The __________ of a linked list points to the first node in the list.

a. starter
b. head
c. tail
d. declaration
e. None of these


b. head

Computer Science & Information Technology

You might also like to view...

E-mail attachments with the extension _____ are especially vulnerable to being blocked.

A. .doc B. .exe C. .txt D. .jpg

Computer Science & Information Technology

A house circuit breaker panel protects all appliances from surges

Indicate whether the statement is true or false

Computer Science & Information Technology

________ is a method used to fool you into giving your personal information so it can be used to gain something of value

Fill in the blank(s) with correct word

Computer Science & Information Technology

____ are areas on the bottom and right sides of windows that allow visitors to scroll through page content.

A. Menu bars B. Tool bars C. Scrollbars D. Status bars

Computer Science & Information Technology