1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
10

design aDesign a queue abstract data type for float elements in a language that you know, including operations for enqueue, dequ

eue, and empty. The dequeue operation removes the element and returns its value.

Computers and Technology
1 answer:
Yuri [45]3 years ago
8 0

Answer:

Check the explanation

Explanation:

Due to difficulty in submitting the code on the brainly text editor, it has been written and uploaded, check the below attached image that shows the designed queue abstract data type <u><em>(which is defined by the following operations and structure, when a queue is structured, as expressed in the above statement, as an prepared or structured item collection which are added at one end, that is often called the “rear,” and detached from the other end, called the “front.”) </em></u>for float elements.

You might be interested in
What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible
Nataly_w [17]

Answer:

The correct code to the given question is

if ((counter % 10) == 0)  // check the condition

{

System.out.println("Counter is divisible by ten: " + counter);  // display

}

else  // check the condition

{

System.out.println("Counter is not divisible by ten: "  +counter); // display the //value

}

counter++; // increment the value of counter

Explanation:

Following are the description of code

  • In the given question we have to check the condition that the given number is divisible by 10 or not .
  • In the if block if the number is divisible by 10 then it print the value of number and increment the value of counter .
  • In the else block if the number is not divisible by 10 then it print the value of number and increment the value of counter .
  • It means the value of counter is increases in the if block as well as in the else block .So we have to remove the counter statement from there and place outside the if and else block .

6 0
3 years ago
What command should you use to rearrange parts of files on the drive so they are contiguous?
Sunny_sXe [5.5K]
<span>What command should you use to rearrange parts of files on the drive so they are contiguous? Answer = Defrag</span>
3 0
4 years ago
Unlike clip art, you cannot resize a photograph using the mouse. <br> a. True<br> b. False
masya89 [10]
<span>b. false; unlike clip art, you cannot resize a photograph

</span>
7 0
3 years ago
Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping
tresset_1 [31]

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

6 0
4 years ago
A radio station records an interview with a computer scientist using a computer and audio recording software. Explain how sampli
andrew-mc [135]

The way sampling is used to store audio recordings are:

  • Sound capture.
  • converting digital signal.
  • sound wave capture, etc.

<h3>How is sampling used to store audio recordings?</h3>

In this process,  sound is taken in by the use of a microphone and so it is later converted into a digital signal.

Note that an analogue-to-digital converter is often used to taken in or capture a sound wave at frequent  time intervals. This recording is then regarded as a sample and the data is stored in a file for future use.

Learn more about interview  from

brainly.com/question/8846894

#SPJ1

4 0
2 years ago
Other questions:
  • Store shelves are empty during periods of Excess Demand. What is another term for Excess Demand?
    8·1 answer
  • As a culture chnages so does its language<br><br> A.true <br> B.false
    5·1 answer
  • A computer can function in the absence of software true or false​
    15·2 answers
  • ?__________ is the term that describes devices that automate many industrial tasks by receiving digital commands and converting
    5·1 answer
  • Which of the following actions would not reduce software piracy? reducing the cost of software. offering downloads of software.
    12·2 answers
  • True or false As the contents and topics of new magazines change year-to-year, you can see various trends and movements across s
    15·1 answer
  • Write any two rules for writing algorithm​
    10·1 answer
  • What is the two’s compliment of -95,-122,-111,-57
    9·1 answer
  • What causes the hidden node problem in a wireless local area network (wlan)?
    13·1 answer
  • Frequently used _____________ can be saved as _____________ for use in analysis, dashboards, reports, tickets, and alerts.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!