Answer:
Check explanation
Explanation:
Two stacks can make use of one array by utilizing various stack pointers that begins from different ends of an array. Looking at the array A[1...
], the first stack will drive elements that starts from position 1 as well as to move its' pointer to
.
The Second stack will begin at the
position and motion its' pointer to 1. The best likely divide is to offer each stack a half of an array. whenever any of two stacks transverse the half-point, an overflow can happen but for that overall number of elements, it must be
Answer:
"
Non-persistent" is the right response.
Explanation:
- A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
- Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
What is the issue,please tell me so i can know ur question
A big question or problem in the tech field that i would like to solve is Data security.
<h3>What is Data security ?</h3>
Data security can be regarded as process of protecting data from unauthorized user as well as protection from data corruption .
I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.
Data security are;
- data encryption
- hashing
- tokenization
Learn more about Data security at;
brainly.com/question/17493537
Answer:
A cell's address, its position in the workbook, is referred to as a <u>cell reference</u> when it is used in a formula.