We can perform the operation ____ to retrieve the top element of the stack.
A. head
B. first
C. top
D. peek
Answer: C
Computer Science & Information Technology
You might also like to view...
The ____ function is essentially on the front-lines of personnel security when it is auditing the performance of the controls in the personnel security operation.
A. auditing B. certification C. accountability D. compliance
Computer Science & Information Technology
An image of a computer screen is called a ________
A) monitor B) screen shot C) clip D) document
Computer Science & Information Technology
Cluster-Aware Updating is a failover cluster feature that automates software updates on cluster servers while maintaining cluster service availability.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A floppy disk consists of either a single rigid platter or several platters that spin together on a common spindle.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology