A ____ is a list in which each element contains a key, such that the key in the element at position k in the list is at least as large as the key in the element at position 2k + 1 (if it exists) and 2k + 2 (if it exists).

A. hash table
B. hemp
C. heap
D. pile


Answer: C

Computer Science & Information Technology

You might also like to view...

Give brief definitions of each of the following terms.

a. private key b. digital signature

Computer Science & Information Technology

The New Query command lets you connect to and refine data from different sources

Indicate whether the statement is true or false.

Computer Science & Information Technology

A(n) ____________________ attack is a form of cryptanalysis that presumes that the attacker is able to choose arbitrary plaintexts to be encrypted, in effect obtaining the corresponding ciphertexts.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Mac OS reduces file fragmentation by using _______________.

A. ?inodes B. ?superblocks C. ?clumps D. ?chunks

Computer Science & Information Technology