The first thing we need to do when pushing data into a stack is allocate a node from _____.

A. the hard disk
B. a permanent storage medium
C. dynamic memory
D. static memory

Answer: C

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Malicious software aims to trick users into revealing sensitive personal data. 2. Keyware captures keystrokes on a compromised system. 3. Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics. 4. A virus that attaches to an executable program can do anything that the program is permitted to do. 5. It is not possible to spread a virus via a USB stick

Computer Science & Information Technology

Which of the following are a good reason for using a link-based implementation of a bag?

a. A link list is fixed size. b. You can access nodes directly with equal access time c. A link-based implementation is good choice for a small bag d. Linked chains do not have a fixed size

Computer Science & Information Technology