1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
6

Help Me Please. I'm Begging you

Computers and Technology
1 answer:
Luba_88 [7]3 years ago
8 0

Answer:

d and b can't see the last ones answer so im guessing this is what you needed.

Explanation:

You might be interested in
Extend the class linkedListType by adding the following operations: Write a function that returns the info of the kth element of
WINSTONCH [101]

Answer:

Explanation:

The following code is written in Java. Both functions traverse the linkedlist, until it reaches the desired index and either returns that value or deletes it. If no value is found the function terminates.

public int GetNth(int index)

       {

       Node current = head;

       int count = 0;

       while (current != null)

       {

       if (count == index)

       return current.data;

       count++;

       current = current.next;

       }

       assert (false);

       return 0;

       }

public int removeNth(int index)

       {

       Node current = head;

       int count = 0;

       while (current != null)

       {

       if (count == index)

       return current.remove;

       count++;

       current = current.next;

       }

       assert (false);

       return 0;

       }

6 0
3 years ago
Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very
VashaNatasha [74]

Answer:

I believe it's B

Explanation:

...but is it?

3 0
4 years ago
You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts acces
yulyashka [42]

<u>Client-server</u> implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts access those resources but do not host services of their own.

<u>Explanation:</u>

The client-server can be utilized on the web just as on a neighborhood (LAN). Instances of customer server frameworks on the web incorporate internet browsers and web servers, FTP customers and servers, and the DNS. Different hosts get to those assets yet don't have administrations of their own. Since it permits arrange permits numerous PCs/gadgets to interface with each other and offer assets.

5 0
4 years ago
Refer to the film, actor, and film_actor tables of the Sakila database. The tables in this lab have the same columns and data ty
julsineya [31]

Using the knowledge of computational language in python it is possible to write a code that organizes film, actor and film and actor at the same time.

<h3>Writting the code:</h3>

<em>SELECT a.last_name, a.first_name, ROUND(AVG(f.length)) AS 'average' </em>

<em>FROM film f </em>

<em>INNER JOIN film_actor fa ON f.film_id = fa.film_id</em>

<em>INNER JOIN actor a ON a.actor_id = fa.actor_id</em>

<em>GROUP BY a.last_name, a.first_name</em>

<em>ORDER BY average DESC, last_name ASC;</em>

See more about python at brainly.com/question/18502436

#SPJ1

5 0
2 years ago
QUESTION 4
Kaylis [27]

Answer: 2, 3, 6, 8

Explanation:

i must tell you something very important.

in LISTS.... the FIRST thing is marked with a 0.

[0, 1, 1, 2, 3, 6, 8, 13, 21, 34]

[0, 1, 2, 3, 4, 5, 6, 7, 8, 9]

do you see how these line up with each other?

the output would be 2, 3, 6, 8

4 0
3 years ago
Other questions:
  • 1. Which of these is NOT true about Torsion Bars? A. They can be used to adjust Ride Height B. They can be adjusted anytime sinc
    7·1 answer
  • gAssume that you are writing a program to merge two files named FallStudents and SpringStudents. Each file contains a list of st
    15·1 answer
  • What is the difference between a Computer Science and a Compter Engineer major?
    14·1 answer
  • You may have noticed that the DHCP request that Phil-F¢s iMac sends is a broadcast packet, sent to Ethernet address: ff:ff:ff:ff
    5·1 answer
  • What your computer can do to you?
    14·2 answers
  • Write the name of the tab, command group, and icon that is used to create multilevel lists.
    12·1 answer
  • What is the best explanation for why digital data is represented in computers in binary?
    10·1 answer
  • Generally, what is the term for storage locations in a processor?
    12·1 answer
  • O O O O O O O
    9·1 answer
  • How does technology affect our daily lives essay
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!