The ____ operation checks whether the stack is empty.
A. isFullStack
B. isEmptyStack
C. peek
D. pop
Answer: B
Computer Science & Information Technology
You might also like to view...
Derived from the GMK, the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A(n) ____ is a text string used to identify a DTD on the Web.
A. public identifier B. DTD C. user agent D. tag
Computer Science & Information Technology
When creating an image map, you first insert the large image, then use a(n) ____________________ to define each area and assign it a link.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A behavior available in Expression Web called ____ Script triggers JavaScript that is written outside of Expression Web.
A. Call B. Edit C. Internal D. External
Computer Science & Information Technology