The first step in the heapsort of this chapter is to convert the list into a heap, called ____.

A. newHeap
B. buildHeap
C. convertHeap
D. addHeap


Answer: B

Computer Science & Information Technology

You might also like to view...

An unlocked door is an example of a(n) ____.

A. vulnerability B. threat C. risk D. exploit

Computer Science & Information Technology

U.S. copyright law specifically allows us to make ____ of copyrighted works without permission.

A. grace use B. non-ownership use C. second use D. fair use

Computer Science & Information Technology

If you add a validation rule to a table with existing records, some data in those records may violate the rule

Indicate whether the statement is true or false

Computer Science & Information Technology

PKI is based on a system of certificates, which are digitally signed statements that contain a public key and the name of the subject

Indicate whether the statement is true or false

Computer Science & Information Technology