To save a binary search tree in a file and then restore it to its original shape, what type of traversal should be used?
a. postorder
b. inorder
c. reorder
d. preorder
d. preorder
Computer Science & Information Technology
You might also like to view...
Changing the original text to a secret message using cryptography is known as ____.
A. ciphertext B. decryption C. encryption D. plaintext
Computer Science & Information Technology
To determine that a value is not present in an unordered array of 50 items, how many values must linear search examine on average?
A) 1 B) 6 C) 25 D) 50 E) 51
Computer Science & Information Technology
The four traversal algorithms we mentioned in the text for binary search trees are _______, _______, _______ and ______.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which protocol is utilized by the ping command to determine whether a host is active on a network?
a. UDP b. ICMP c. FTP d. IP
Computer Science & Information Technology