Ans: Stack: 



                Stack can be considered as a storage method in within th items are stored in consecutive memory locations and the last element stored in the first element  retrived. Also LIFO(last in first out) list. You can visualize a stock as the number of plates or books placed one above the other. When you want to place a new plate, you will place on the top of the remaining plates. When you want to withdraw a plate, you will take out the topmost plte first. That is the plate last kept is the first taken out or last in first out. Stack may be a finite number of reg isters bundled together or stack can alos be part  o fmemory unit. An address register called stack pointer contains the address of the recently stored element. Remember that this the element which will be first retrieved. Stack pointer always points to the topmost elements in the stack. 

Related Posts:

  • Explain the term of stack Ans: Stack:                  Stack can be considered as a storage method in within th items are stored in consecutive memory locations and the last element stored in the… Read More
  • Why is rewall is necessary to secure your internal network? Ans: To protect transmitted information in the communication lines, many organization and individuals use encryption software., Encryption is the encoding of data by converting the standard computer code in to a secret cod… Read More
  • What do you mean by computer Ethics? Ans: Compute Ethics:                Computes pose major ethical problems for all users- governement, clerks, business executives, doctors, supervisors, students and hobbyists. In … Read More
  • Define file management system? File Management: An important part of a computer's operating system is the file management system.  A file may be a document created in word, excel, or other software, or it may be an executable file. The file manageme… Read More
  • What is data encryption used for? Ans: Many data thieves do their work without breaking into computers systems, they intercept message as they travel between computers on networks. Passwords are of little use for hiding electronic mail messages when they… Read More

Like Us On Facebook

Popular Posts