1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sveta_85 [38]
4 years ago
12

When a programmer creates an abstract data type, he or she can decide what values are acceptable for the data type, as well as w

hat operations may be performed on the data type.
Computers and Technology
1 answer:
Vanyuwa [196]4 years ago
8 0

The abstract data type is a type of data type whose behavioural manner is always determined by a set of values and a set of operations.

<u>Explanation:</u>

These data types depend only on extracting the data and hiding the essential background data. That is why it is called an abstract data type.

It will not show how it is implemented, what algorithms are used and how the data is manipulated.

The abstract data type has three types

i)List ADT

ii)Stack ADT

iii)Queue ADT.

This is how an abstract data type works.

You might be interested in
What type of security solution provides a hardware platform for the storage and management of encryption keys?
shutvik [7]

The type of security solution provides a hardware platform for the storage and management of encryption keys exists hardware security modules .

Hardware security modules (HSMs) supply an effective method to control encryption keys.

<h3>What are Hardware security modules?</h3>

A hardware security module (HSM) exists as a physical machine that supplies extra security for sensitive data. This kind of device exists utilized to require cryptographic keys for essential functions such as encryption, decryption, and authentication for the usage of applications, identities, and databases.

The hardware usually costs at least USD 20,000 to deploy, USD 40,000 for increased accessibility, and multiple periods better for normal enterprise deployment.

Hardware Security Modules (HSMs) exist in hardened, tamper-resistant hardware appliances that strengthen encryption techniques by developing keys, encrypting and decrypting data, and designing and demonstrating digital signatures.

A Hardware Security Module (HSM) exists as a hardware-based protection appliance that develops, stores, and protects cryptographic keys. Sterling Secure Proxy utilizes keys and certificates stored in its store or on an HSM.

To learn more about Hardware Security Module refer to:

brainly.com/question/24118720

#SPJ4

7 0
2 years ago
When an employee is told that his job will be outsourced within a year, he knows that his job will become unnecessary
Anvisha [2.4K]
False!! Hope this helps
8 0
3 years ago
If you want to clear an operating system's temporary files for storage, performance, or privacy reasons, you should run a disk _
VashaNatasha [74]

Answer:

Cleanup is correct:)

Explanation:

8 0
3 years ago
Nothing bottomnothing
elena-s [515]

Answer:humans need energy to complete the regular body requirements to digest our food,to breathe,to move,to run,to travel and continue the metabolism of our regular life.

Explanation:energy is essential to life and all living thing organisms.

8 0
4 years ago
Why is it necessary to declare an array in Java? Choose the best answer.
xxMikexx [17]

Importance of array in Java

Following are some important points about Java arrays. Since arrays are objects in Java, we can find their length using the object property length. Java array can be also be used as a static field, a local variable or a method parameter. The size of an array must be specified by an int or short value and not long.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Clunker Motors Inc. is recalling all vehicles from model years 1995-1998 and 2004-2006. A boolean variable named recalled has be
    6·1 answer
  • Discuss whether the redundant data should be addressed prior to beginning the wireless network architecture project, in coordina
    11·1 answer
  • When mehtod X calls method Y , method Y called methhod Z, and method Z calles method X, this is called
    9·1 answer
  • Some loops are controlled by ____ (or reducing) a variable and testing whether the value remains greater than some benchmark val
    15·1 answer
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    8·1 answer
  • Identify methods to improve programming skills.
    15·1 answer
  • Primitives of transport service assume asymmetry between the two end points during connection establishment, one end (server) ex
    8·1 answer
  • Write a program to find the principle amount​
    10·1 answer
  • What methods do you use when researching a complicated or difficult subject? What tools are most useful to narrowing down and va
    12·1 answer
  • Limitations of systems analysis and design​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!