1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
2 years ago
15

Question #3

Computers and Technology
2 answers:
r-ruslan [8.4K]2 years ago
8 0
A deque is a type of list
Alex17521 [72]2 years ago
3 0

Answer:

D. A deque i a type of collection

Explanation:

I do computer science too ;3

You might be interested in
What are the differences and similarities of computer virus and biological virus. Give 4 examples
Papessa [141]

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

6 0
3 years ago
Renting provides _________ flexibility but can lead to _________ costs in the long-term.
docker41 [41]
Renting provides greater flexibility but can lead to higher costs in the long term.
3 0
4 years ago
Read 2 more answers
What is the best approach to testing a website
Ronch [10]

A vital part of any website project is the quality assurance stage. Prior to launch, final QA testing ensures that your site is working according to your expectations and that your site users won’t be frustrated with any non-functioning pages.

7 0
3 years ago
Create a Double complementary or tetradic colors (are a set of two complementary pairs of colors that form a rectangle on the co
hjlf

Answer:

(Remember, two colors are complementary if they are opposite each other ... colors are connected on the color wheel they form a rectangle.

Explanation:

best one i could find if worng am verys very sorry.

4 0
3 years ago
Read 2 more answers
You have purchased an LED monitor and connected it to the HDMI port on your computer using an HDMI cable. You configure the scre
Feliz [49]

Answer:

Change the screen resolution to the native resolution of the monitor

Explanation:

Every monitor has a native resolution that shows pixels and colors best. Modern monitors are usually 1920x1080 or higher. If the resolution given to the monitor is not native to the monitor, then the pixels on the screen will appear pixelated or distorted.

7 0
2 years ago
Other questions:
  • List and briefly defined categories of security services.
    8·1 answer
  • Why might a peer-to-peer network not be the best choice for a large corporate office setting?
    14·1 answer
  • Write a program with a function that accepts a string as an argument and returns a copy of the string with the first character o
    11·1 answer
  • List two ways that search engines and electronic databases are similar and three ways that search engines and electronic databas
    13·2 answers
  • Hey does anybody know how to delete history on a school-issued chrome book, I tried to delete it but it won't let you clear your
    7·1 answer
  • FS and GS are two___________________ in protected mode.
    14·1 answer
  • Why is it important to have at least one backup stored off-site?
    8·1 answer
  • Which C99 function can be used to convert a string to a double?
    15·1 answer
  • I need the answers. i don’t get this
    11·1 answer
  • Im coding and need help please answer or comment to help. any skilled coders comment below
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!