uppose the cache access time is 10ns, main memory access time is 200ns, the hard drive access time is 10ms, the tlb hit rate is 98%, the cache hit rate is 95% and the page fault rate is 0.001%. assuming non-overlapped access, what is the average access time for the processor to access an item

Answers

Answer 1

The average access time for the processor to access an item is 19.5.

What is average access time?

Average access time is defined as a standard statistic for evaluating the performance of computer memory systems. Access time is the amount of time it takes for an electronic system to respond to a request and provide the needed data.

Main memory access time = 200 ns

Cache access time = 10 ns

Hit ratio = 0.95

Average access time

= 0.95 x 10 + ( 1 - 0.95 ) x 200

= 9.5 + 0.05 x 200

= 9.5 + 10

= 19.5

Thus, the average access time for the processor to access an item is 19.5.

To learn more about average access time, refer to the link below:

https://brainly.com/question/14287236

#SPJ1


Related Questions

this environment is found near the equator on a pretend world. what combination of temperature, precipitation, and humidity best describe environment e's climate?

Answers

The combination of temperature, precipitation, and humidity that best characterizes an environment's climate is referred to as desert.

THE DESERT

Large physical characteristics of a desert include geographic boundaries, internal and invading mountain ranges, dominant soil conditions, major cavern and spring systems, external drainage systems, and outstanding bolsons with their related ephemeral lakes and internal drainage systems.

The desert is difficult to characterize, yet the following qualities can be enumerated:

- Low and irregular precipitation patterns (aridity) frequently cause drought throughout the summer months.

- Both air and soil are subject to sustained high temperatures.

- High rates of evaporation from soil surfaces.

- Severe temperature swings.

There are deserts on every continent, covering more than one-fifth of the Earth's surface area. A desert is a region that receives less than 10 inches (25 cm) of precipitation annually. Deserts are included in the category of regions known as drylands.

Deserts are characterized by low humidity (air moisture), low annual precipitation, and an overall moisture deficit, which indicates that the rate of evaporation exceeds the rate of precipitation on average. Extreme temperatures also characterize deserts.

Learn more about the desert here:

https://brainly.com/question/12556787

#SPJ4

What is the relationship between the data life cycle and the data analysis process? how are the two processes similar? how are they different? what is the relationship between the ask phase of the data analysis process and the plan phase of the data life cycle? how are they similar? how are they different?.

Answers

Answer: The data life cycle deals with the stages that data goes through during its useful life; data analysis is the process of analyzing data. And both are concerned with examination of data.


hope this helped ; )

In Python, how would you print only the first character of a string?

Answers

Answer:

mylist[0][0]

Explanation:

String indexing in Python is zero-based: the first character in the string has index 0 , the next has index 1 , and so on

Answer:

>>> s = "Hello"

>>> print(s[0])

H

write a program to simulate an experiment of tossing a fair coin 16 times and counting the number of heads

Answers

import scipy and import numpy as np. data as data bring up numpy. due to chance, rn m = 10**5

Create a computer software to imitate a coin-tossing experiment?This should only require one to three lines of numpy code. (Generate a 2d array of 10**5 x 16 random numbers between 0 and 1 using np.random.uniform1).Then, transform values less than 0.5 to True, or "head," and count how many heads there are on each simulated coin.This is the code:

[tex]import numpy as np\\import scipy.stats as stats\\import numpy.random as rn\\m = 10**5; # number of coins\\N = 16; # number of tosses each coin\\sims = np.empty(N)\\for j in range(N):\\flips = np.random.randint(0, 2, m)\\sims[j] = np.sum(flips)print(sims[:])[/tex]

[tex]starter code:import numpy as npimport matplotlib.pyplot as pltfrom numpy.core.fromnumeric import size#%% Q1 setupimport scipy.stats as statsimport numpy.random as rnrn.seed(0)#%% Q1am = 10**5; # number of coinsN = 16; # number of tosses each coinarr = rn.uniform(0,1,size=(m,N))# find headCount[/tex]

To learn more about computer software to imitate a coin-tossing experiment refer to:

https://brainly.com/question/14751194

#SPJ4

write a program prints the sum of the first n positive integers. this is calculated by adding all the numbers from 1 up to the number, n, together. for example, if n were equal to 5, then we’d have 5 4 3 2 1

Answers

If the positive integer n is 5 then output value ,mean by adding all the numbers from 1 up to 5 is 15.

what is integer?

An integer, sometimes referred to as a whole number in algebra, is a number whose decimal (or fractional) portion equals zero. Positive whole numbers, negative whole numbers, zero, and other integers make up the set of all integers.

what is a positive integer?

A whole number higher than zero is what constitutes a positive integer. Every counting number is contained in the set of positive integers (that is, the natural numbers).

#include <iostream>

int main() {

   int n, sum = 0;

    cout << "Enter a positive integer: ";

    cin >> n;

  for (int i = 1; i <= n; ++i) {

       sum += i;

   }

cout << "Sum = " << sum;

   return 0;

}

Input: n = 5

Output: Sum of digits in numbers from 1 to 5 = 15

To know more about positive integers visit:

https://brainly.com/question/26051073

#SPJ4

40 points to answer all four questions each in 2- 4 sentances minimum

1. What are some challenges that photographers face when trying to take a great image? What can they do to overcome these challenges?

2. What are some elements that separate good images from great images? How have you used these elements in your photography practice to create great images?
3. What purposes can photographers have for taking photographs? Select one purpose and describe a photograph that MOST LIKELY would be taken to meet that purpose.
4. In photography, what does it mean to capture images with your audience in mind? How have you taken photographs while keeping your audience in mind?

Answers

1. Some challenges that photographers face when trying to take a great image include:

Short Windows of Time for the Best Light · Capturing a Scene as it Appears to the Eye

2. Some elements that separate good images from great images include:

Light.Subject.Composition

3. The purposes that photographers have for taking photographs include:

Memorial.Communicative:Creative

4. To capture images with your audience in mind simply means to have the emotions and feelings of the audience in mind.

What is photography about?

Photographs are important in everyone's life because they connect us to our past and remind us of people, places, feelings, and stories from our past. They can assist us in determining who we are.

When we talk about capturing the moment in photography, we're really referring to the photo's feeling, emotion, vibe, or atmosphere. That comes from more than just the subjects or the surroundings; it also comes from the photographer.

Learn more about photograph on:

https://brainly.com/question/25821700

#SPJ1

Julian is working on a form in Access, as shown below.

(i couldnt find the image on this one sorry)

Julian would like to create a subform using "frmOrderDetails.” Which steps should he follow?

a. He should right-click on the form under the Forms list and choose Embed from the drop-down list.

b. He should double-click on the form under the Forms list and save it as “frmRetailers.”

c. He should click on the form under the Forms list and drag and drop it onto the “frmRetailers” forms.

d. He should left-click on the form under the Forms list and save it as “subfrmRetailers.”

Answers

Since Julian would like to create a subform using "frmOrderDetails.” The steps that he should follow is c. He should click on the form under the Forms list and drag and drop it onto the “frmRetailers” forms.

What is the foam about?

Right-click the form you wish to use as the main form in the Navigation Pane, and then select Layout View. From the Navigation Pane, drag the form you want to use as the subform onto the main form.

Subforms are forms inside other forms. Whenever there is a one-to-many relationship and you wish to display data from numerous tables, you often use it. For instance, if you wanted to display an order along with the order details, you would use a subform.

So, When you wish to display data from tables or queries with a one-to-many relationship, subforms are extremely helpful. For instance, a Customer form might have a subform that shows the Orders for each customer.

Learn more about form from

https://brainly.com/question/3491847
#SPJ1

Which of the following provides information on the subnets within your network, including the subnet addresses and the routers connecting each subnet?

Answers

The network diagram provides information on the subnets within the network, including the subnet addresses and the routers connecting each subnet.

A network diagram can be described as a visual representation of a telecommunications or computer network. It illustrates the components that make up a network and how they interact, including devices, routers, hubs, etc.

Depending on its purpose and scope, a network diagram may consist of a lot of detail or just provide a broad overview.

Networks help the determination of the impact of early or late starts or finishes, issue information about the allotment of resources, and permits managers to do “what if” analyses. With this information, managers may view the status of the plan, evaluate alternatives and analyze progress.

To learn more about network diagrams; click here:

https://brainly.com/question/15072171

#SPJ4

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
answer choices
Change management
Acceptable use
Resource allocation
SLA

Answers

Change management

Change management policies outlines the process you should follow before implementing a new security device on your network.

What is Change management policies?

Change Management attempts to reduce the risk associated with Change. Change is defined by preferred practices as "the addition, modification, or removal of anything that may have an effect on University IT services." Modifications to IT infrastructure, applications, systems, processes, documentation, supplier interfaces, and so on are all included.

Scope:

The owner of the change must submit a change request via the ITS Change Management module within Ivanti Service Manager (ISM). The change should not be implemented until it has been reviewed and approved in accordance with the procedures outlined in this policy.

To know more about Change management policies, visit: https://brainly.com/question/28096717

#SPJ4

A(n) _____ is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions.
a. artificial agent
b. knowledge engineer
c. expert system
d. intelligent agent
Answer: b

Answers

An knowledge engineer is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions.

What is programmer?

Programmer is defined as a person who writes/creates computer programs by instructing a computer with precise programming instructions. Programming languages are the names of the different languages in which the instructions are provided. Programming languages come in numerous varieties.

A knowledge engineer is defined as a specialist in the discipline of incorporating sophisticated logic into computer systems in an effort to replicate human decision-making and complex cognitive activities. High-quality data expertise and in-depth understanding of problem-solving techniques are prerequisites for knowledge engineering.

Thus. an knowledge engineer is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions.

To learn more about programmer, refer to the link below:

https://brainly.com/question/13956629

#SPJ1

In the early days of networking, the most common way to transmit data was via ____, dial-up telephone lines.a. directly-connected b. sharedc. linkedd. switched

Answers

In the early days of networking, the most common way to transmit data was via (Option D.) switched, dial-up telephone lines.

Early Data Transmission Methods in Networking

The most common way to transmit data in the early days of networking was through switched dial-up telephone lines. In this method, a user would connect to an ISP (Internet Service Provider) using a modem and a telephone line, and then the data was transmitted through the switched telephone line. This was a fairly reliable method of data transmission, although it was slow and limited in capacity. As technology improved, it was eventually replaced by faster data transmission techniques such as:

DSLCableFiber optics.

Learn more about the Internet: https://brainly.com/question/27003790

#SPJ4

use your knowledge of management communications to select the three missing labels from the following image. sources: adapted from mintzberg, h. (1973). the nature of managerial work. new york, ny: harper and row; daft, r. l. (2005). the leadership experience (3rd ed., p. 346). cincinnati, oh: south-western. a. b. c.

Answers

A leader is the person in charge, the person who persuades others to follow. A great leader instills trust in others and motivates them to take action.

What is the true meaning of a leader?

A leader is someone who inspires followers' passion and motivation. A leader is someone who has a vision and a plan for achieving it. A leader is someone who ensures their team has the resources and tools they need to succeed.

Communications management is the systematic planning, implementation, monitoring, and revision of all communication channels within and between organizations.

An overview was given as the image isn't given.

Learn more about leader on:

https://brainly.com/question/12522775

#SPJ1

A landscaping company's employees receive payment for their services using a credit card reader that physically attaches to an Apple mobile device. Which of the following connection types is being used?
Lightning

Answers

Since the landscaping company's employees receive payment for their services using a credit card reader that physically attaches to an Apple mobile device. The  connection types that is being used is option Lightning.

What is lightning?

A massive electrical spark known as lightning can form between clouds, in the air, or on the ground. Air serves as an insulator between the positive and negative charges in the cloud and between the cloud and the ground during the early stages of development.

Therefore, in regards to computing, one can say that it was a product of Apple Inc. that  developed and constructed the Lightning computer bus and power connector, which was released on September 12, 2012, to replace the 30-pin dock connector.

Learn more about Lightning from

https://brainly.com/question/21765245
#SPJ1

a technician is using the security tab in the properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. what step would the technician take to make the change?

Answers

The step would the technician take to make the change is to click the Advanced button to open Advanced Security Settings for the file. The correct option is d.

What is the security tab?

You can configure access rights on the user object using the security tab of the machine properties window. You can grant or deny permissions to other groups and users over the user object using the security tab.

Go to the My Account page on the web to enable two-step verification and access all of your other account security options.

Therefore, the correct option is d, click the Advanced button to open Advanced Security Settings for the file.

To learn more about the security tab, refer to the link:

https://brainly.com/question/4180164

#SPJ1

The question is incomplete. Your most probably complete question is given below:

The technician should be setting NTFS permissions instead of using Group Policy.

Lengthen the time period between forced password changes.

The principle of least privilege was not followed.

Click the Advanced button to open Advanced Security Settings for the file.

You need to configure the FastEthernet 0/1 interface on a switch to automatically detect the appropriate link speed and duplex setting by negotiating with the device connected to the other end of the link.
Drag the command on the left to the approbate configuration step on the right to accomplish this. Not all of the commands may be required
Enter global configuration mode
conf t
Enter interface configuration mode
int fa0/1
Set speed of the interface
speed auto
Set the duplex setting for the interface
duplex auto

Answers

To configure the FastEthernet 0/1 interface on a switch to automatically detect the appropriate link speed and duplex setting by negotiating with the device connected to the other end of the link. The commands are as follows:

Enter global configuration mode
conf tEnter interface configuration mode
int fa0/1Set the speed of the interface
speed autoSet the duplex setting for the interface
duplex auto

What is an ethernet networking interface?

An Ethernet networking interface, often known as a network client, is a circuit board or card that is installed in a personal computer or workstation. A local area network (LAN) connection can be made by a computer or mobile device utilizing Ethernet as the transmission medium.

An Ethernet networking interface must adhere to a variety of Ethernet standards with various transmission speeds and error correction types/rates. A networking interface for an Ethernet network can use any type of transmission hardware, including fiber optic, coaxial copper, and wireless, depending on the capabilities of the hardware it is sending to or receiving from and the required network transfer rates.

Ethernet is a standard for the transmission of binary data, but even though its hardware characteristics are defined, it is hardware-independent.

To learn more about ethernet networking interface, use the link given
https://brainly.com/question/14775265
#SPJ4

Write a program that reads a person's first and last names separated by a space, assuming the first and last names are both single words. Then the program outputs last name, first name. End with newline.

Answers

Below is the program written in C++ that reads a person's first and last names separated by a space, assuming the first and last names are both single words.

Coding Part:

#include<iostream>

using namespace std;

int main(){

string lname, fname;

cout<<"First name: ";

cin>>fname;

cout<<"Last name: ";

cin>>lname;

cout<<lname<<", "<<fname;

return 0;

}

Explanation of all the steps:

This line declares lname, fname as string to get the user's last name and first name, respectively

string lname, fname;

This line prompts the user for first name

cout<<"First name: ";

This line gets the user first name

cin>>fname;

This line prompts the user for last name

cout<<"Last name: ";

This line gets the user last name

cin>>lname;

This line prints the desired output

cout<<lname<<", "<<fname;

To know more about C++ Programming, visit: https://brainly.com/question/13441075

#SPJ4

nadia uses the disk management tool to create a simple volume in one of the disks. she specifies the simple volume size and chooses a drive letter. while selecting the formatting options, she modifies the default allocation unit size. what will happen if the allocation unit size is large?

Answers

Since Nadia uses the disk management tool to create a simple volume in one of the disks.The thing that will happen if the allocation unit size is large is option A: The performance of file sharing applications will increase.

What do file sharing programs do?

The use of the peer-to-peer architecture, a file sharing program is a program created to send or receive digital files in course or over a network.

Note that Utility software called disk management tools is used to manage data on disk by carrying out various operations on it. Additionally, they carry out tasks including managing drives, formatting disks, verifying disks, and dividing devices.

Therefore, one can say that there is no need to buy, maintain, or use expensive equipment or additional storage space because files can be transferred immediately through an internet connection.

Learn more about file sharing applications  from

https://brainly.com/question/29480520
#SPJ1

See full question below

Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large? ​ Question 11 options: a) The performance of file sharing applications will increase. b) The performance of database applications will increase. c) The performance of file sharing applications will decrease. d) The performance of database applications will decrease.

You have an application that renders videos used in your online business. You want tomake sure that the application continues to receive adequate attention from the systemCPU, even if you open other applications. How can you adjust the amount of attentiongiven to that application?

Answers

In the Task Manager, change the application's priority setting. Right-click the application in the "Details" tab and choose "Set Priority." Select "low," "normal," "high," "real time," or "above normal," from the drop-down menu.

How does application work?

An client application, often known as a software application or app for brief, is a computer program that is used by end users and is created to do a specific task that is unconnected to the operation of the computer. Applications include word processing, media players, and accounting systems. All apps are alluded to together by the word "application software." Software system, that is related to how computers work, and utility software are the other two main categories of application ("utilities"). Applications could includes pre just on computer.

To know more about application
https://brainly.com/question/14400492
#SPJ4

which of the following purposes do wireless site surveys fulfill? (select two.) answer identify the recommended 100 degree separation angle for alternating access points. document existing infrared traffic in the 5.4 ghz spectrum. determine the amount of bandwidth required in various locations. identify the coverage area and preferred placement of access points. identify existing or potential sources of interference.

Answers

The physical examination of a location where a wireless radio frequency (RF) network will be built is known as a wireless site survey.

What is a wireless site survey?In order to measure wireless coverage, data rates, network capacity, roaming capability, and service quality, the study evaluates the surrounding environment.In order to identify where your signal will be strongest and weakest, it is important to display the wireless coverage areas (often using heatmaps).Additional names include WLAN site surveys, wireless network surveys, RF site surveys, and networking site surveys.In other words, a survey is carried out to make sure your company makes the most of your wireless network and ultimately saves you money (and aggravation).Any setting, including a warehouse, office, hospital, hotel, or school, is suitable for site surveys.The two main goals are:identifying RF coverage and interference areasChoosing where to put access points.

To Learn more About  wireless site survey refer To:

https://brainly.com/question/15681936

#SPJ1

when using selection sort, how many times longer will sorting a list of 63 elements take compared to sorting a list of 7 elements?

Answers

When using selection sort, it will 4 times longer in sorting a list of 63 elements compared to sorting a list of 7 elements.

What is a selection sort?

An in-place comparison sorting algorithm in computer science is called selection sort. It performs worse than the equivalent insertion sort in general because it has an O(n2) time complexity, which makes it ineffective on large lists. In some circumstances, especially when auxiliary memory is constrained, selection sort, known for its simplicity, outperforms more complex algorithms in terms of performance.

The algorithm separates the input list into two parts: a sorted sublist of items that is built up from left to right at the front (left) of the list and a sublist of the remaining unsorted items that take up the remainder of the list. The unsorted sublist initially consists of the entire input list, while the sorted sublist is initially empty.

Learn more about selection sort

https://brainly.com/question/14267025

#SPJ4

How does html help solve the problem of telling a computer what goes on a web page and how it should be organized?.

Answers

HTML tells your browser about the structure of your document

Which combination of keys is used to exit from terminal of Linux?
a) ctrl + t b) ctrl + z
c) ctrl + d d) ctrl + e

Answers

The combination of keys is used to exit from terminal of Linux is CTRL + D.

Linux has a lot of shortcuts, one of which is CTRL + D which works log you out of the current terminal. If you are using a terminal directly, the application will be closed immediately.

Learn more about Linux Shorcuts at : brainly.in/question/18123958

#SPJ1

Answer:

c. ctrl + d

Explanation:

you are currently logged in using the badams account. you want to view the contents of the /etc/inittab file, but you are not allowed to with the badams account. which command could you use to view the file?

Answers

The command that can be used to view the file is su -c "cat /etc/inittab" -l. The command in computer is a code that is used to tell (someone) to do something in a forceful and often official way.

A command in computer refers to a single order from a user to the computer's operating system or to an application to show a service, such as "Show me all my files" or "Run this program for me.

Kind of command there are:

Group management commands. Array management commands.Global commands.

The commands are a kind of sentence to tell someone to do something. The other kind of command are: questions, exclamations and statements.

Learn more about the command, here https://brainly.com/question/13994833

#SPJ4

a college student logs onto a college computer for the first time. which security policy category should be presented to the student?

Answers

Answer:

acceptable use policies

a managed network device experiences an event - one of its managed ports goes down - and this device sends a udp message (trap) to a central management server. what is the name of the service that will receive this trap?

Answers

The service that will receive this trap is called SNMP, or "Simple Network Management Protocol."

The internet protocol suite, a collection of the most widely used communication protocols online, contains the application layer protocol SNMP.

In the 1980s, as organisational networks grew in size and complexity, SNMP was developed. One of the most extensively used protocols for network monitoring today is this one.

SNMP is used to gather information about network changes or to check the status of devices linked to networks. SNMP communicates with your network to gather details about this network device activity. For instance, it monitors the number of hits a web server receives, the number of bytes, packets, and errors sent and received on a network. IT specialists can keep a pulse on all of their managed devices and applications by gathering this data.

The performance metrics of every device in the network can be accessed in real time using SNMP, TCP, and other types of probes. Software can notify system administrators of problems when thresholds for specific values are surpassed, allowing them to investigate the data and find a fix.

To learn more about SNMP click here:

brainly.com/question/20435216

#SPJ4

Which is true about font use in presentation slides? bright font colors should always be used. only one font size should be used. font size should be at least 24 point. font and background color should contrast.

Answers

font and background color should contrast is the true statement about font use in presentation slides.

Because Contrast is the synonym for different things. If the font color is the same as the present background, no one will be able to see the text because it will blend into the background.

What is presentation slides?

A slide in a slide show or slide presentation is a single page or image displayed in a slideshow. When watching a ten-picture slideshow, for example, a single image is considered a slide.

A slide is one page of text, images, or animations in a presentation or program such as Microsoft PowerPoint. For example, the slide layout to the right shows four slides.

To learn more about presentation slides, visit: https://brainly.com/question/938745?referrer=searchResults

#SPJ4

Answer: Bright font colors should always be used.

Explanation:

question 4 what is the purpose of dns round robin technique? 1 point to resolve an ip to a domain name to redirect traffic from one domain name to another to route traffic to different destinations, depending on factors like location, congestion, or link health to balance traffic

Answers

The fundamental purpose of round robin DNS is to evenly divide the load among geographically dispersed Web servers.

What does the DNS round robin technique accomplish? Mutual exclusion .The primary function of DNS is to evenly divide the load among geographically dispersed Web servers.Routing method that distributes the requests among a list of IP addresses in an orderly form, balancing the traffic for those addresses.A DNS query is an information request to a DNS server.For instance, your browser performs a DNS query each time you input a domain name, such example.com, to find the IP address associated with that domain name. Circle RobinBy controlling the Domain Name System's (DNS) responses to address requests from client computers in accordance with an appropriate statistical model, DNS is a technique for load distribution, load balancing, or fault-tolerance provisioning multiple, redundant Internet Protocol service hosts (e.g., Web servers, FTP servers).

To learn more about round robin technique refer

https://brainly.com/question/16085712

#SPJ1

Which Photoshop tool allows users to select an area of an image using a specific color, or color range?

Answers

Answer:

Color picker tool.

Explanation:

There are a few different ways that you can select a specific color in Photoshop. One way is to use the color picker tool. With this tool, you can click on any area of your image and the color picker will sample the color for you.

As you already know, a stack is a data structure realizing the so-called LIFO (Last In - First Out) model. It's easy and you've already grown perfectly accustomed to it.
Let's taste something new now. A queue is a data model characterized by the term FIFO: First In - Fist Out. Note: a regular queue (line) you know from shops or post offices works exactly in the same way - a customer who came first is served first too.
Your task is to implement the Queue class with two basic operations:
put(element), which puts an element at end of the queue;
get(), which takes an element from the front of the queue and returns it as the result (the queue cannot be empty to successfully perform it.)
Follow the hints:
use a list as your storage (just like we did in stack)
put() should append elements to the beginning of the list, while get() should remove the elements from the list's end;
define a new exception named QueueError (choose an exception to derive it from) and raise it when get() tries to operate on an empty list.
Complete the code we've provided in the editor. Run it to check whether its output is similar to ours.
Expected output
1 dog False Queue error

Answers

Using knowledge in computational language in JAVA it is possible to write a code that put() should append elements to the beginning of the list, while get() should remove the elements from the list's end; define a new exception named.

Writting the code:

var Stack = function(){

 this.top = null;

 this.size = 0;

};

var Node = function(data){

 this.data = data;

 this.previous = null;

};

Stack.prototype.push = function(data) {

 var node = new Node(data);

 node.previous = this.top;

 this.top = node;

 this.size += 1;

 return this.top;

};

Stack.prototype.pop = function() {

 temp = this.top;

 this.top = this.top.previous;

 this.size -= 1;

 return temp;

};

var Queue = function() {

 this.first = null;

 this.size = 0;

};

var Node = function(data) {

 this.data = data;

 this.next = null;

};

Queue.prototype.enqueue = function(data) {

 var node = new Node(data);

See more about JAVA at brainly.com/question/12975450

#SPJ1

state two other ways gaming company cloud use cookie​

Answers

Answer:

1. to track user activity

2. to track user preferences

Other Questions
which area receives the highest annual rainfall in America? T/F: Using the hosted software model implies that a small business firm needs to employ a full-time IT person to maintain key business applications. Write the equation of the line in fully simplified slope-intercept form.I dont know what im doing wrong What are examples of types of chemical markers associated with dna that determines when, where and by how much genes are expressed in each cell?. Is "de nada" an appropriate response toboth "gracias" and "muchas gracias?" Which of the following would likely cause aggregate demand to shift to the left? O Higher interest rates discouraging borrowing O lower interest rates discouraging borrowing. O lower consumer confidence about the future higher tariffs on all imports into Canada. brayden was a 60% free throw shooter last season. he practiced all through the off-season and has made 12 of the first 16 free throws this season. based on his performance and the results of the simulation, is there convincing evidence that brayden has improved his free-throw percentage? explain. the dream theory that suggests our dreams reflect the same thoughts, fears, and concerns present when we are awake is called: what is the product of 5/6 x 2/3 Predict the missing component of each reaction. ? + 2 upper n a upper b r right arrow 2 upper n a upper c l plus upper b r subscript 2. Hcl cl2 na hbr right arrow upper m g upper o plus upper h subscript 2. ? cho c2h2 + co2 co2 + 2h2o c + 2h2o. donna is an od practitioner who is just learning how to develop a performance appraisal. what could hinder her from being successful in implementing her appraisal? What level of damage can the unauthorized disclosure of information classified as confidential cause? The complex fifth roots of 5-5sqrt3i 50 POINTS!!!! Discussion TopicBetween 1915 and 1945, the United States went through World War I, thebooming 1920s, the Great Depression of the 1930s, and World War II. Although thistime period was traumatic for many Americans, it also transformed the USidentity. Think of the 1920s in contrast with the Great Depression of the 1930s.Which of these two time periods do you think has had a bigger impact on thedevelopment of US society, either from a political or cultural viewpoint? Explainwhy. Please put in your own words if you dont let me know so I can thank you. __________ were initially developed to destroy the part of the brain that controls emotions. Electric shocksmood stabilizerslobotomiesantidepressants. what is the minimum energy required for the craft to leave the orbit and escape the moons gravitational field? add one or more curved arrows to show the movement of electrons in the reaction: to draw the arrows, select more in the drawing menu, then select the appropriate curved arrow. click on a bond or electron to start a curved arrow. do not start from an atom. use the select tool to move the arrow head and tail to the desired placement. the curved arrow changes from red to black when appropriately placed. draw a curved arrow. do not add or delete any bonds or atoms. a client has recently been diagnosed with gastric cancer. on palpation, the nurse would note what two signs that confirm metastasis to the liver? select all that apply. the expansion of sugarcane plantations in south america and the caribbean proved unsustainable due to a local shortage of what essential commodity? armstrong corporation manufactures bicycle parts. the company currently has a $19,300 inventory of parts that have become obsolete due to changes in design specifications. the parts could be sold for $7,100, or modified for $9,900 and sold for $21,300. required: 1. identify the relevance of the data given in the exercise to the decision about what to do with the obsolete parts.