Locating a particular item in a binary search tree of n nodes requires at most ______ comparisons.
a. n
b. n / 2
c. (n / 2) – 2
d. ?log2(n + 1)?
a. n
You might also like to view...
In the accompanying figure, the numbers that appear under each of the slides are the ____ timings.
A. animation B. transition C. slide D. rehearse
To find a full list of policies and preferences that can have background processing disabled, where should you look?
A. Computer Configuration\Policies\Administrative Templates\Group Policy B. Computer Configuration\Policies\Administrative Templates\System\Group Policy C. User Configuration\Policies\Administrative Templates\Group Policy D. User Configuration\Policies\Administrative Templates\System\Group Policy
Which of the following is an example of a single-factor authentication being used to gain access to a computer system?
A. Using a username and a 16-character password B. Using a smart card and entering a secret password C. Using an RSA SecureID token device and entering a private code D. Using a biometric scan of a fingerprint and entering a PIN
A circularly linked list:
a. Is the same as any other linked list. b. Has no end, as the list value of the last value in the list points to the record number of the first value in the list. c. Is connected to the empty list. d. b and c.