Answer the following statements true (T) or false (F)

1) A tree node that has no children is called a None node.
2) Each link a tree node refers to is a child or a subtree of that node.
3) A stack is referred to as a LIFO data structure because it is a linear data structure.
4) The level-order traversal of a binary tree visits the nodes of the tree, starting at a leaf and progressing toward the root node level.
5) A sibling of a leaf in a tree can be a parent.


1) F
2) T
3) F
4) F
5) T

Computer Science & Information Technology

You might also like to view...

The command find / name "*" atime 5 print

a: starts from the current directory, and finds all files with filename atime b: starts from the home directory, and finds all files last accessed less than 5 minutes ago c: starts from the root directory, and finds all files last accessed less than 5 days ago d: starts from the root directory and sends 5 files to the printer e: none of the above

Computer Science & Information Technology

Which of the following statements is false?

a. With a BufferedOutputStream each output operation is directed to a buffer large enough to hold the data of many output operations. Transfer to the output device is performed in one large physical output operation when the buffer fills. b. With a BufferedOutputStream, a partially filled buffer can be forced out to the device at any time by invoking the stream object’s force method. c. With a BufferedInputStream, many “logical” chunks of data from a file are read as one large physical input operation into a memory buffer. d. With a BufferedInputStream, as a program requests data, it’s taken from the buffer. When the buffer is empty, the next actual physical input operation is performed.

Computer Science & Information Technology

When using Snapchat, senders can specify the period of time during which recipients are permitted to view a snap.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following should you use to protect your customer's sensitive data from being accessed by unauthorized people?

A. HTTP B. FTP C. HTTPS D. HTML5

Computer Science & Information Technology