1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
3 years ago
5

Of the people working in concert with security teams to ensure data quality and protection, the head of information management i

s responsible for executing policies and procedures, such as backup, versioning, uploading, and downloading. True False
Computers and Technology
1 answer:
Svet_ta [14]3 years ago
3 0

Answer:

true

Explanation:

because Internet

because Internet

You might be interested in
True or False: If you take a course and do not pass it, you still get credit. I feel like it's false but i'm not sure. Can I get
Margaret [11]
Its true because even if you fail a course it shows on your transcript....

8 0
3 years ago
Read 2 more answers
The connectors on the computer allow you to plug in devices such as keyboards and printers. what are these called?
madam [21]
USB port. That allows you to plug in devices.
8 0
4 years ago
Even neutral policy plays an important role for imitation of wars. Explain​
Soloha48 [4]

Answer:

neutral policy creates war in many ways such as

when one country who signed the treaty, oppose it and goes for war can cause huge prob

and it creates rage among the others who signed the treaty

8 0
3 years ago
To make data goes to just appropriate device we use​
Stells [14]

Answer:

To make sure that data sent from a device is just received by appropriate device we use "<u>Switch</u>"  

Explanation:

Switch is the networking device. It is used to connect all the Local area networks in a computer network. The switch store the addresses of all computers over the network. Whenever data packet arrives to the switch, it just read the address of destination computer and just send it to appropriate device instead of all devices.

Hub is also used for this purpose, but it has no ability to read the address and send the packet to all devices over the network.

<em>So, we use Switch to send data to appropriate device.</em>

8 0
3 years ago
Write a method reverse( ) for OurLinkedList class. The method should return a new OurLinkedList object that is the reverse of th
Salsk061 [2.6K]

Answer:

See explaination

Explanation:

class OurLinkedList<E> { // The head is the first node of the LinkedList private Node<E> head; /** * No argument constructor, as mentioned in question to initialize the head pointer with null */ public OurLinkedList() { head=null; } public void addFront(E e) { if(head==null) { head=new Node<E>(e);//forgot <E> } else { Node<E> temp=head; Node<E> n=new Node<E>(e); //forgot <E> n.setNext(temp); head=n; } } /* * The add(E data) method add the node to the end of the linked List, It first checks if the Linked List is empty or not >> If the * Linked list is not empty then, * the temp pointer traverses to the end of the linked List and inserts a new Node with data that is * passes as argument at the end of the linked List * */ public void add(E data) { if(head == null) { return; } Node<E> temp = head; Node<E> nodeToAdd = new Node<>(data); /* Moving temp pointer to end of the linked list where next pointer is null */ while(temp.getNext() != null) { temp.setNext(temp.getNext()); } // adding nodeToadd to the end of the linked List temp.setNext(nodeToAdd); } /** * This method checks if the head of the Linked List is null it returns TRUE otherwise it return FALSE */ public boolean isEmpty() { if(head==null) { return true; } return false; } /** * the method remove, removes the first node of the list. If the list is empty is does nothing, if the List is not empty * then it removes the first element of the linked List. */ public void remove() { if (!isEmpty()) { Node<E> toRemoved = head; head = head.getNext(); toRemoved.setNext(null); } } /** * the size() method returns the size of the Linked List, * this method calculates the size of the linkedList by traversing through each node and incrementing the * length variable value */ public int size() { int length = 0; Node<E> current = head; while (current != null) { current = current.getNext(); length++; } return length; } public String toString() { if(isEmpty()) { return "head ==> null"; } Node<E> temp=head; String s="head ==> "; while(temp!=null) { s+=temp.getData()+" ==> "; temp=temp.getLink(); } s+=" null"; return s; } /* method to reverse the Linked List */ Node<E> reverse() { Node<E> prev = null; Node<E> current = head; Node<E> next = null; while (current != null) { next = current.getNext(); current.setNext(prev); prev = current; current = next; } head = prev; return head; } }

Node.java

/* this file contains the Implementation of Node class, * Node class contains if pointer of Node type which points to next Node * and a variable to hold the data */ public class Node<E> { private E data; private Node<E> next; public Node(E data) { this.data = data; next = null; } public void setNext(Node<E> next) { this.next=next; } public Node<E> getLink() { return next; } public E getData() { return data; } public void setData(E data) { this.data = data; } public Node<E> getNext() { return next; } }

Main.java <Contains the drive code for the program>

/* This class is the driver class of the program, this file contains the * code which checks the working of other components of the program * */ public class Main { public static void main(String[] args) { OurLinkedList<Integer> llist=new OurLinkedList<Integer>(); // checking if linked list id empty System.out.println("is empty: "+llist.isEmpty()); // after adding first element to list llist.addFront(10); System.out.println("is empty: "+llist.isEmpty()); // adding more elements to th elist llist.addFront(20); llist.addFront(30); llist.addFront(40); // printing the list using toString() method System.out.println("\n\nBefore Reversing the list:\n"+llist.toString()); // calling the reverse method llist.reverse(); System.out.println("\n\nAfter Reversing the list:\n"+llist.toString());

}

}

8 0
3 years ago
Other questions:
  • What of the following can a cell contain? A number a word a function of these
    5·1 answer
  • What is the characteristics of a spear phishing message
    10·2 answers
  • A single point of failure is a piece of hardware or application that is key to ________________________.
    8·1 answer
  • Can anyone help me<br> I will make you a brainalist
    13·1 answer
  • True or false.local and cloud backup differs in where the backup is saved
    15·2 answers
  • Which attribute defines the file name for the specific image in an image tag??
    13·1 answer
  • What is wrong here??
    14·1 answer
  • Which type of network allows backups and network security to be centrally located?
    11·1 answer
  • Which option best describes top-down design?
    10·1 answer
  • which of the following statements about the evolving relationship between traditional newspaper operations and blogging is true?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!