Voda [28]
The answer is left over bags that make turtles sick
5 0
3 years ago
Read 2 more answers
Jim is creating a form with validation. What are the two validation modes available to him?
Charra [1.4K]
Basic validation
Data validation
6 0
2 years ago
Please help i will give you brainiest please answer all parts i beg you!!!!!!!!!!!!!!!!11111
leonid [27]

Answer:

“Oh yeeeaah… K. Love you so much. Bye”

I rushed upstairs and woke dad up from his slumber. “Dad! Dad! Jon’s hurt. He’s bleeding. Get up!”

I’m not sure what followed. I imagine Dad rushed down the stairs and wrapped Jon’s knee up in a towel or something. He probably packed us all in to our Red Lumina and rushed Jon off to the hospital twenty minutes away. Jon got stitches. I’m not sure how many. Jon doesn’t even know anymore. All Jon really remembers is the pain.

In the years that passed I began to wonder why we didn’t go upstairs to dad in the first place. Why’d we call mom first?

Through a conversation with my sister, we realized this was our normal. Although Dad was around, he was never present. He was absent so often that in a time of crisis we didn’t even turn to him. As a father, I want to be present.

8 0
3 years ago
Write an application that accepts a word from a user and converts it to Pig Latin. If a word starts with a consonant, the Pig La
Reptile [31]

Answer:

Written in Python

word = input("Word: ")

if(word[0]=='a' or word[0]=='e' or word[0]=='i' or word[0] =='o' or word[0]=='u'):

     print(word+"ay")

else:

     a = word[1:]

     print(a+word[0]+"ay")

Explanation:

<em>The program was written in Python and I've added the explanation as an attachment; where I used comments as explanations</em>

Download txt
5 0
3 years ago
Other questions:
  • Which of the following domain types is most trustworthy 1) .com 2) .tv 3).org 4) .edu
    15·2 answers
  • A(n) _____ is similar to a virus, except that it is an independent program that can be spread across computer networks without b
    11·1 answer
  • Is the ipv6 address 2001:1d5::30a::1 a valid address? why or why not?
    14·1 answer
  • Identify a true statement about decision support systems (DSSs).
    15·1 answer
  • Josephine is in the process of creating ads within her Standard Display campaign. She finds that there are two main ad formats t
    5·1 answer
  • A ____ is a key-dependent, one-way hash function that allows only specific recipients(symmetric key holders) to access the messa
    7·1 answer
  • What is Celeste? ( This is for my coding class )
    6·2 answers
  • What is the quickest way to remove all filters that have been applied to a worksheet?
    10·2 answers
  • What do you get with brainly points
    9·1 answer
  • I want to start a debate about something
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!