If you were optimizing for performance and wanted to support potentially adding many new elements to an adt, then:

Answers

Answer 1

If you were optimizing for performance and wanted to support potentially adding many new elements to an adt, then a list would allow faster addition of elements than an array. The object that contains the data of similar type is called an array. When the array is created, its length of array is established.


Related Questions

________ data becomes part of your destination file and remains static even if the source data changes.
A. Embedded
B. Field
C. Integrated
D. Linked

Answers

The correct option is A that  is Embedded data.
Embedded data becomes part of your destination file and remains static even if the source data changes.
When you embedded an object, it becomes the part of destination document. when you embedded an excel worksheet in to word document, if you make changes to the excel worksheet it did not make any changes to the destination document. so when you edit the excel worksheet from the word document, you will use the editing features of excel.
It means if you embedded an excel worksheet into word document, excel worksheet remains excel worksheet.

What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (cots)?

Answers

On the computer there are always issues. For a developer to sit all day in front of a google that always invents things and the flashy images that disrupt everything. Googling on facebook is also an issue. Youtube, everything that contain flashy image is quite disruptive. If you think about content, maybe googling is less inventive. In a way it's nicer to buy applications but if you finally think of building it, there are always nicer ways of spending time. I prefer to go to seaside when I can.
Final answer:

The development of open source operating systems like Linux disrupted traditional economic models in the high-tech industry by fostering collaboration, reducing software costs, and lowering the barrier to entry for tech startups.

Explanation:

The advent of open source operating systems like Linux had a significant impact on the economics of high-tech industry. Unlike the proprietary software models of the past where companies like IBM and Microsoft dominated the market with their operating systems, open source presented a dramatically different economic model. The open source ethos encouraged collaboration, sharing, and modification, leading to heightened innovation and sharply reducing costs for both users and developers.

Previously, operating systems like UNIX began as more open but became heavily commercialized, leading to costly proprietary versions tied to specific hardware, such as IBM's AIX or Sun Microsystems' Solaris. This changed with Linux, initiated by Linus Torvalds, predicated on the idea that software should be freely available to anyone to use, modify, and distribute.

The rise of Linux and other open source software disrupted the traditional economic models, making it less necessary for companies to allocate substantial budgets to purchase software licenses. Developers could now build upon existing open-source platforms without worrying about licensing fees, reducing the barrier to entry for tech startups and encouraging a more inclusive and decentralized tech landscape.

_______ is the command for opening a spreadsheet object in a separate spreadsheet window. A. Edit > Edit Data B. Worksheet > Edit C. Table > Excel Spreadsheet D. Worksheet Object > Open

Answers

I believe the correct answer would be option D. Worksheet Object > Open is the command for opening a spreadsheet object in a separate spreadsheet window. In Microsoft excel, you can simultaneously open two worksheets so you can observe them both. 

Answer:

The correct option to the following question is D.) Worksheet Object > Open.

Explanation:

On a Ribbon Home tab, you click the File and Select Click the Selection Pane Selection pane will open, there is the list of all objects on a worksheet. Click on the object names, and then it will selected on a worksheet.

What lenses cannot be changed to focus on items closer or farther away?

Answers

fixed zoom lenses cant

Answer:

Fixed focus lenses

Explanation:

What lenses cannot be changed to focus on items closer or farther away?

Zoom lenses

Autofocus lenses

Fixed focus lenses

Stationary lenses

Fixed focus lenses are lenses for taking pictures that are used in cameras, that have a fixed focus, meaning that the focus on the image will be always located in the same spot and al of the other areas will look blurry to the sight, they can not change the focus to objects closer or further away, if you wich to focus something that is closer to the camera you need to back up witht eh camera and find the spot where the lens focuses on the object, so that would be the answer.

Digital still cameras most often use ____ cards for storage.

Answers

Digital still cameras most often use flash memory cards for storage.

You downloaded a file using internet explorer. unfortunately, you closed ie and you don’t remember where you downloaded the file to. how can you find the file?

Answers

Hit Ctrl+J and the file should be there on the top of the list

True or False: Wikipedia pages should get high ratings for all user intents because information is always helpful.

Answers

I would say true but it's just a guess.

Answer:

The statement is true. Wikipedia is today the main tool for collecting information for students, workers and even academics around the world, as it provides fast, accessible, verifiable and free information to everyone.  Therefore, its pages should get high ratings, as they are helpful for all people.

While the information is verifiable, it should be noted that any Wikipedia user can modify their articles, which are subsequently moderated by specialists. But even so, there is a risk that some data may be wrong, so it is necessary for the readers to control the information obtained. Therefore, a good option would be a system of ranking information and qualifying answers, so that other users know the experience of other students regarding the information provided.

What device can boost an analog signal? a digital signal?

Answers

Analog = amplifier
Digital = repeater

A(n) ________ is a light-sensitive material used to make a chip.

Answers

The photoresist is a light-sensitive material used to make a chip. Photoresists can likewise be uncovered by electron shafts, creating an indistinguishable outcomes from introduction by light. The primary distinction is that while photons are consumed, storing all their vitality without a moment's delay, electrons store their vitality bit by bit, and scramble inside the photoresist amid this procedure.

By default, server manager does not connect with down-level servers (for example, windows server 2008). what must be done to properly connect?

Answers

Add WinRM 3.0 support by installing the necessary updates and hotfix.

Here’s one about technology. IBM developed the first chess playing computer which won both a chess game and a chess match against reigning world champion at the time Garry Kasparov. Do you know what they called this smart robot?

Answers

The first chess playing computer which won both a chess game and a chess match against reigning world champion  at the Garry Kasparov was the smart robot, called Deep Blue.
Deep Blue was computer developed by IBM and it was evolved in 1989. It was the fastest computer on the championship. It was capable of evaluating 200 million positions per second.

A type of address translation in which a gateway has a pool of public ip addresses that it is free to assign to a local host whenever the local host makes a request to access the internet

Answers

Dynamic Network Address Translation (DNAT)

The basic technological foundations of the internet?

Answers

The internet is different from the world wide web, currently you are using the world wide web  (WWW) the internet is what connects you to the WWW and allows you to use it. The internet was created thanks to the concept of e-mail and other forms of e communication. The idea that information could be transferred wirelessly began the idea of a centralized communication network (basically the internets dad). Originally the internet wasn't designed to host websites or domains, it was designed for communication and data transfer. Over time this morphed into GUI's (graphic user interface) in order to simplify the process (and to make it look nicer).  

The internet's growth relied on key technological developments like TCP/IP, the World Wide Web, and the Mosaic browser. These innovations made the Internet accessible and user-friendly, leading to its widespread use.


DARPA's packet-switching and advancements in digital infrastructure were also crucial.

The Internet, a network of networks, has its roots in several key technological developments that significantly contributed to its spread, known as the "democratization" of the Internet. This began with the creation of the protocol TCP/IP by Vinton Cerf and Bob Kahn in 1974, which allowed diverse computer networks to communicate.

In 1983, the Internet, initially a network for research centres and universities, began to expand. The first major boost came in 1990 with Tim Berners-Lee's invention of the World Wide Web, which made it easier to access and share information.

The second significant boost was in 1993 with the release of the first browser, Mosaic, which made navigating the web user-friendly and visually engaging, contributing to the rapid spread of internet usage from 1994 onwards.

Other critical developments included DARPA’s research on packet-switching technology in 1973, which enabled reliable data transmission over distributed networks, and the creation of digital infrastructures like microprocessors and fibre-optic cables around 1990. These breakthroughs made the efficient transfer of digital information across vast distances possible.

What is significant about the contents of the destination address field?

Answers

The destination address field has a format similar to : ff:ff:ff:ff:ff:ff
What signifies the destination address and gives it a privilege over the source address is that it can either be a broadcast containing all ones or a unicast while the source address can only be a unicast.

Under the common criteria, which term describes the user-generated specifications for security requirements?

Answers

The correct answer to this question is the:

“Protection Profile (PP)”

According to the ISO/IEC 15408 and the Common Criteria (CC), the Protection Profile (PP) is a document used as a part of the certification process. And since it is a generic form of a Security Target (ST), this makes it a typical creation by a user or a community of users.

The domain is an email message tell you the

Answers

The domain is an email message tell you the destination's location.

The domain is the part of the email following the "@" symbol. For example, if the email is "example@xxx.com", then the domain is "xxx.com"
This part is usually telling you to where you are sending your email.

A(n) ____ loop executes a predetermined number of times.

Answers

Final answer:

A count-controlled loop, often referred to as a for loop, executes a predetermined number of times and follows the same path for every cycle.

Explanation:

A count-controlled loop executes a predetermined number of times. This type of loop is commonly referred to as a for loop in many programming languages. It follows a predetermined path for every cycle, contrasting a process in which the system may follow a different path for every cycle.

When designing loops within a program, it is crucial to ensure there are enough iterations to cover the necessary components without redundancy. Similar to choosing loops in a circuit where each component should be covered exactly once, in programming, you would also aim to reduce unnecessary repetition.

An object is ____ that can be treated as an individual unit or component.

Answers

If my memory serves me well, an object is the programming code and data that can be treated as an individual unit or component. There can be more than one units and every unit is responsible for particular function in the program. Unit stores methods, operators or operands that run the program.

To create a button that will allow a user to send the form data to the server you use a type of ____

Answers

Submit command, as it hands in the data to the server

Emily wants to purchase a tablet device. she is unsure about what hardware and apps she will need. as a result, she has begun asking for advice from her friends and relatives. in addition, she has talked to several salespeople at apple and best buy and has looked at some websites, such as hp and dell. emily is engaging in

Answers

Please make your question clear

The transport layer protocol used by the tcp / ip suite that does not provide guarantees on ordering or confirmation of receipt of packets is called

Answers

UDP = connectionless vs. TCP is connection oriented.

Many of today’s microprocessors perform ____, in which multiple instructions are executed at the same time

Answers

Answer: multiprocessing

Operating systems are interchangeable and are installed to any computer after the purchase according to your customized preference.
a. True
b. False

Answers

Operating systems are interchangeable and are installed to any computer after the purchase according to your customized preference. 
a. True 
b. False

Explanation: iOS (MAC') run only on Apple Hardware, Windows will not run on a Chome OS, Mainframe OS's like VSE, VM, TPF only run on IBM Mainframes etc.

What name is given to random characters that you can combine with an actual input key to create the encryption key?

Answers

Salt value is the name given to random characters that you can combine with an actual input key to create the encryption key. Salt is a random string of data used to modify a password hash. When you add salt to a password hash the attacker is prevented form testing known dictionary words across the entire system. The longer tha salt value the better the protection.

Look at the four schematic symbols shown in the figure above. Each of the symbols is labeled with a number. Which of the following statements about these symbols is correct?

A. Symbol 1 represents a diode, symbol 2 represents a resistor, symbol 3 represents an LED, and symbol 4 represents a transistor.
B. Symbol 1 represents a diode, symbol 2 represents an LED, symbol 3 represents a transistor, and symbol 4 represents a resistor.
C. Symbol 1 represents a transistor, symbol 2 represents a resistor, symbol 3 represents an LED, and symbol 4 represents a diode.
D. Symbol 1 represents a transistor, symbol 2 represents a diode, symbol 3 represents a resistor, and symbol 4 represents an LED.

Answers

The 1st one is a BJT(Bipolar Junction Transistor), which is indeed a transistor.

The 2nd one is a diode.

The 3rd is a resistor.

The 4th is an optic switch, which can be a LED switch.
Final answer:

Without the provided figure, it is not possible to correctly identify which schematic symbol represents a diode, resistor, LED, or transistor. However, standard symbols for these components can be used to identify them in circuit diagrams, with a diode shown as a triangle pointing at a line, a resistor as a zigzag line, an LED like a diode but with lines for light emission, and a transistor symbol varying based on type but having three leads.

Explanation:

To answer the question regarding the schematic symbols labeled with numbers, without the actual figure to refer to, it is impossible to definitively identify which symbol represents which electronic component. However, using the descriptions commonly associated with electronic components and schematic diagrams, we can provide general information that may help in identifying these symbols correctly in the future.

A diode is represented by a symbol that consists of a triangle pointing towards a line, which represents the direction of conventional current flow (from positive to negative). A resistor is usually depicted as a zigzag line. An LED, or light-emitting diode, is shown similarly to a diode symbol but with two small lines representing light emission. Lastly, a transistor can be recognized by a symbol with three leads and may vary in appearance depending on whether it is a bipolar junction transistor (BJT) or a field-effect transistor (FET).

With these descriptions, you would need to match the visual symbols from the figure you have with these standard electronic symbols to determine the correct statement about the symbols labeled 1 to 4.

Describe a modification of dijkstra's algorithm that runs as fast as the original algorithm, and assigns a label usp[u] to every vertex u in g

Answers

the words brave and courageous are example of

A ________ is a device connected to a network such as a printer or a game console.

Answers

A printer or a game console is not a network. They themselves are connected to the network.

Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit?

Answers

Answer: An evil twin attack poses as a legitimate AP.

______ are segments of computer code that attach to existing computer programs and perform malicious acts. select one:

a. viruses

b. worms

c. trojan horses

d. back doors

e. alien software

Answers

The best answer is A, viruses.

Desktop publishing design tools are represented by A. icons. B. windows. C. trackballs. D. modems.

Answers

The best answer is A
Windows are the screens you can maximize and minimize.
Trackballs make the mouse move.
Modems are associated with internet connection.
Those three answers are unrelated leaving icons to be the most reasonable.
Other Questions
You are a newly hired manager, and you attend your first meeting. you soon realize that the topic of discussion is the identification and documentation of the features and functions of a new information system. from your college bcis class, you recall that they would be in the ________ phase of the sdlc process. Stress surrounds us on a daily basis. Which of the following statements BEST describes ways to reduce or handle stress? A. Handling stress effectively involves ignoring stressors and remaining silent about stressful issues. B. Handling stress effectively involves recognizing what your stressors are, developing healthy behaviors to minimize stress, and adopting positive coping skills. C. Handling stress effectively involves recognizing what stressors are and visiting a psychologist weekly to discuss stressful issues. D. Handling stress effectivley involves doing whatever it takes to erase the stressful issue from your mind. As he dies, Mercutio speaks the line: Ask for me tomorrow, and you shall find me a grave man. This is an example of _____.A. a simileB. personificationC. an allusionD. a pun Sue and Kim earn $52 per week for delivering magazines. Sue worked for x weeks and earned an additional total bonus of $12. Kim worked for y weeks. Which expression shows the total money, in dollars, that Sue and Kim earned for delivering magazines? 64x + 52y 52x 12 + 52y 52x + 64y 52x + 12 + 52y What percentage of the 819 justices of the peace in texas on non-lawyers? Which adapter card in a pc would provide data fault tolerance? Which of the following could be said about the Sons of Liberty? They helped build an alliance between the American Patriots and the British Loyalists. They were the main reason Britain passed the Stamp Act and began taxing the American colonists. They assisted the soldiers in the Revolutionary War by providing much needed funds and weapons. They gave American colonists a voice and a chance to actively participate in the independence movement. (25 Points)Enter numbers to write 4.2310^3 in standard notation. What characteristic allowed the same ecomorphs to be produced on all four islands even though the original species were different on each island? According to research conducted by ridley (1999), how could individuals like adolf hitler or boston marathon bomber dzhokhar tsarnaev commit such acts according to the "nature versus nurture" debate? In the long run, when marginal cost is above average total cost, the average total cost curve exhibitsa. constant returns to scale.b. diseconomies of scale.c. efficient scale.d. economies of scale. Dilute, saturated, concentrated is the order of terms for increasing solute to solvent ratio for solutions. let n be the first 3 of consecutive even integers. what is the sum of those integers? What is the last letter of a four-letter word meaning "a dramatic performance on stage"? Complete the recursive function raisetopower(). ex: if userbase is 2 and userexponent is 4, then raisedvalue is assigned with 16 (i.e. 2^4). note: this example is for practicing recursion; a non-recursive function, or using the built-in function pow(), would be more common. You sometimes find it overwhelming to manage many demands and priorities at once.Agree or Disagree Is the GCF of any two odd numbers is always odd? How tall would a stack of 1000 pennies in centimeters How did revolutionary leader Toussaint L'Ouverture help slaves in the Haitian colony? A. Helped end slavery in the colonyB. Helped slaves gain voting rightsC. Paid slaves a minimal wageD. Provided slaves with an education In the essay the impact of the protestant reformation, there is much discussion of the individual now being able to study scripture for himself or herself. this not only affected their view of the church but also the state. how has this influenced how we in america today view freedom, government, and rights Steam Workshop Downloader