1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLga [1]
3 years ago
12

Extend the class linkedListType by adding the following operations: Write a function that returns the info of the kth element of

the linked list. If no such element exists, terminate the program. Write a function that deletes the kth element of the linked list. If no such element exists, terminate the program.
Computers and Technology
1 answer:
WINSTONCH [101]3 years ago
6 0

Answer:

Explanation:

The following code is written in Java. Both functions traverse the linkedlist, until it reaches the desired index and either returns that value or deletes it. If no value is found the function terminates.

public int GetNth(int index)

       {

       Node current = head;

       int count = 0;

       while (current != null)

       {

       if (count == index)

       return current.data;

       count++;

       current = current.next;

       }

       assert (false);

       return 0;

       }

public int removeNth(int index)

       {

       Node current = head;

       int count = 0;

       while (current != null)

       {

       if (count == index)

       return current.remove;

       count++;

       current = current.next;

       }

       assert (false);

       return 0;

       }

You might be interested in
Name at least 3 different portable computer devices that can be purchased
rosijanka [135]

Answer:

Smart Phone

Cameras

Console Controller

Brainliest and please say if its right!!

3 0
3 years ago
Read 2 more answers
What will cloud cumputing offer
seropon [69]
Cloud computing allows computers from all around the world that are not being used to be able to do extra computations. This removes many of the limitations of a single computer and lets the user calculate things much faster.
6 0
4 years ago
Molly, an end user, connects an external monitor, external keyboard and mouse, and a wired network cable to her laptop while wor
ale4655 [162]

Answer:

The answer is D and E

Explanation:

There is no much difference between a port replicator and a docking station. These two terms are used interchangeably and both serve the same purpose of connecting portable computers with other devices with little or no effort. The main difference between the two is that a port replicator provides a solution for all laptops through USB while a docking uses a propriety connector to the computer. Users can use a docking station and a port replicator to convert their laptop PCs into desktop computers when at home or in the office.

7 0
3 years ago
_____ targeting techniques increase the effectiveness of banners, rich media, and video ads.
Delvig [45]

Banner, rich media, and video ad effectiveness is increased through behavioral targeting strategies.

<h3>What are Behavioral targeting techniques?</h3>
  • A marketing strategy called "behavioral targeting" makes use of data about web users to enhance advertising campaigns.
  • The method entails obtaining information on a potential customer's web browsing and purchasing habits from a range of sources.
  • In order to assess which advertisements and messages will be most effective with a certain audience, behavioral targeting is used.
  • To launch personalized marketing, it makes use of behavioral data, such as what users do or don't do in your app, on your website, or with your campaigns.
  • An illustration of behavioral targeting would be if a customer frequently visited a website with evaluations of thermometers for home use or conducted a search for thermometers, then went to a website for the producer of thermometers.

To learn more about  Behavioral targeting techniques, refer to:

brainly.com/question/28025161

#SPJ4

4 0
2 years ago
I NEED TO FIND OUT THE ANSWER!
vladimir1956 [14]

Answer:

the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer

7 0
3 years ago
Other questions:
  • Today car-buying customers can enter negotiation armed with accurate facts and figures about a car. Describe how car buyers felt
    9·1 answer
  • Anchor hyperlink to position the cursor to the section called sisters? i need a code pls
    15·1 answer
  • Jordan has been asked to help his company find a way to allow all the workers to log on to computers securely but without using
    6·1 answer
  • What's the screen that displays results from typing text, performing calculations, or running programs?
    11·1 answer
  • Write an expression to compute the quartic root of x. the quartic root of a number is the square root of its square root. exampl
    11·1 answer
  • It's fill the gap homework
    7·1 answer
  • You may have come across websites that not only ask you for a username and password, but then ask you to answer pre-selected per
    11·1 answer
  • What is an infrastructure dedicated to one organization
    13·1 answer
  • I have a top-secret recipe for the greatest cookie dough I have made and I want to keep the recipe a secret so I apply for a? *
    15·1 answer
  • "Bookings are to be stored in three separate
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!