1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
10

design aDesign a queue abstract data type for float elements in a language that you know, including operations for enqueue, dequ

eue, and empty. The dequeue operation removes the element and returns its value.

Computers and Technology
1 answer:
Yuri [45]3 years ago
8 0

Answer:

Check the explanation

Explanation:

Due to difficulty in submitting the code on the brainly text editor, it has been written and uploaded, check the below attached image that shows the designed queue abstract data type <u><em>(which is defined by the following operations and structure, when a queue is structured, as expressed in the above statement, as an prepared or structured item collection which are added at one end, that is often called the “rear,” and detached from the other end, called the “front.”) </em></u>for float elements.

You might be interested in
How do u know when a website doesnt like u?
stira [4]
Honest answer a website does not have feelings so therefore there is no way to tell if a website likes you or not!! The reason it may not load is because your IT provider or maybe to firewalls that are set up on your modem. Sometimes its not that and you just need to keep you computer up to date that way it can get on the websites! Hope i helped
3 0
3 years ago
Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet
Anna35 [415]

Answer:

Following are the steps with actions that are involved in required to perform a packet transfer.

Explanation:

  • Step 1: The host sends a connection request to server which is at IP address 209.165.200.254
  • Step 2: R1 check the configuration of NAT to inquire weather the packet should be translated or not.
  • Step 3: If there is no entry found for translation of given IP address, It is assumed that the IP address 192.168.10.10  will be translated already.
  • Step 4: R1 selects a global address  from the dynamic address pool that is available to it.
  • Step 5: R1 replaces the given IP address 192.168.10.10  with the translated inside global address.

i hope it will help you!

5 0
3 years ago
List safety conditions when downloading shareware, free free where, or public domain software
Anit [1.1K]

Answer:

Explanation:

Freeware and shareware programs are softwares which are either free of charge or consist of a free version for a certain trial period. These programs pose a threat of habouring malware or viruses which could damage one's computer and important files and programs. Therefore, it is imperative that carefulness is maintained when trying to get these softwares.

Some of the necessary safety conditions that should be taken include;

1) Appropriate research about the software including taking more about the vendors and reviews.

2.) Once, a healthy review has been identified ; the download can begin with the Downloader ensuring that the download is from the recommended site.

3) Prior to installation the software should be scanned with an active anti-virus program to determine if there is possibility that a virus has creeped in.

4.) Some softwares may require that computer anti-virus be turned off during installation, this is not always a good idea as this act leaves the system vulnerable a d badly exposed.

6 0
3 years ago
Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. Wh
fgiga [73]

Answer:

Financial identity theft

Explanation:

Financial identity theft is a fraudulent act that involves accessing someone's personal information without their consent or approval for fraudulent financial gain.

A typical financial identity theft is someone stealing your credit card information such as pin, cvv, etc. to make other financial transactions without your knowledge.

7 0
3 years ago
Is technology a legal discipline or law is a technological artifact.
ANEK [815]

Answer:Technology law scholars have recently started to consider the theories of affordance and technological mediation, imported from the fields of psychology, human-computer interaction (HCI), and science and technology studies (STS). These theories have been used both as a means of explaining how the law has developed, and more recently in attempts to cast the law per se as an affordance. This exploratory paper summarises the two theories, before considering these applications from a critical perspective, noting certain deficiencies with respect to potential normative application and definitional clarity, respectively. It then posits that in applying them in the legal context we should seek to retain the relational user-artefact structure around which they were originally conceived, with the law cast as the user of the artefact, from which it seeks certain features or outcomes. This approach is effective for three reasons. Firstly, it acknowledges the power imbalance between law and architecture, where the former is manifestly subject to the decisions, made by designers, which mediate and transform the substance of the legal norms they instantiate in technological artefacts. Secondly, from an analytical perspective, it can help avoid some of the conceptual and definitional problems evident in the nascent legal literature on affordance. Lastly, approaching designers on their own terms can foster better critical evaluation of their activities during the design process, potentially leading to more effective ‘compliance by design’ where the course of the law’s mediation by technological artefacts can be better anticipated and guided by legislators, regulators, and legal practitioners.

Keywords

Affordance, technological mediation, postphenomenology, legal theory, compliance by design, legal design

7 0
3 years ago
Other questions:
  • How to copy single slide to powerpoint
    15·1 answer
  • Advancements in technology that might be helpful for individuals who need accommodations to perform computer tasks include _____
    15·2 answers
  • Which key is used in word processors to create indentations?
    13·2 answers
  • A number of related records that are treated as a unit is called
    6·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • Someone asks you for help with a computer that hangs at odd times. You turn it on and work for about 15 minutes, and then the co
    10·1 answer
  • Cash cows are always in
    7·1 answer
  • If Anime Characters were real , Who Would Your Anime Wife Would Be (Tell Who And Why)
    10·1 answer
  • What refers to a set of instructions executed in order?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!