The ____ operation checks whether the stack is full.

A. isEmpty
B. peek
C. pop
D. isFullStack


Answer: D

Computer Science & Information Technology

You might also like to view...

Explain why data members, in particular should be placed in the private section of a class.

What will be an ideal response?

Computer Science & Information Technology

Spammers use software called "spiders" to crawl through Web pages and find linked e-mail addresses. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What can a DIMM use to hold data and amplify a signal just before the data is written to the module?

A. ECC B. Registers C. Parity D. CAS

Computer Science & Information Technology

There are four basic types of password attacks.

Indicate whether the statement is true or false.

Computer Science & Information Technology