The ____ operation checks whether the stack is empty.

A. isFullStack
B. isEmptyStack
C. peek
D. pop


Answer: B

Computer Science & Information Technology

You might also like to view...

Derived from the GMK, the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ____ is a text string used to identify a DTD on the Web.

A. public identifier B. DTD C. user agent D. tag

Computer Science & Information Technology

When creating an image map, you first insert the large image, then use a(n) ____________________ to define each area and assign it a link.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A behavior available in Expression Web called ____ Script triggers JavaScript that is written outside of Expression Web.

A. Call B. Edit C. Internal D. External

Computer Science & Information Technology