1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
15

Suppose that f() is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointe

r for a linked list. // Postcondition: The function f has done some computation with // the linked list, but the list itself is unchanged. What is the best data type for head_ptr in this function
Computers and Technology
1 answer:
kvv77 [185]3 years ago
5 0

Answer:

The best head_ptr in the linked list is the node. A device connected to a network is called the node.

For example, if there is a network of five computers and two printers, there are eight nodes. Each has a network address and uniquely identifies.

Explanation:

Suppose there is a link list of function struct like this

void f ( struct node * head)

There is a pointer and can change the structure. But cannot change the variable head points. So consider the following code

struct node

{

int f1

struct node* next:

}

If the head has pointed at the head of the link list, then it can use the struct node*.

You might be interested in
Which one of the following rules for selecting a password is the best?
horsena [70]

Answer:

(b) 7 characters: 4 Numbers, 1 Lowercase Letter, 1 Uppercase letter, 1 Symbol

Explanation:

The best rule that makes a password great is that rule that increases the entropy of the password. The entropy of a password is the measure of how easy it is for the password to be cracked e.g by guessing, by brute force cracking, by dictionary attacks and other related cracking methods.

A rule that makes use of a logical combination of the four types of characters - digits, lowercase letters, uppercase letters and special symbols - gives a greater strength to the password than the rules that just make use of the some of the four types of characters.

Increasing the length of the password too is a great way of increasing the entropy of the password. But then, if there is a trade-off between length and combination, the latter is better.

3 0
3 years ago
Read 2 more answers
Judy forgot where she saved a certain file on her computer. Therefor, she searches for all files with a jpg file extension. Whic
Keith_Richards [23]
What are these files anyways
6 0
2 years ago
Read 2 more answers
Which of the following statements about take home pay is TRUE?
Licemer1 [7]
Banks and other lenders share the credit history of their borrowers with each other and are likely to know of any loan payments that you have missed. Does this answer your question? Plz tell me. If not I am sorry...
8 0
3 years ago
For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which fe
Kaylis [27]

Answer:

Explanation:

We must follow several steps:

  1. We must click in the image
  2. Click Image Tools > Format
  3. Click the date under Crop
  4. We must resize the image, or Trim one side, Trim two adjacent sides, Trim the same fragment.
  5. Click the Crop button again if you finished

In addition, we can change the form of the image, we have a lot of options in crop to shape.

8 0
3 years ago
Read 2 more answers
When an important file is saved on two different computers, what is the name of the file that is housed on the second computer?
OleMash [197]
When an important file is saved on two different computers, the name of the file that is housed on the second computer is 'back up'. Back up refers to the process of copying and archiving a particular computer data in order to have an extra copy to fall back on in the event of data loss.  <span />
5 0
3 years ago
Other questions:
  • Wordwrap forces you to stop typing words and press the enter key at the end of each line.
    12·1 answer
  • You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the
    7·1 answer
  • On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions.A. Thro
    15·1 answer
  • A digital media professional's computer is too full of video files. She would like to upgrade her computer to have more capacity
    12·2 answers
  • Write a C function which mimics the behavior of the assembly language function below. Note that this time, the assembly language
    10·1 answer
  • Television, radio, newspapers, magazines, the Internet, and other forms of communication are collectively referred to as thea. W
    15·1 answer
  • Which feature helps an edit-test-bug cycle work faster in the python programming language?
    15·2 answers
  • I WILL MARK IT BRAINLIEST FOR SURE ☺️❤️
    13·1 answer
  • How do you stop getting emails from brainly saying "sarah from brainly has answered your question"
    10·1 answer
  • Viruses that load from usb drives left connected to computers when computers are turned on are known as.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!