1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zmey [24]
3 years ago
12

Assuming each reference costs 1 byte, and each piece of data/info costs 1 byte as well. When will a doubly linked list be more a

ppropriate when space cost is the most important thing in our decision making process comparing to a 256 element array? Show your analysis on how you reached to the conclusion.
Computers and Technology
1 answer:
NeX [460]3 years ago
8 0

Answer:

The circular individually linked list is more efficient for time sharing process ,when multiple application are running on pc it is responsibility of an output system to put all process on a list and execute them all by giving them piece of time and make them wait when cpu is selected to other process.

It will be more suitable for output system to use circular list as when it reaches to last of list it will be manually reaches to starting node or process.

Singly circular linked list is used when we are concerned with the memory as only one process will be allocated memory at once and there are no chances of process to go never-ending waiting.

Explanation:

You might be interested in
How to connect tablet to your bluetooth at home?
anygoal [31]
Make sure both devices are enabled or are able to connect via Bluetooth. Set the tablet to "discover" mode. Or, you can have it scan for nearby Bluetooth devices. Select the device. Sometimes, you are prompted for a password or code. If you don't have the manual (which usually states it) you can use either 0000 or 1234. 
5 0
3 years ago
What is the advantages and disadvantages of hardware devices and software devices ?
yulyashka [42]

Answer:

Advantages of hardware:

Physical existence

Multitasking

Speedy

Disadvantages:

Costly as different equipment cost differently

Time consuming

requires space

Privacy issues

Explanation:

Advantages of Software:

Less costly

Improved privacy controls

Requires no space

Disadvantages:

Does not have physical existence

hacking and cyber attacks may steal important information

Regular updates required

3 0
3 years ago
Samantha is in the beginning stages of OOP program development. What are the five steps she must follow for creating an OOP prog
lora16 [44]

Answer:

1. Classes and objects

2. Inheritance

3. Polymorphism

4. Data hiding/ encapsulation

5. Interfaces.

Explanation:

Classes and objects depict the major component of the OOP (object oriented programming). It explains the object like a ball in a soccer game development.

The inheritance is like the subclass of the object. Data hiding is a stage in oop where the codes or data are hidden from another users.

In the polymorphism stage, the object is given the ability to change to a sub-object, while in the interface stage a function or method signature is defined without implementing it.

3 0
3 years ago
Read 2 more answers
State the keyboard key used to move the cursor to the line​
irina [24]

Answer:

Home & End are used to move the cursor to the start and end of a line

4 0
3 years ago
25 POINTS!!!!!!!!!!!!!
Paladinen [302]
A leaking data exhaust
7 0
3 years ago
Read 2 more answers
Other questions:
  • What error, if any, is in the following code?
    11·1 answer
  • Hybrid protocol is similar to which other protocol?
    10·1 answer
  • What are the three business writing formats
    12·1 answer
  • Select all that apply.
    13·1 answer
  • Between Handshake protocol, change cipher suite, alert and appplication data protocols, the first one to use is:
    13·1 answer
  • We are building a word processor and we would like to implement a "reflow" functionality that full-justifies text.Given a maximu
    12·1 answer
  • Assume that ip has been declared to be a pointer to int and that result has been declared to be an array of 100 elements . Assum
    9·1 answer
  • When writing research questions, use action words, such as
    6·2 answers
  • MEOWWWWWRARRARARARARRA
    5·1 answer
  • What causes the hidden node problem in a wireless local area network (wlan)?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!