1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
12

In an array-based implementation of a dictionary, if you represent the entries as an array of objects that encapsulate each sear

ch key and corresponding value, how many pointers will you use per array entry?
a. 3
b. 4
c. 2
d. 1
Computers and Technology
1 answer:
xxMikexx [17]3 years ago
3 0

Answer:

The answer is "Option C".

Explanation:

Dictionary is a set of unsorted data values, that is used to save data like a map and which contains a key: value pair in comparison to many other types of data, which only carry a specific number as just an element.

If we use Dictionary as an array so, it uses a two-pointer variable, one for hold key, and the second is used to hold its value.

You might be interested in
2. The internet offers a great source of information; however, how are
olga2289 [7]

Answer:

There are many different ways that you can ensure that the information you gather on the internet is reliable and accurate! One way is to not look at Wikipedia and sites where anyone has the access to edit it at any time. Sites that are .com or .org are usually from a direct and safe source. Stay away from media websites and if you believe something isn't right, do further research.

Explanation:

Hopefully this helps.

6 0
3 years ago
Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access.
jeyben [28]

Answer:

The answer is "use P2P method".

Explanation:

In Corporation are starting to regard P2P is a method, which enabling workers to transfer files directly, reducing the expenses and construction connected with a central network.

  • It allows corporations to make the use of often latent resources on both the computer for each worker.
  • It will also be forced to control access to data to protect the privacy and sensitive materials, and will also be able to encrypt files by code.

5 0
3 years ago
3 thing I learned in ICT
frutty [35]
I’ve learned makes me understand how it is important in our life to have an internet, and also important to know as a things I’ve known. First of all, I have learned about Camtasia, it is a program that are used to make a video about. And to show the others that how to do this or that on the computer.
6 0
3 years ago
If you give someone ______ to your device, they can control it through another phone or computer.
icang [17]

If you give someone <u>Remote access </u>to your device, they can control it through another phone or computer.

<h3>What is  Remote entry?</h3>

An authorized user can use remote access to connect to a computer or network from a different location using a network connection. Users can connect to the systems they require through remote access even if they are physically far away.

Therefore, the dangers to remote access are:

  • There is a risk of device loss or theft due to a lack of physical security safeguards.
  • as the data is transmitted through a public internet, eavesdropping.
  • unapproved access to systems or data, possibly while oblivious to the screen.
  • If someone gets access to the gadget, they could watch and change the data.

Learn more about Remote access from

brainly.com/question/28900477
#SPJ1

5 0
2 years ago
What peripheral displays us the image on a computer?​
zhenek [66]

Answer:

The monitor. It can be a CRT,LCD or LED monitors

Explanation:

Hope it helps

6 0
3 years ago
Other questions:
  • Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?
    10·1 answer
  • When determining the cost of an item, the seller will often analyze the demand as well as the supply before setting the price of
    8·2 answers
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    14·1 answer
  • 5. Write a 500- to 1,000-word description of one of the following items or of a piece of equipment used in your field. In a note
    13·1 answer
  • When deciding how to invest your money, which of the following is least important to know
    7·1 answer
  • Write a program that will use user input. The program should be called PrintNumberToWordie which prints "ONE", "TWO",..., "FIVE"
    9·1 answer
  • Need the answer for this code hs will give brainly
    7·1 answer
  • HELP
    11·1 answer
  • Edhesive 6.3 Code Practice
    15·1 answer
  • A protocol stack is _____.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!