1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vanyuwa [196]
2 years ago
14

How do you do these two questions? The first might have multiple answers and the second will have only one answer.

Computers and Technology
1 answer:
Svetlanka [38]2 years ago
6 0

Answer:

1. Generally Linkedlist is used, but you can also use the queue. Hence both linked list are queue are correct options. However, treeset is sorted and hashset is not sorted, and hence we cannot make use of the treeset. Similarly the stack cannot as well be used as a Hashset.

2. D. Additional cells in the same hashset are examined and the index is incremented by a fixed value each time.

Explanation:

The 2 deals with the linear probing, and what is meant as option in 2 is what we know as linear probing in hashset, and we do have quadratic probing and double probing as well.

You might be interested in
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Which of the following command-line utilities allows to test the reachability of a host across an IP network?
lesya692 [45]

Answer:PING

Explanation:The ping command is a command that can be used on the command line interface of your computer to verify that a computer can communicate over the network with another computer. it works by inputing ping command with host name address( IP address)and proceeding with enter button to get output.

8 0
3 years ago
Write code that outputs variable numDays as follows. End with a newline. If input is 3, output is: Days: 3
kobusy [5.1K]

Answer:

In C++:

#include<iostream>

using namespace std;

int main(){

int numDays;

cin>>numDays;

cout<<"Days: "<<numDays<<endl;

return 0;

}

Explanation:

This line declares numDays as integer

int numDays;

This line gets user input for numDays

cin>>numDays;

This line prints the required output and ends with a newline

cout<<"Days: "<<numDays<<endl;

8 0
3 years ago
Which of the following best describes the views and arguments about the consequences of
Nitella [24]

Answer:- d)There are diverse views and arguments about the consequences of wearing  Google Glass.

Explanation:-Google glass is a eyeglass that was made with the head-mounted form for the wearable computer display.The glass works on the commands given by the voice.It can operate the internet service,camera, calendar etc.

The Google glass was discontinued because of the consequences of the glass.They were very high priced product and used to capture every picture that the user was looking at and also had issues related with minds .Thus, the correct option is option(d).

3 0
3 years ago
Which type of device would be used on a laptop to verify<br> the identity of a user
Montano1993 [528]

Answer:

A biometric identification device

Explanation:

As biometric identification devices, laptops commonly use a fingerprint scanner or, for facial recognition, a camera.

4 0
2 years ago
Other questions:
  • In this code, identify the repeated pattern and replace it with a function called month_days, that receives the name of the mont
    14·1 answer
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • These systems consist of interlinked knowledge resources, databases, human experts, and artificial knowledge agents that collect
    9·1 answer
  • ____ indicates the number of pixels that a computer uses to display the letters, numbers, graphics, and background on a screen.
    12·2 answers
  • Create a new Die object. (Refer to Die.html for documentation.)Create a loop that will iterate at least 100 times. In the loop b
    11·1 answer
  • Networks that are designed to connect similar computers that share data and software with each other are called:
    10·1 answer
  • Sabian que hay una violadora sexuar el nombre de usario es SASHENKAFASION me acaba de decir que hackio en donde vivo,mi nombre c
    5·1 answer
  • Use the drop-down menus to describe how Adnan can add shapes to his presentation.
    11·1 answer
  • A ________ database state is one in which all data integrity constraints are satisfied
    15·2 answers
  • 100 POINTS. DO NOT SPAM. OR I WILL REPORT.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!