1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
3 years ago
9

The sequence's insert member function normally puts a new item before the current item. What should insert do if there is no cur

rent item?A) The insert precondition is violated.B) The new item is put at the beginning of the sequence.C) The new item is put at the end of the sequence.D) None of the above.
Computers and Technology
1 answer:
igomit [66]3 years ago
5 0

Answer:

B) The new item is put at the beginning of the sequence

Explanation:

The stack data structure is an example of the type for insert method as the current items are replaced at the top by a new item and the previous items move down the stack. If there no current item in the stack, the new item is put in the first index (beginning point) of the stack data structure.

You might be interested in
Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare
VMariaS [17]

Answer:   you said "Tamara needs to use

operators to organize the students' grades, then

operators to compare the results."

i think your right

Explanation:

sounds right.

3 0
3 years ago
9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
creativ13 [48]

At the: Firewall, the DMZ is configured in the Organization. Within the firewalls, it is accessible. They have been completed with the intention of adding an additional layer of safety to the organization to protect it.

The DMZ safeguards not only the web server but also the remainder of the network. To allow visitors to the network to access the web server, a security breach must be made.

The DMZ lessens the possible risk caused by this gap. A secure network, protected by the FortiGate, that only permits access if it has been specifically authorized is known as a DMZ network (from the term "demilitarized zone").

In this illustration, a private subnet is used by the DMZ network, which permits access to a web server by internal and external users using distinct addresses while blocking access from the web server to the internal network in the case that the web server is compromised.

To know more about DMZ click on the link:

brainly.com/question/2920815

#SPJ4

7 0
1 year ago
The ArrayList class contains a trim method that resizes the internal array to exactly the capacity. The trim method is intended
andreev551 [17]

Answer:

public void trimToSize() {

modCount++;

if (size < elementData.length) {

elementData = (size == 0)

? EMPTY_ELEMENTDATA

: Arrays.copyOf(elementData, size);

}

}

Now, the running time for copyOf() function is O(N) where N is the size/capacity of the ArrayList. Hence, the time complexity of trimToSize() function is O(N).

Hence, the running time of building an N-item ArrayList is O(N^2).

Please find the sample code below.

CODE

==================

import java.util.ArrayList;

public class Driver {

  public static void main(String[] args) throws Exception{

      int N = 100000;

      ArrayList<Integer> arr = new ArrayList<>(N);

     

      long startTime = System.currentTimeMillis();

      for(int i=0; i<N; i++) {

          arr.add(i);

          arr.trimToSize();

      }

      long endTime = System.currentTimeMillis();

      double time = (endTime - startTime)/1000;

      System.out.println("Total time taken = " + time + " seconds.");

  }

}

Explanation:

5 0
4 years ago
Three different numbers need to be placed in order from least to greatest. For example, if the numbers are ordered 9, 16, 4, the
Anna11 [10]

Answer:A

Explanation:

3 0
3 years ago
List 5 ways by which Artificial intelligence (AI) can be used to drive our business.​
andreyandreev [35.5K]

Answer:

start a website

Explanation:

true

5 0
3 years ago
Other questions:
  • During the charging of a storage battery, what is the temperature that the electrolyte solution must never exceed?
    6·1 answer
  • Security awareness training can reduce the risk of a data breach by what percentage?
    12·1 answer
  • To display measurements on the ruler while changing column widths, hold down the ________ key while dragging the marker.
    13·1 answer
  • Which is an example of correct HTML?
    10·1 answer
  • What is the order of adding 10.0 to each element in a one-dimensional array of N real numbers?
    13·1 answer
  • A program that processes data submitted by the user. Allows a Web server to pass control to a software application, based on use
    11·1 answer
  • How do entrepreneurs traditionally use computers? check all of the boxes that apply.​
    13·2 answers
  • Speed(?)
    5·1 answer
  • How to use access?<br> like working in access and bringing tables and stuff
    5·1 answer
  • Question 1
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!