Locating a particular item in a binary search tree of n nodes requires at most ______ comparisons.

a. n
b. n / 2
c. (n / 2) – 2
d. ?log2(n + 1)?


a. n

Computer Science & Information Technology

You might also like to view...

In the accompanying figure, the numbers that appear under each of the slides are the ____ timings.

A. animation B. transition C. slide D. rehearse

Computer Science & Information Technology

To find a full list of policies and preferences that can have background processing disabled, where should you look?

A. Computer Configuration\Policies\Administrative Templates\Group Policy B. Computer Configuration\Policies\Administrative Templates\System\Group Policy C. User Configuration\Policies\Administrative Templates\Group Policy D. User Configuration\Policies\Administrative Templates\System\Group Policy

Computer Science & Information Technology

Which of the following is an example of a single-factor authentication being used to gain access to a computer system?

A. Using a username and a 16-character password B. Using a smart card and entering a secret password C. Using an RSA SecureID token device and entering a private code D. Using a biometric scan of a fingerprint and entering a PIN

Computer Science & Information Technology

A circularly linked list:

a. Is the same as any other linked list. b. Has no end, as the list value of the last value in the list points to the record number of the first value in the list. c. Is connected to the empty list. d. b and c.

Computer Science & Information Technology