The ________ in a binary tree is analogous to the head pointer in a linked list.

A) root pointer
B) leaf pointer
C) null pointer
D) binary pointer
E) None of the above


A) root pointer

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a protocol,port pair that should be filtered when an attempt is made to make a connection from outside the company network?

A. TCP,80 B. TCP,139 C. UDP,138 D. TCP,3389

Computer Science & Information Technology

Which is not a process ink color?

A. green B. cyan C. magenta D. yellow

Computer Science & Information Technology

To prevent an element such as text from floating, use the ________ property

A) lock B) clear C) no-float D) break

Computer Science & Information Technology

Explain why an attacker typically uses an ACK scan to bypass a firewall?

What will be an ideal response?

Computer Science & Information Technology