1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedaia [141]
3 years ago
14

Compare and contrast a linked list and an array.

Computers and Technology
1 answer:
Ostrovityanka [42]3 years ago
4 0

Answer:

Differences between arrays and linked list are as following:-

  1. Arrays store elements in contiguous memory location while the linked list does not store elements at contiguous memory location it connects nodes at different memory location.
  2. Array has index to directly access the elements there are no indexes in linked list to directly access the elements.
  3. Linked list contains Nodes which contains the data and the address of the next Node while the array contains only the data in the block.
  4. Traversal over the arrays is easy while the traversal over the linked list is difficult as compared to arrays.
You might be interested in
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
This is not a question but I am taking a vote of what device most people use​
Xelga [282]

I tend to use a playstation switch. It runs out of data very quickly though, even with the unlimited plan.

5 0
4 years ago
What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
vodomira [7]

Answer:

A lookaside buffer translation (TLB) is a memory cache that reduces the time it takes to access a user memory place. TLB includes the most lately used page table entries.

TLB is used to overcome the issue of sizes at the time of paging. Page Table Entry (PTE) is used for framing the memory ,but it uses two references one for finding  the frame number and the other for the address specified by frame number.

<u>Formula for finding effective memory access time-</u>

Effective Memory Access Time = (TLB access_time+Memory Access Time)*hit ratio + (TLB access_time+2*Memory Access Time)*(miss ratio)

Given in question,

Hit ratio = 0.90

Memory Access Time = 150ns

TLB access time= 5ns

Effective Memory Access Time = (TLB access_time+Memory Access Time)*hit ratio + (TLB access_time+2*Memory Access Time)*(miss ratio)

                            =(5+150) * 0.90 + (5+2*150)*(1-0.90)

                             =155 * 0.90 + (305*0.1)

                             =139.5 + 30.5

                             = 170ns

8 0
3 years ago
Software (often on firmware) designed to make physical products and devices smarter by doing things like sharing usage informati
Katarina [22]

Answer:

Embedded System

Explanation:

Embedded System are designed to make physical products and devices and helping in diagnose problems as well.

3 0
3 years ago
True or False <br><br> MAC addresses are assigned by the router along with your IP address.
Oduvanchick [21]
True. If you look at the router it will correspond with your MAC address
4 0
3 years ago
Other questions:
  • Which ipsec component is software that handles the tasks of encrypting, authenticating, decrypting, and checking packets?
    10·1 answer
  • Which of the following rules should be used to keep the appropriate distance between your vehicle and the vehicle in front of yo
    10·2 answers
  • The manufacturer doesn't need it the buyer doesn't want it the user doesn't know they're using it
    6·1 answer
  • One vital component of your professional behavior with regard to computing systems today is the creation of​ _________.
    14·1 answer
  • What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?
    7·1 answer
  • you want to enhance your Website visitors' experience. To do this, you need to know the type of browser that each visitor to you
    11·1 answer
  • When did computer networking go beyond the walls of the firm?
    15·1 answer
  • Create a dynamic array of 100 integer values named myNums. Use a pointer variable (like ptr) which points to this array. Use thi
    6·1 answer
  • A photojournalist is more employable than a reporter or a photographer because they can perform more than one job
    13·1 answer
  • What is a BUG in terms of computer programming?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!