1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
3 years ago
10

Suppose that a minus sign in the input indicates pop the stack and write the return value to standard output, and any other stri

ng indicates push the string onto the stack. Further suppose that following input is processed:
this parrot - wouldn't voom - if i put -- four thousand --- volts - through it -
What are the contents (top to bottom) left on the stack?
a. through wouldn't this.
b. this wouldn't through.
c. it through wouldn't.
d. it through volta.
e. volts through it.
Computers and Technology
2 answers:
Sergio [31]3 years ago
7 0
It’s b just really got to make since an read it right that’s all
guapka [62]3 years ago
5 0

Answer:

e. volts through it

Explanation:

volts through it

You might be interested in
_____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
Maksim231197 [3]

Answer:

The answer to this question is "Confidentiality".

Explanation:

The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.

So the answer to this question is Confidentiality.

4 0
3 years ago
What is the arc of technology it can't be a brand or app
Maru [420]

aim or audacity or avatar

bluetooth or blogspot

camera or cpu or core

5 0
3 years ago
In what way, if any, are problems related to conflicts? Problems and conflicts are the same thing. Problems and conflicts are th
Marrrta [24]

Answer:

A small problem can turn into a huge one if there is conflict and it you allow it to fester,

Explanation:

according to Helpguide.org. It is a mistake to assume that all conflicts are problems because they are not. The problem is in figuring out how to effectively deal with problems that can become conflicts, according to Neil Thompson of Avenue Consulting.

4 0
2 years ago
Describe under what workloads c-scan would be preferred over c-look?
Gelneren [198K]

Many filesystems attempt to logically group inodes together in an attempt to keep data close together on the disk. Consider a file system configuration of 1KB size blocks, 16384 blocks/group, and 4096 inodes/group, with each inode sized 128 bytes.

3 0
3 years ago
If a voice call has missing data it makes it hard to understand the speaker. Therefore, we commonly allow time for a limited num
Rudik [331]

Answer:

There will be a playback buffer of 100ms due to re-transmission.

Explanation:

Video and audio packets needs to be reliable in a network, so a connection oriented protocol like TCP (transmission control protocol) is always configured for this case.

Delays in the transmission of packets can be noticeable with regards to videos and audios and they can be calculated and configured when necessary.

In this scenario, there is a re-transmission of a dropped packet, so it is not acknowledged by the receiver. An ICMP message is sent to the source with a delay of;

total delay to source: packetization delay + propagation delay + queuing delay

                                =   15ms +  25ms  +  10ms      = 50ms

Re-transmitting to the receiver, in equal condition, takes the same amount of time

        Total delay after re-transmission = 2 × 50   = 100ms.

So the maximum delay is 100ms

5 0
3 years ago
Other questions:
  • What is something you can do to stay connected to the relationships in your life while we spend this time at home?
    13·1 answer
  • A contact list is a place where you can store a specific contact with other associated information such as a phone number, email
    8·1 answer
  • A malicious program that can replicate and spread from computer to computer?
    10·2 answers
  • Ok.,so i have a sopitify account and by accident i pressed the downlaod on button and it says start you free trial i pressed tha
    11·2 answers
  • What is the purpose of networking with other businesses?
    10·1 answer
  • Which of the following statements is true of subroutines? Check all that apply.
    15·2 answers
  • MR. Tom asked her students could they plant a flower and bring it to class. Sarah brought his flower and said it was a rose. Jam
    6·1 answer
  • Write an algorithm and flowchart to display H.C.F and L.C.M of given to numbers.​
    9·1 answer
  • Why can a CPU retrieve and process bits of data quickly?
    14·1 answer
  • The scope of a temporary table is limited to what?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!