1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alborosie
3 years ago
8

Choose the best collection for each situation.

Computers and Technology
1 answer:
slega [8]3 years ago
6 0

Answer:

Deque: You need to keep a record of the ages of the last 50 customers visit a restaurant. As new customers come in you delete the age that has been in the list the longest.

Tuple: You need to store the GPS coordinates of the hospitals in a state in order to find the nearest hospital for ambulance helicopters.

List: You write a loop to save anywhere from 10 to 100 values from a user. You will pass the collection to a function to find the average.

Explanation: Just got the results back no thanks to the guy above

You might be interested in
Practice using filters and tables using this document.
mestny [16]

Answer:

Do you still need help?

Explanation:

4 0
3 years ago
What is the name of the option in most presentation applications with which you can modify slide elements?
Alexeev081 [22]
Hello  <span>Meadowmilliganp1t1nj 
</span>
Question: <span>What is the name of the option in most presentation applications with which you can modify slide elements?

Answer: View Master

I hope I helped :-)
-Chris</span>
6 0
3 years ago
Read 2 more answers
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
Is it possible to have the present value of a future payment that is greater than the future payment (i.e. the present value is
asambeis [7]

Note that the present value always less than the future value and so Is it not possible to have the present value of a future payment that is greater than the future payment.

<h3>Can present value be greater than future cash flows?</h3>

The present value is known to be often less than the future value this is due to the reason that money has interest-earning rate on top of it.

So therefore, that base on the fact that as long as interest rates are positive, then the present value of a sum of money will have to be less than its future value.

Learn more about present value from

brainly.com/question/20813161

6 0
3 years ago
408 request timeout your browser didn't send a complete request in time
Alik [6]
<span>408 Request Time out error messages are often customized by every website. These messages are especially for large websites that take long time to process itself.
</span>
<span /><span>Causes for these messages:
The 408 Request Timeout error is an HTTP status code that says that your request is not send to the server in the given time. In other words, your website connection is “timed out”
</span>


6 0
4 years ago
Other questions:
  • (GAME DESIGN)
    15·1 answer
  • Why should you not perform any personal grooming task while driving?
    5·2 answers
  • ​Which of the following styles sets the column breaks within paragraphs to leave a minimum of two and three lines at the top and
    11·1 answer
  • Service-oriented architecture (SOA) provides a way for apps on a network to talk to each other using all these ways, EXCEPT ____
    10·1 answer
  • Which item is most likely to be a standard part?
    14·1 answer
  • If you have four documents open and click the x button on the title bar, _____.
    8·1 answer
  • Another method that might be desired is one that updates the Goalie's jerseyNumber. This method will receive a new number of Jer
    9·1 answer
  • What type of platform is Twitter?
    10·2 answers
  • To create a cell reference in another spreadsheet you must need to start with _______ sign.
    14·1 answer
  • Explain in detail what it means to synchronize computers and mobile devices and include at least two strategies for keeping your
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!