1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrews [41]
2 years ago
8

What is an example of a situation in which you might use the append method? In what ways is the append method limited?

Computers and Technology
1 answer:
Oksanka [162]2 years ago
5 0
If I had an array of the names of people who just walked in the door. I’d append the name of the person who came in next. To update the array.

The append method needs to be looped through to add multiple inputs
You might be interested in
Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purp
Lapatulllka [165]

Answer:

Last Option is correct answer. ( Option D)

Explanation:

Option A is rejected because this will allow the view permission but as mentioned the management want a new profile for the users as well.

Option B is rejected because again it will not facilitate the different profile requirement.

Option C is not answer because It will only help in viewing the data and granting permission.

Option D is selected because it will meet both requirements which are to make a new profile first of all and then grant the View permissions to these profiles for the user subset.

7 0
3 years ago
g Suppose we want to compress a text consisting of 6 characters,a, b, c, d, e, fusingthe Huffman Algorithm. Give an example for
Papessa [141]

Answer:

e(a) = 0

e(b) = 10

e(c) = 110

e(d) = 1110

Explanation:

The Worst case will happen when f(a) > 2*f(b) ; f(b) > 2*f(c) ; f(c) > 2*f(d) ; f(d) > 2*f(e) and f(e) > 2*f(f).

Where f(x) is frequency of character x.

Lets consider the scenario when

f(a) = 0.555, f(b) = 0.25, f(c) = 0.12, f(d) = 0.05, f(e) = 0.02 and f(f) = 0.005

Please see attachment for image showing the steps of construction of Huffman tree:- see attachment

From the Huffman tree created, we can see that endcoding e() of each character are as follows:-

e(a) = 0

e(b) = 10

e(c) = 110

e(d) = 1110

e(e) = 11110

e(f) = 11111

So we can see that maximum length of encoding is 5 in this case.

3 0
3 years ago
In what type of computer are exchangeable disks mostly used?​
sasho [114]

Answer:

Laptops

Explanation:

They are the most common disk exchanging devices.

7 0
2 years ago
Suppose you’re creating a slide presentation. During the presentation, you’ll need to go to a specific address on the Web. You s
Lesechka [4]

hyperlink

a hyperlink is what will let them click the link and go to it

please give branlest

3 0
3 years ago
Read 2 more answers
Use the cal command to determine the day of the week you were born. This will require 2 parameters for the cal command. What com
faust18 [17]

Cal command is a calendar command in Linux which is used to see the calendar of a specific month or a whole year and enter a command, using output redirection (>), to output of the date command to a file called todaysdate.

<h3>What is cal command?</h3>

cal is a command- line utility on a number of computer operating system which includes Unix, Plan 9, Inferno and Unix - like operating system such as Linux that prints an ASCII calendar of the given month or year.

cal command is generally stands for calendar and the function of cal command is to display a simple calendar. The example of cal command is cal sep 1752.

Therefore, Cal command is a calendar command in Linux which is used to see the calendar of a specific month or a whole year and enter a command, using output redirection (>), to output of the date command to a file called todaysdate.

Learn more about cal command here:

brainly.com/question/22970860

#SPJ4

3 0
1 year ago
Other questions:
  • Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
    12·1 answer
  • A customer has a new laptop with wireless WAN capabilities; however, the software does not connect to the Internet. What would y
    13·1 answer
  • A(n) __________attack is designed to render the target unreachable by legitimate users, not to provide the attacker access to th
    8·1 answer
  • What is used to configure data sources for applications that require access to a database?
    14·1 answer
  • Edie wants to visit her university's website. What software application should she use?
    9·2 answers
  • You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst
    13·1 answer
  • Who Likes K-pop? Which group or groups do you like
    12·2 answers
  • The _______ within a story are the people and/or objects that the story is about
    5·2 answers
  • One can find mountain ranges, elevation levels, and deserts on a physical map.
    15·2 answers
  • What are 5 good movies like The Breakfast Club or 8 Mile?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!