1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
13

What are the best data structures to create the following items? And why?

Computers and Technology
1 answer:
Airida [17]3 years ago
3 0

Answer:

The best structures to create the following items are

  1. ARRAY
  2. HASHMAPS
  3.  QUEUE
  4. SORTED LINK LISTS

Explanation:

The best structures to create the following items are:

  1. Array : for the storage of cards in a card game the best data structure to be used should be the Array data structure. this is because  the size of the data ( 52 cards ) is known and using Array will help with the storing of the cards values in the Game.
  2. Hashmaps : Hashmap data structure should be implemented in online shopping cart this IS BECAUSE  items can be easily added or removed from the cart therefore there is a need to map the Items ID or name to its actual database
  3. online waiting list are usually organised/arranged in a first-in-first-out order and this organization is best created using the queue data structure
  4. Sorted link lists is the best data structure used to create, store and manage online tickets. the sorted link data structure helps to manage insertions and deletions of tickets in large numbers  and it also reduces the stress involved in searching through a large number of tickets by keeping the tickets in sorted lists
You might be interested in
Where does the book icon of the Help file take you?
8_murik_8 [283]

Where does the book icon of the Help file take you?

ans To a section to browse Help by category.

is answer hope you like it

"c"is correct

5 0
2 years ago
What finger should be on the K key?<br> 1. Pinky<br> 2. Index <br> 3. Middle <br> 4. Ring
Sonja [21]

Answer:

The answer would be the middle

Explanation:

Hope this helps

8 0
3 years ago
Plz answer me will mark as brainliest ​
lakkis [162]

Answer:

answered

Explanation:

5 0
3 years ago
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
Anit [1.1K]

<u>Integrity IPsec security</u> function provides assurance that the data received via a VPN has not been modified in transit.

<u>Explanation:</u>

IPsec utilizes cryptographic security administrations to ensure interchanges over Internet Protocol (IP) systems. It underpins organize level friend validation, information beginning confirmation, information honesty, information classification (encryption), and replay assurance. ESP gives confirmation, respectability, and secrecy, which ensure against information altering and, in particular, give message content security.

Moreover, parcels that are not confirmed are disposed of and not conveyed to the planned recipient. ESP likewise gives all encryption benefits in IPSec. IPsec Authentication Header (AH), IPsec Encapsulating Security Payload (ESP), and the IPsec Internet Key Exchange (IKE). for both IPv4 and IPv6 systems, and activity in the two adaptations is comparative.

3 0
3 years ago
What are the responsibilities of the DBA and the database designers?
Ratling [72]

Answer:

Explanation:

DBA's main responsibility is making sure that there is enough CPU, disk, memory, and network bandwidth available, as well as making backups every so often. Meanwhile, the database designers/developers are responsible for investigating and implementing what the end-user needs and making sure that the database holds all of the information that the end-user will be using.

3 0
3 years ago
Other questions:
  • How could you fact check a news report that you saw on television
    12·1 answer
  • Find the maximum value and minimum value in milesTracker. Assign the maximum value to maxMiles, and the minimum value to minMile
    9·1 answer
  • Assume you previously entered these lines of code.
    14·2 answers
  • What is it called when you make a reference in the text of a document alerting the reader that you are using information from an
    10·1 answer
  • What is a computer briage coures​
    15·1 answer
  • Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
    7·1 answer
  • Csc105 final graded project
    9·1 answer
  • Write a class declaration named Circle with a private member variable named radius. Write set and get functions to access the ra
    10·1 answer
  • Top 5 best comedy or action movies.
    9·2 answers
  • To make a duplicate of text, image,chart,graphs etc.​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!