Hard disk Drive, random access memory, USB flash memory
The two different passwords you can use to lock down a computer from unauthorized access would be,
1. The Supervisor password
2. The User Password.
- Mabel <3
Answer:
B.O(1)
Explanation:
When we are implementing ADT stack using linked chain we can pop an entry from the stack having O(1) time complexity because in linked chain we have the head or top pointer in linked chain only.Popping and pushing in stack happens on only one end that is top.So we have move to move top in linked chain to the next and delete prev node.
A device connected to the internet is known as a Node.
Answer:
1. Open Shortest Path First (OSPF)
2. Border Gateway Protocol (BGP)
3. Routing and Remote Access Service (RRAS)
4. Frame relay
5. Synchronous
6. Virtual
7. Committed Information Rate (CIR)
8. Integrated Services Digital Network (ISDN)
9. Asynchronous Transfer Mode (ATM)
10. Basic Rate Interface (BRI).