Stack and the heap - Study guides, Study notes & Summaries
Looking for the best study guides, study notes and summaries about Stack and the heap? On this page you'll find 153 study documents about Stack and the heap.
All 153 results
Sort by
-
WGU C949 Objective Assessment (Latest 2023/ 2024) Data Structures and Algorithms I |Version 2| Questions and Verified Answers| 100% Correct| Grade A
- Exam (elaborations) • 19 pages • 2023
- Available in package deal
-
- R195,74
- 3x sold
- + learn more
WGU C949 Objective Assessment (Latest 2023/ 2024) Data Structures and Algorithms I |Version 2| Questions and Verified Answers| 100% Correct| Grade A 
 
Q: Which data structure is used to implement a priority queue? 
a. Queue b. Stack c. Heap 
d. Linked List 
 
Answer: 
 Heap 
 
 
Q: Which sorting algorithm has the best worst-case time complexity of O(n log n)? 
a. Bubble Sort b. Merge Sort 
c. Selection Sort 
d. Insertion Sort 
 
Answer: 
 Merge Sort 
 
 
Q: In a binary search tree (BST), what i...
-
Purdue CS 252 Midterm Exam Questions with 100% Correct Answers | Verified | Latest Update 2024 | 100% Pass| Rated A+
- Exam (elaborations) • 23 pages • 2024 Popular
-
- R177,08
- 1x sold
- + learn more
Purdue CS 252 Midterm Exam Questions with 100% Correct Answers | Verified | Latest Update 2024 | 100% Pass| Rated A+ 
What are the different types of memory sections? - Text 
Data 
BSS 
Heap 
Stack 
What is stored in text? - Instructions that run the program. 
What is stored in Data? - Initialized global variables 
What is stored in BSS? - Uninitialized global variables (initialized to 0 by default) 
What is stored in the heap? - Memory that was returned by malloc/new. It grows as you request mo...
-
CMSC 131 Final Exam Spring 2023-2024 (All Correctly Answered)
- Exam (elaborations) • 16 pages • 2023
- Available in package deal
-
- R214,21
- 1x sold
- + learn more
What two things make up an object? correct answers State and Behavior 
 
What is the State of an object? correct answers Data that the object maintains/holds 
Ex: (Bank Account) - balance, account number, interest amount, account type etc 
 
Behavior of an object? correct answers Things the object can do 
Ex: (Bank Account) - giveMeMoney, acceptDeposits, getBalance etc 
 
What represents a state of an object? correct answers Instance Variables 
Ex: (Student Class) 
Public int IdNum; 
Public Stri...
-
NTA Chapter 6 Questions and Answers Graded A+
- Exam (elaborations) • 15 pages • 2024
- Available in package deal
-
- R186,41
- + learn more
NTA Chapter 6 Questions and Answers 
 
Graded A+ 
 
Which data structure is ideal for implementing a priority queue? 
 
Heap 
 
What is the primary purpose of an index in a database? 
 
To speed up query retrieval times 
 
What does the acronym "SQL" stand for? 
 
Structured Query Language 
 
What is the main advantage of using a linked list over an array? 
 
Dynamic size and efficient insertions/deletions 
 
2 
 
What type of join returns all records from both tables, with matching records wh...
-
WGU C949 Data Structures and Algorithms I Exam (New 2023/ 2024 Update) Questions and Verified Answers| 100% Correct| Grade A
- Exam (elaborations) • 21 pages • 2023
- Available in package deal
-
- R195,74
- + learn more
WGU C949 Data Structures and Algorithms 
I Exam (New 2023/ 2024 Update) Questions 
and Verified Answers| 100% Correct| Grade 
A 
 
Q:UESTION 
 A tree that maintains the simple property that a node's key is greater than or equal to the node's 
childrens' keys. 
 
Answer: 
 max heap 
 
 
Q:UESTION 
 A tree that maintains the simple property that a node's key is less than or equal to the node's 
childrens' keys. 
 
Answer: 
 min heap 
 
 
Q:UESTION 
 A data structure for representing ...
Get paid weekly? You can!
-
CNIT 455 Exam 3 Questions and Answers 100% Pass
- Exam (elaborations) • 33 pages • 2024
- Available in package deal
-
- R205,07
- + learn more
CNIT 455 Exam 3 Questions and Answers 100% Pass Software vulnerabilities are typically a result of what? - non-secure coding - "make it work first and secure it later" approach 
How can vulnerabilities be discovered in open source code? - can be analyzed natively 
How can vulnerabilities be discovered in closed source code? - must be reverse engineered 
What are RCE tools? - used by disassemblers to convert binary to assembly language for analysis - means of understanding memory usage and basi...
-
Purdue CS 252 Midterm Questions with Verified Solutions
- Exam (elaborations) • 19 pages • 2024
- Available in package deal
-
- R186,41
- + learn more
Purdue CS 252 Midterm Questions with Verified Solutions What are the different types of memory sections? Text Data BSS Heap Stack 
What is stored in text? Instructions that run the program. 
What is stored in Data? Initialized global variables 
What is stored in BSS? Uninitialized global variables (initialized to 0 by default) 
What is stored in the heap? Memory that was returned by malloc/new. It grows as you request more. [grows upwards] 
What is stored in the stack? Local variables and return...
-
WGU C949 Data Structures and Algorithms I Exam Review (Latest 2023/ 2024 Update) Questions and Verified Answers| 100% Correct
- Exam (elaborations) • 25 pages • 2023
- Available in package deal
-
- R195,74
- + learn more
WGU C949 Data Structures and Algorithms I Exam Review (Latest 2023/ 2024 Update) Questions and Verified Answers| 100% Correct 
 
Q: Queue 
 
Answer: 
 ADT in which items are inserted at the end and removed from the front. Common data structures: linked list 
FIFO 
 
 
Q: Deque ("deck") 
 
Answer: 
 ADT in which items can be removed at both the front and back. Common data structures: linked list 
 
 
Q: Bag 
 
Answer: 
 ADT for storing items in which the order does not matter and duplicate items ...
-
CISC 3325 - Final Review || with 100% Accurate Solutions.
- Exam (elaborations) • 9 pages • 2024
-
- R205,07
- + learn more
symmetric key encryption correct answers encryption method that uses the same key to encrypt and decrypt the data 
 
asymmetric key encryption correct answers encryption method that uses different keys to encrypt and decrypt the data. Each user has two keys, one public and one private 
 
key exchange protocol correct answers 1. A sends to B 
 E(Kpub-B,(E(Kpriv-A,K)) 
where K is the symmetric key 
 
2. B uses Kpriv-B to decrypt the Kpub-B encryption 
 
3. B uses Kpub-A to decrypt the Kpriv-A enc...
-
WGU C949 STUDY GUIDE QUESTIONS AND ANSWERS
- Exam (elaborations) • 18 pages • 2023
- Available in package deal
-
- R270,37
- + learn more
Array 
A data structure that stores an ordered list of items, with each item is directly accessible by a positional index. 
 
 
 
Linked List 
A data structure that stores ordered list of items in nodes, where each node stores data and has a pointer to the next node. 
 
 
 
Bianary Search Tree 
A data structure in which each node stores data and has up to two children, known as a left child and a right child. 
 
 
 
Hash Table 
A data structure that stores unordered items by mapping (or hashing)...
That summary you just bought made someone very happy. Also get paid weekly? Sell your study documents on Stuvia! Discover all about earning on Stuvia