1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kobotan [32]
3 years ago
6

We need ____ pointers to build a linked list.

Computers and Technology
1 answer:
adelina 88 [10]3 years ago
3 0

Answer:

two

Explanation:

A linked list is a data structure which stores the multiple-element with data type

and a pointer that stores the address of the next element.

A linked list is a series of nodes connecting each other by a pointer.

a node contains data and a pointer.

For build an array, two pointers are used:

the first pointer for specifies the starting node called head node.

and the second pointer is used to connect the other node to build the linked list.

Both are used to build the array if we lose the head node we cannot apply the operation because we do not know the starting node and we cannot traverse the whole linked list.

for example:

1->2->3->4->5

here, 1 is the head node and -> denote the link which makes by the second pointer.

You might be interested in
Help with this robotics hw pls
enyata [817]
Hard to see, if you make it normal size I might b able to help
8 0
3 years ago
What is the Intranet?<br>​
brilliants [131]

Answer:

a local or restricted communications network, especially a private network created using World Wide Web software.

Explanation:

8 0
3 years ago
Tonya is working with a team of subject matter experts to diagnose a problem with her system. The experts determine that the pro
Licemer1 [7]

Answer:

The answer of the following question is Encryption.

Explanation:

Encryption is the second layer of the OSI Layer. It helps reduce the maintenance charges and offload complexity.

Encryption has presents in layer 3 and layer 4 which is IPSec in layer 3 and SSL, TSL in layer 4. of OSI Model.

<u>Note</u>- Only the Encryption can protect the data itself

5 0
3 years ago
A picture of kitchen sink draining system​
ale4655 [162]

Answer: So do you need a picture of that or what do you need exactly i would love to help!!

5 0
2 years ago
Read 2 more answers
What will be the value of x after the following loop terminates?
Katena32 [7]

Answer:

10

Explanation:

This for-loop is simply iterating three times in which the value of x is being set to the value of x * 1.  So let's perform these iterations:

x = 10

When i = 0

x = x * 1 ==> 10

When i = 1

x = x * 1 ==> 10

When i = 2

x = x * 1 ==> 10

And then the for-loop terminates, leaving the value of x as 10.

Hence, the value of x is equal to 10.

Cheers.

7 0
2 years ago
Other questions:
  • In the structure of a conventional processor, what is the purpose of the data path?
    15·1 answer
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle.
    6·2 answers
  • If you want to present slides to fellow students your coworkers which productivity software should you use to create them
    15·2 answers
  • What is TCP/IP adress​
    10·1 answer
  • Resize vector countDown to have newSize elements. Populate the vector with integers {newSize, newSize - 1, ..., 1}. Ex: If newSi
    6·1 answer
  • A10:A20 Refer to values in
    8·1 answer
  • 10. Differentiate between equity share &amp; preference share.​
    11·1 answer
  • There are many reasons to convert to the decimal numbering system. Select the best answer. When checking numeric values in compu
    5·2 answers
  • Which website offers guidance on putting together a checklist to provide guidance on configuring and hardening operating systems
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!