1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Salsk061 [2.6K]
3 years ago
6

Show the contents of a queue after the following operations are performed. Assume the queue is initially empty. enqueue(45); enq

ueue(12); enqueue(28); dequeue(); dequeue(); enqueue(69); enqueue(27); enqueue(99); dequeue(); enqueue(24); enqueue(85); enqueue(16); dequeue();
Computers and Technology
1 answer:
nlexa [21]3 years ago
4 0

Answer:enqueue (45);45 enqueue (12);12 45 enqueue (28);28 12 45 dequeue();28 12 dequeue();28 enqueue (69);69 28 enqueue (27);27 69 28 enqueue (99);99 27 69 28 dequeue();99 27 69 enqueue (24);24 99 27 69 enqueue (85);85 24 99 27 69 enqueue (16);16 85 24 99 27 69 dequeue();16 85 24 99 27 Review Book:Ch. 3 / 7) B) Implementation 2 only Ch. 6 / 9) D) Implementiation 1 and 2 only Ch. 8 / 2) C)Constructing Bork object              Constructing Bork object              Constructing Mork object

Explanation:

You might be interested in
Which item below is NOT output? A. monitor B. speakers C. printer D. mouse
Molodets [167]
D. mouse that is  your answer <span />
6 0
3 years ago
Read 2 more answers
____ gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses and can there
Sedbober [7]

<u>Classless Inter-Domain Routing</u> gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses and can therefore set the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.

<u>Explanation</u>:

A router is a networking device that helps in connecting multiple networks. <em><u>Classless Inter-Domain Routing (CIDR) </u></em>is used for creating IP addresses and IP routing. CIDR was introduced in the year 1993 by <em><u>“The Internet Engineering Task Force”</u></em>. The classful network design was replaced by CIDR in the Internet.

The IP addresses are responsible for sending the particular information packets to specific computers. Classless inter-domain routing helps in improving the allocation of IP addresses.

7 0
3 years ago
Read 2 more answers
What is it called when the system and all the components except for the real-time clock are powered down
Colt1911 [192]

Answer:

The correct answer to the following question will be "Mechanical off mode".

Explanation:

  • The device will appear to be either on or off to the user. No other states are measurable. The device does, however, support various power states that suit the power states specified in the ACPI specification. Such states also differ, like hybrid sleep and rapid startup. This subject discusses certain states and how they will be represented.
  • The system is completely off, and no power is used. Only after a full reboot will the machine return to working condition.
  • It is called mechanical off mode when the machine and all parts, except for the actual-time clock, are down powered.

Therefore, Mechanical off mode is the right answer.

8 0
3 years ago
Which type of disease cannot be spread from one person to another
marusya05 [52]

<u>non-infectious, non-communable</u>. It means that they can't spread. I hope that helps! Also, and example of this non-infectious disease would be diabtetes, as in, if you're next to a person that has it, you won't get it lol.

6 0
3 years ago
Read 2 more answers
Suppose you have data that should not be lost on disk failure, and the application is write-intensive. How would you store the d
natita [175]

Answer:

use RAID 5

Explanation:

The best option in this scenario would be to use RAID 5, this would all but eliminate the risk of losing the data. As you would need at atleast 3 seperate drives which would all act as backups for each other. Therefore, in the unlikely case that one of the drives were to fail or data were to become corrupt/lost the other drives would have a backup of that data which ca be used.

7 0
3 years ago
Other questions:
  • You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will
    12·1 answer
  • What is your understanding of the difference between a stream cipher and a block cipher?
    14·1 answer
  • 1. A formula =A1+B2 is in cell D8. If you copy that formula to cell D9, what is the new formula in cell D9?
    7·1 answer
  • An Internet service provider that wants to influence consumers to immediately switch to its service would most likely utilize __
    12·1 answer
  • If a website ends with .gov does it mean that its written by the government or?
    11·2 answers
  • The process of ensuring that web pages coded with new or advanced techniques still are usable in browsers that do not offer supp
    14·1 answer
  • C:\windows\system32\drivers\etc\protocol is an example of a file ________. select one:
    5·1 answer
  • A location in memory which stores a value, the value can change as the program is running is
    12·1 answer
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
  • Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!