The ____ operation checks whether the stack is full.
A. isEmpty
B. peek
C. pop
D. isFullStack
Answer: D
Computer Science & Information Technology
You might also like to view...
Explain why data members, in particular should be placed in the private section of a class.
What will be an ideal response?
Computer Science & Information Technology
Spammers use software called "spiders" to crawl through Web pages and find linked e-mail addresses.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What can a DIMM use to hold data and amplify a signal just before the data is written to the module?
A. ECC B. Registers C. Parity D. CAS
Computer Science & Information Technology
There are four basic types of password attacks.
Indicate whether the statement is true or false.
Computer Science & Information Technology