Answer:
B.O(1)
Explanation:
When we are implementing ADT stack using linked chain we can pop an entry from the stack having O(1) time complexity because in linked chain we have the head or top pointer in linked chain only.Popping and pushing in stack happens on only one end that is top.So we have move to move top in linked chain to the next and delete prev node.
Answer:
False
Explanation:
The Vigenere cipher is an encryption method that uses a series of interwoven Ceaser ciphers and a keyword to encrypt text. The difference between this cipher and the Ceaser cipher is the tabular interwoven Ceaser cipher and the keyword.
Multiple keywords can be used in the Vigenere cipher. The use of this keyword makes the brute-force decipher algorithm unreliable for decoding text encrypted with it.
Answer:
The answer is nearest-neighbor learning.
because nearest neighbor learning is classification algorithm.
It is used to identify the sample points that are separated into different classes and to predict that the new sample point belongs to which class.
it classify the new sample point based on the distance.
for example if there are two sample points say square and circle and we assume some center point initially for square and circle and all the other points are added to the either square or circle cluster based on the distance between sample point and center point.
while the goal of decision tree is to predict the value of the target variable by learning some rules that are inferred from the features.
In decision tree training data set is given and we need to predict output of the target variable.
Explanation:
Hi,
Answer: Home Router
<u>My work:</u> Your I.P. Address is usaully located by your Home Router or otherwise sometimes called your Internet Box. The purpose of an I.P. Address is to Identify (Who’s using it) and Where they are using it.
I Hope I Helped!