1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
suter [353]
3 years ago
5

Show the stack with all activation record instances, including static and

Computers and Technology
1 answer:
Hunter-Best [27]3 years ago
4 0

Answer:

See explaination

Explanation:

A stack is a container of objects that are inserted and removed according to the last-in first-out (LIFO) principle.

A stack is a limited access data structure - elements can be added and removed from the stack only at the top. push adds an item to the top of the stack, pop removes the item from the top.

Please kindly check attachment for the step by step solution of the given problem.

You might be interested in
Why is time zone an important factor affecting when communicating
PilotLPTM [1.2K]

Answer:

Regarding real time communication, time zone differences between two count- tries impedes communication and may lead in the extreme case to no overlap in business working hours. With respect to traveling, East-West distance is more severe since a jet lag may affect the productivity of business travelers.

Explanation:

4 0
3 years ago
Create a trigger that prevents anychange(insert, update, or delete)to the grade attribute of the takesrelation that would change
Alchen [17]

Answer:

The trigger code is given below

create trigger F1_Del

after delete on Friend

for each row

when exists (select * from Friend

where ID1 = Old.ID2 and ID2 = Old.ID1)

begin

delete from Friend

where (ID1 = Old.ID2 and ID2 = Old.ID1);

end

create trigger F1_Insert

after insert on Friend

for each row

when not exists (select * from Friend

where ID1 = New.ID2 and ID2 = New.ID1)

begin

insert into Friend values (New.ID2, New.ID1);

end

5 0
3 years ago
Ranges of IP address that anyone can use for their internal networks are known as ______.
Rama09 [41]
Since no answer choices, have to deduce it is Private Networks
8 0
3 years ago
Read 2 more answers
In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
algol13

Answer:

One of the biggest social media giants has faced many such security and privacy risks in the past 3 years. 10 are listed below:

1. No one can forget the New Zealand attack on the mosque, and it was telecast live via it. And that is certainly a security risk. And if someone is able to stream live, the AI is in question definitely as this cannot be telecast.

2. Can you forget the various US shooting cases in the past 5 years? And many out of them where telecast lives on it. Again the AI, and the authentication is in question.

3. Many evils have many times advertised itself through it, and that is a security risk. This put up the question on the Data Scientists of the company.

4. It's a huge data on it, and many users have been able to misuse it, and that is a security risk. This put up the question mark on the application of the Big Data.

5. Once, the UK parliament questioned it to sell the secret data, and that was a privacy risk.

6. An Engineer was caught negotiating to sell secret users data to a third party, and that is a privacy risk as well as a question on management technology, as its possible now to check these kind of frauds.

7. Its accounts have been hacked many times, as well as millions of user-profiles, were stolen. This is a security and privacy risk.

8. Its data is still not safe as evils have proved they can break the authentication. However, it has reacted well, and they look like being a safe destination now.

9. Once, someone from Russia was caught collecting a lot of data from it. That was a security and privacy risk. And surely if someone is uploading a lot of complicated and confidential data, must be checked through proper AI implementation.

10. In India too there have been claims that a lot of personal information during elections 2014 was sold. That was a security and data risk. And the data scientists were proved vulnerable again. Its quite sure hence, a lot of work has to be done in Data Science and Artificial intelligence still.

However, its owner is one of the finest souls on earth. He donated all his money when he was blessed with a child. Some out of his team cheated, and else some technology failure or the huge amount of data was the reason for the fault. However, other companies are also facing such problems. And hence, he cannot be blamed for this. And the company now definitely has recovered from the nightmare that they faced in the past 3 years.

Explanation:

The answer is self explanatory.

8 0
3 years ago
Write a python function that on input takes a list l of integers and returns the count of how many of the integers in the list a
stepan [7]
Def countEvenIntegers(integerList):     counter = 0     for item in integerList:          if (item%2 = 0):               counter += 1     return counter
5 0
3 years ago
Other questions:
  • Identify the publisher in this citation:Carter,Alan.A guide to Entrepreneurship.New York: River’2008.Print.
    9·1 answer
  • Computer ________ involves identifying, extracting, preserving, and documenting computer evidence. a. inoculation b. forensics c
    8·1 answer
  • How much Continents Arctic Ocean that touches
    5·2 answers
  • A type of backlight technology most commonly used in modern laptop devices is called____________.
    9·1 answer
  • You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboa
    6·1 answer
  • _____ parser is an LL parser that is implemented by writing code directly from the grammar of the source language. EBNF is ideal
    7·1 answer
  • PLEASE FASTTTTT
    8·2 answers
  • Justice wrote a program and forgot to put the steps in the correct order. Which step does she need to review?
    5·2 answers
  • Which type of a computer can be assembled using a monitor, a keyboard, a cpu, speakers, a printer and a mouse?.
    14·1 answer
  • you are working in the headquarters of an organization and you're asked to deal with the interruption in services due to network
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!