1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vanyuwa [196]
3 years ago
14

How do you do these two questions? The first might have multiple answers and the second will have only one answer.

Computers and Technology
1 answer:
Svetlanka [38]3 years ago
6 0

Answer:

1. Generally Linkedlist is used, but you can also use the queue. Hence both linked list are queue are correct options. However, treeset is sorted and hashset is not sorted, and hence we cannot make use of the treeset. Similarly the stack cannot as well be used as a Hashset.

2. D. Additional cells in the same hashset are examined and the index is incremented by a fixed value each time.

Explanation:

The 2 deals with the linear probing, and what is meant as option in 2 is what we know as linear probing in hashset, and we do have quadratic probing and double probing as well.

You might be interested in
1. How fast do human beings walk?
zepelin [54]

Answer:

a.about 3 or 4 miles per hour

8 0
3 years ago
Read 2 more answers
1. Write a 400-500 word research report about Burke High School.
fenix001 [56]

Answer:

when is it due

Explanation:

6 0
3 years ago
4. What is the difference between portrait orientation and landscape orientation? (1.0 points)
Bezzdna [24]

Answer:

Portrait orientation is taller then it is wide, while landscape orientation is wider then it is tall.

Explanation:

3 0
4 years ago
when web services are offered outside the firewall, traffic is prevented from reaching the internal networks via the implementat
Tju [1.3M]

An isolated networking space or sub-network that is isolated from the rest of the organization's connected footprint using logical or physical blocks to enable access to untrusted connections in a safe environment is referred to as a demilitarized zone (DMZ).

Demilitarized zones are secluded network areas that provide as a secure link between proprietary and non-proprietary networks within an organization's perimeter. It stops unauthorized traffic from entering the internal local area network of a business. A demilitarized zone (DMZ) is a region where warring parties have agreed to put their differences aside in order to create peace. An example of a DMZ is the little sliver of territory that divides North and South Korea on the Korean Peninsula.

Learn more about demilitarized here-

brainly.com/question/7933837

#SPJ4

3 0
1 year ago
Several different tunneling protocols can be used in dial-up situations. Which of the following would best be used as a VPN tunn
melomori [17]

Answer:

The answer is the point - to -point protocol, which allows user to set a secure VPN connection for client and server connectivity.

Explanation:

A virtual private network is a private-public network because of encryption and tunneling to ensure the integrity of the data. VPN requires a tunnel to work and encryption.

In VPNs, there are different protocols can be used, such as point- to - Point Tunneling Protocol (PPTP), IPSec, and L2TP.

Point to Point Protocol is a Microsoft protocol which allows user to set a connection and secure VPN destination. Point to point protocol is designed for client and server connectivity. It developed a connection between two computers. The data link layer that transmits over IP networks is used for point to point tunneling.

Such as option A is not correct because it is distracter and IPSecis primary tunneling protocol. It supports only IP networks. L2TP is not a VPN but extend VPN over the various network.

3 0
4 years ago
Other questions:
  • List and describe the issues that lead to making a successful website?​
    9·1 answer
  • Jose would like to know about his uncle's death. He feels his dad is avoiding the subject for some reason. Identify what Jose co
    5·1 answer
  • You are the system administrator for a medium-sized Active Directory domain. Currently, the environment supports many different
    7·1 answer
  • What do you adjust to allow more or less vertical space between lines of a paragraph?
    14·1 answer
  • Which naming scheme identifies the columns of a worksheet?
    12·1 answer
  • Jill is interested in a career as a paramedic. She is trained to use medical equipment, she remains calm under pressure, and she
    15·1 answer
  • Similarities between drawing toolbar and editing toolbar​
    12·2 answers
  • Identify the problems that computer program bugs can cause. Check all that apply.
    9·2 answers
  • What is an IF statement used for?
    12·1 answer
  • Before a computer can use a router, what configuration information must it be provided?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!