1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alborosie
3 years ago
8

Choose the best collection for each situation.

Computers and Technology
1 answer:
slega [8]3 years ago
6 0

Answer:

Deque: You need to keep a record of the ages of the last 50 customers visit a restaurant. As new customers come in you delete the age that has been in the list the longest.

Tuple: You need to store the GPS coordinates of the hospitals in a state in order to find the nearest hospital for ambulance helicopters.

List: You write a loop to save anywhere from 10 to 100 values from a user. You will pass the collection to a function to find the average.

Explanation: Just got the results back no thanks to the guy above

You might be interested in
Meryll is thinking of creating a painting of a historical site. She has seen a similar painting put up online by another artist.
san4es73 [151]
I believe its c, the third option 
3 0
3 years ago
7d2b:00a9:a0c4:0000:a772:00fd:a523:0358
motikmotik

Answer:

yh3iuskjldnsjfhbcgfihekwfhei3wh8hfefbgp

Explanation:

6 0
3 years ago
A _______ is a host that runs software to provide information, sucha s web content, to other hosts.
elixir [45]

Answer:

Server

Explanation:

Servers are used to house information from websites to video games.

3 0
3 years ago
I’m printing a paper but it told me “printer has a paper jam” what does that mean?
wlad13 [49]
As the other guy said it means it’s jammed, in other words, it means it’s stuck
5 0
3 years ago
Secure software development: a security programmer's guide by jason grembi isbn-10: 1-4180-6547-1, isb-13: 978-1-4180-6547
a_sh-v [17]

Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

<h3>What is secure software development practices?</h3>

Secure software development is  seen as a method that is used form the creation of a lot of software that uses both security into all of the phase of the software development making cycle.

This book is known to be  A Programmer's Guide that can be able to  leads readers in all of the tasks and activities that one can do to be successful computer programmers and it is one that helps to navigate in the area of reading and analyzing requirements as well as choosing development tools, and others.

Hence, Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

Learn more about  Secure software development  from

brainly.com/question/26135704

#SPJ1

7 0
2 years ago
Other questions:
  • If you want to refine your Google search results by date, which option should you use?
    8·1 answer
  • Alicia is a dietitian. She gives other people suggestions for nutrition. She wants to organize a large amount of data concerning
    13·1 answer
  • Which of the following best describes the purpose of child labor laws?
    13·2 answers
  • Web services can exchange information between two different systems only if the operating systems and programming languages upon
    10·1 answer
  • What are the arguments for writing efficient programs even though hardware is relatively inexpensive?
    10·1 answer
  • Which term describes the process by which light passes through an object or a medium.
    7·2 answers
  • 1.Which of the following class definitions defines a legal abstract class?a. class A { abstract void unfinished() { } }b. class
    7·1 answer
  • The remove() method in the Queue interface ________. Group of answer choices retrieves, but does not remove, the head of this qu
    14·1 answer
  • 3 features of digital computer​
    8·1 answer
  • Which of the following are valid variable names? Select 2 options.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!