1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
3 years ago
6

Write a program that maintains a database containing data, such as name and birthday, about your friends and relatives. You shou

ld be able to enter, remove, modify, or search this data. Initially, you can assume that the names are unique. The program should be able to save the data in a fi le for use later. Design a class to represent the database and another class to represent the people. Use a binary search tree of people as a data member of the database class. You can enhance this problem by adding an operation that lists everyone who satisfi es a given criterion. For example, you could list people born in a given month. You should also be able to list everyone in the database.
Computers and Technology
1 answer:
andreyandreev [35.5K]3 years ago
3 0

Answer:

5909? \times \frac{?}{?} 10100010 {?}^{?} 00010.222 {?}^{2}

You might be interested in
One vital component of your professional behavior with regard to computing systems today is the creation of​ _________.
zlopas [31]
<span>One vital component of your professional behavior with regard to computing systems today is the creation of​ strong passwords.
It is very important to have a good password on your computer, especially if you are dealing with sensitive data and information. It would be for the best to create such a password which won't be hacked into easily, in case somebody wants to steal your data.
</span>
3 0
3 years ago
An app builder has created a report for sales people to view records from the custom object, some users have complained that the
a_sh-v [17]

Answer:

Check sharing rules

Check organization-wide defaults

Check the user s profile for object settings

Explanation:

There is a need for some people to see the total transparency of the records that are meant to be shared with a select group of people. There are certain things that can be done for this. The first one is that the sharing rules should be checked. To whom are the details shared with. The next one is the filters that are used.

These can be reported and changed accordingly. Lastly, the whole organization’s defaults can be checked. This is something that can be done when the previous methods that were done did not work that well. Once some changes are done, the people can check if they already work and if the records can be viewed.

6 0
4 years ago
A call center company wants to implement a domain policy primarily for its shift workers. The call center has large groups with
spayn [35]

In my opinion, the best solution for the call center company to implement is to enforce time of day restrictions.

D) Time-of-day restrictions.

<u>Explanation:</u>

As the employees of the call-center company work in shifts, it would be the best solution to incorporate time of day restrictions. Each employee has already been allotted a shift, so every employee should only be allowed to log in when their shift is active.

Reduced failed logon attempts, mandatory password changes, and increased account-lockout time are also good practices to incorporate but the performance of the shift will be best monitored when the time of day restrictions are made.

In this way, the company will know who all from the employees are allowed to log in and it will subsequently decrease the traffic as well.

7 0
3 years ago
The list below represents the contents of a computer's main memory. I've left every other byte blank. Assume that the letters at
inysia [295]

Answer:

3) A Single linked list is a sequence of elements in which every element has link to its next element in the sequence.

DATA LINK

DATA stores actual value , LINK stores address of next node

As per information given in question, letters at the even addresses are items in linked list and the odd addresses will be used as links.

Even Address Odd Address

12 (Stores 't') 13 (Used as link)

14 (Stores 'm') 15 (Used as link)

16 (Stores 'a') 17 (Used as link)

18 (Stores 'r') 19 (Used as link)

20 (Stores 's') 21 (Used as link)

Numbers represented by circle are addresses of respective nodes. Here Front or Head has address 16. Which represents the Head Node.

Following image represents the word "smart" with respective nodes and their addressing.

​

Numbers represented by circle are addresses of respective nodes.

The head pointer is: 20

7 0
3 years ago
When creating a document template, you can either start from an existing document or begin from _____.
Anna35 [415]
A new blank document
7 0
3 years ago
Other questions:
  • Beside homework, what products can you use for personal use? Identify three uses and briefly describe.
    15·1 answer
  • The fossilizing process that replaces organic matter with silica or calcite is:
    13·2 answers
  • What are the advantages and disadvantages of it?
    14·1 answer
  • What are the reasons why is it necessary to evaluate online sources and content?
    6·1 answer
  • I REALLY NEED HELP WITH THIS ASSIGNMENT. IT WOULD BE GREATLY APPRECIATED IF SOMEONE HELPED ME. I'M NOT GOOD AT COMPUTER SCIENCE
    6·2 answers
  • .
    8·1 answer
  • Please help me please help me.​
    10·1 answer
  • Section A: A(n) is a collection of information, generally stored as computer files. The information it contains can be stored, u
    10·1 answer
  • Given the code as follows: main() { int i = 3, n; float x; x = i; n = 8 % x; } What problem will occur? Group of answer choices
    12·1 answer
  • Which of the following best describes the purpose of a design specification?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!