We can perform the operation ____ to retrieve the top element of the stack.

A. head
B. first
C. top
D. peek


Answer: C

Computer Science & Information Technology

You might also like to view...

The ____ function is essentially on the front-lines of personnel security when it is auditing the performance of the controls in the personnel security operation.

A. auditing B. certification C. accountability D. compliance

Computer Science & Information Technology

An image of a computer screen is called a ________

A) monitor B) screen shot C) clip D) document

Computer Science & Information Technology

Cluster-Aware Updating is a failover cluster feature that automates software updates on cluster servers while maintaining cluster service availability.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A floppy disk consists of either a single rigid platter or several platters that spin together on a common spindle.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology