1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darina [25.2K]
3 years ago
8

Implement a metho d to nd the k-th largest element in an array of size N using a minimum priority queue (MinPQ). Assume that the

MinPQ class has a constructor that takes a single integer representing its maximum size, a insert(), a min(), a delMin(), an isEmpty(), and size() metho ds. The MinPQ do es not resize (to preserve O(logn p erformance). You may not imp ort any packages. Creating additional help er metho ds is ne but you should provide a one line comment that indicates their purp ose.
Computers and Technology
1 answer:
diamong [38]3 years ago
3 0

Sorry don't understand spanish,I am sure you can get it wrong,for crying out loud you people get checks for coming to United States

You might be interested in
1. why is manufacturing considered the biggest contributor to progress
34kurt

Answer:

A vibrant manufacturing base leads to more research and development, innovation, productivity, exports, and middle-class jobs. Manufacturing helps raise living standards more than any other sector. Manufacturing generates more economic activity than other sectors.

3 0
2 years ago
Which object waits for and responds toan event from a GUI component?
irakobra [83]

Answer:

The answer is action eventlistener

Explanation:

It is an event handler and it is easy to implement.In java we call them even listeners it is function or a sub routine or a procedure that waits for an event to occur and respond to an event from a GUI component.

8 0
3 years ago
Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
Mnenie [13.5K]

Answer:

Binary file.

Explanation:

                           In this case, the network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transaction. However, the transaction data seems indecipherable. The explanation for this is that the TCP transaction file is a Binary File and because of this the network secuirty analyst is unable to decipher the transaction file.

                           The solution for this is to convert the binary file into text file which is human readable.

3 0
2 years ago
you have been using snmp on your network for monitoring and management. you are concerned about the security of this configurati
Zinaida [17]

The thing that should be done is to implement version 3 of SNMP.

<h3>How to depict the information?</h3>

In this situation, the person has been using snmp on your network for monitoring and management. you are concerned about the security of this configuration.

Therefore, since the person is concerned about the security of this configuration, the thing that should be done is to implement version 3 of SNMP.

Learn more about configuration on:

brainly.com/question/26084288

#SPJ12

6 0
1 year ago
A computer's hard disk drive holds 8 x 10^10 bytes of information. If Jill buys an extra memory stick that holds 5.1 X 10^8 byte
denis-greek [22]

Answer:

The computer will store 8.05 *10^10 bytes of information.

Explanation:

This is the same as saying that the computer will now have 80.51 Gigabytes ( 1gb = 1.000.000.000 bytes) of storage. In this case, the number is represented in its decimal form, and the previous one is displayed in Scientific Notation.

8 0
2 years ago
Other questions:
  • Which statement is true? Group of answer choices Variables cannot be assigned and declared in the same statement Variable names
    5·1 answer
  • You recently discovered that Marketing1 can connect to Admin1, and Admin1 can connect to Marketing1, but neither of these comput
    11·1 answer
  • can you give me a tip to fix my SIM card becuaus when i put it on my phone it has no signal , can anyone fix this , thank you.​
    9·2 answers
  • In order to get a comprehensive evaluation of the computer programmers he managed, Justin organized a(n) __________, where he as
    11·1 answer
  • You are creating a presentation and you have come to the last slide. You still have more information to add. What should you do?
    7·1 answer
  • Write an expression that computes the integer average of the int variables exam1 and exam2 (both declared and assigned values).
    15·1 answer
  • You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
    9·1 answer
  • What is the mass of a cookbook
    7·1 answer
  • Brain for free 12628397
    14·2 answers
  • If your cell phone rings while you are driving and you do not have a hands-free device you should
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!