1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
14

The list below represents the contents of a computer's main memory. I've left every other byte blank. Assume that the letters at

the even addresses are items in linked list, and that the odd addresses will be used as links. Each link is a memory address. In your answer to this question, fill in the addresses so that the linked list is in alphabetical order. Note that the head pointer of this list should have the address 16. Use the address 00 to denote the nil pointer. NOTE: don't move the contents of the even addressed bytes; just change the links by changing the addresses stored at the odd addressed bytes.
Head: 16

Address Contents

12 t

13 00

14 m

15 18

16 a

17 14

18 r

19 20

20 s

21 13

Use the same array as shown in Questions 3, change the links to spell the work 'smart'. First of all, what address should the head pointer have now? Next, write out the list with the links filled in appropriately to make the list spell 'smart'. Use the address 00 to denote the nil pointer. NOTE: don't move the contents of the even addressed bytes; just change the links.

The head pointer is: ________________

Address Contents

12 t

13 _____________

14 m

15 _____________

16 a

17 _____________

18 r

19 _____________

20 s

21 _____________
Computers and Technology
1 answer:
inysia [295]3 years ago
7 0

Answer:

3) A Single linked list is a sequence of elements in which every element has link to its next element in the sequence.

DATA LINK

DATA stores actual value , LINK stores address of next node

As per information given in question, letters at the even addresses are items in linked list and the odd addresses will be used as links.

Even Address Odd Address

12 (Stores 't') 13 (Used as link)

14 (Stores 'm') 15 (Used as link)

16 (Stores 'a') 17 (Used as link)

18 (Stores 'r') 19 (Used as link)

20 (Stores 's') 21 (Used as link)

Numbers represented by circle are addresses of respective nodes. Here Front or Head has address 16. Which represents the Head Node.

Following image represents the word "smart" with respective nodes and their addressing.

​

Numbers represented by circle are addresses of respective nodes.

The head pointer is: 20

You might be interested in
A simple C program to find the logarithm of any number in any base.....​
elena-s [515]

Answer:

tera bur mast hai jwjvszvVbzNjz

8 0
2 years ago
Identify the most appropriate way to display the following research data.
VMariaS [17]

Answer:

1. Artwork of the child participants can be displayed as Picture.

Explanation:

The Art work is painting and filling different colors in different images and objects. Child make different pictures of homes, objects, fruits and vegetables and then colored them accordingly. This type of art work is displayed as picture. This work could not be displayed in the form of tables and lists and also could not shown as graphics.

Answer:

2. The changing image of public transportation is displayed as Graphics.

Explanation:

In Graphics, different images has been designed on different tools by graphic designers to display some problem and its solution in visuals. Different tools are there to make visuals. Changing image of bus transportation is also a transition from old transport system to new transportation system. So, it should displayed in the form of graphics.

Answer:

Illustrative comparison of data from the year 2010-2013 can be displayed in the form of word tables and lists.

Explanation:

In tables and list different data has been placed in specific order for the purpose of analysis of data. These tables are also designed to compare different values and things. So, the data from the year 2010-2013 can be displayed in the form of tables and list so that it can be compared and analyze from different aspects.

7 0
3 years ago
The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
lukranit [14]

Answer:

Encryption

Explanation:

Encryption is a term in the field of computer security (Cryptology) this is a process of encoding information in a way that hackers and eavesdroppers cannot read. The process of encryption involves a plain text (message) been converted into a scrambled text (cipher text) with an encryption algorithm (key) in this way, if the message is intercepted by a hacker he/she is unable to read the contents. Only the authorized party with a decryption key will be able to decrypt back to a plain text and read the contents of the message

3 0
3 years ago
What two different passwords can be set to lock down a computer from unauthorized access?
Shalnov [3]

The two different passwords you can use to lock down a computer from unauthorized access would be,

1. The Supervisor password

2. The User Password.

- Mabel <3

3 0
3 years ago
Queries are questions true or false?
makkiz [27]
True

…………………………………………………..
5 0
3 years ago
Other questions:
  • Where to set up wireless network xbox one?
    5·1 answer
  • When you move or size a control in the Form Designer, Visual Studio automatically adjusts the ________________ that specify the
    9·1 answer
  • How much a 1 Gigabyte in Bytes:<br> 1. 1e+9<br> 2. 1e+6<br> 3. 1000
    8·2 answers
  • Convert (35.125)10 to binary
    9·1 answer
  • Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. H
    9·1 answer
  • Is badlion safe and how ?
    14·1 answer
  • Which of the following statements is TRUE?
    11·1 answer
  • What does the CFO of a company do
    14·1 answer
  • Name all mario kart games in order
    15·2 answers
  • Which graph is the solution to the system 2x – 3 and y &lt; 2x + 4?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!