1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maksim231197 [3]
3 years ago
15

palindrome is a string that reads the same forwards as backwards. Using only a xed number of stacks, and a xed number of int and

char variables, write an algorithm to determine if a string is a palindrome. Assume that the string is read from standard input one character at a time. The algorithm should output true or false as appropriate
Computers and Technology
1 answer:
bixtya [17]3 years ago
6 0

Solution :

check_palindrome$(string)$

   lower_$case$_string$=$ string$. to$_lower()

   Let stack = new Stack()

   Let queue = new Queue();

   for each character c in lower_case_string:

       stack.push(c);

       queue.enqueue(c);

   let isPalindrome = true;

   while queue is not empty {

       if (queue.remove().equals(stack.pop())) {

           continue;

       } else {

           isPalindrome=false;

           break while loop;

       }

   }

   return isPalindrome

Input = aabb

output = true

input =abcd

output = false

You might be interested in
Which type of computer application is apple keynote? a. word processor b. spreadsheet c. presentation d. database e. multimedia
Naily [24]

The type of computer application which apple keynote is, is: c. presentation.

<h3>What is a presentation application?</h3>

A presentation application can be defined as a type of computer application which is designed and developed to avail its end users an ability to create various slides that comprises both textual and multimedia information, which are typically used during a presentation.

This ultimately implies that, apple keynote is an example of a presentation application which is used on computers.

Read more on presentation application here: brainly.com/question/26404012

#SPJ4

4 0
2 years ago
What is another word for microchips operating systems input methods and everything in between?
lord [1]
The answer is computer. A computer is made up of microchips (CPU and GPU), an operation system (macOS or Windows), input methods (keyboard and mouse), and other parts.
7 0
3 years ago
In other programming languages, the dictionary data structure is referred to as a(an)
hjlf

Answer:

hash

Explanation:

it is called a <u>hash,</u><u> </u><u>a </u><u>map</u><u>,</u><u> </u><u>or </u><u>a </u><u>hasmap</u>

5 0
2 years ago
Read 2 more answers
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
RideAnS [48]

Answer:

True.

Explanation:

In generating PRNGs, several specific types of crypto algorithms will be widely will use: linear cipher block, nonlinear ciphers, as well as hash methods and authorization instructions in messages. So, that's why the following scenario is true about the cryptographic algorithms because this is a collection of several excellently defined however complicated mathematics techniques for encoding or decoding information.

7 0
3 years ago
A startup disk cannot be detected when booting a computer. The disk's pressence is reported by the system firmware, But Windows
olasank [31]

Answer:

Bootrec.exe

Explanation:

The process of turning on a computer system is called booting. When a computer system boots, it runs the post test and loads into memory, the information or program needed to run the operating system, and then locates the operating system from the boot manager record in the disk partitions. When the disk is failed to be recorded, or the boot manager or sector is corrupt or lost, the bootrec.exe command is used in the command prompt to correct these problems.

8 0
3 years ago
Other questions:
  • . The first step in devising security services and mechanisms is to develop a security policy True False
    11·1 answer
  • Who invented the machine known as colossus?
    9·2 answers
  • Dante went to change the date for an appointment in his Outlook calendar. He double-clicked in the appointment and made the chan
    11·1 answer
  • Image-editing software is used to_____
    7·1 answer
  • 22
    15·1 answer
  • How are online sources used? Check all that apply.
    8·2 answers
  • A term to describe articles that can be displayed in their entirety,as opposed to abstract and references only
    11·1 answer
  • The process of sending a result back to another part of the program is
    14·1 answer
  • Recommend how could you integrate positive aspects of digital literacy into your own
    13·1 answer
  • What relationship do MP3s and MP3 players have with video files?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!