To save a binary search tree in a file and then restore it to its original shape, what type of traversal should be used?

a. postorder
b. inorder
c. reorder
d. preorder


d. preorder

Computer Science & Information Technology

You might also like to view...

Changing the original text to a secret message using cryptography is known as ____.

A. ciphertext B. decryption C. encryption D. plaintext

Computer Science & Information Technology

To determine that a value is not present in an unordered array of 50 items, how many values must linear search examine on average?

A) 1 B) 6 C) 25 D) 50 E) 51

Computer Science & Information Technology

The four traversal algorithms we mentioned in the text for binary search trees are _______, _______, _______ and ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which protocol is utilized by the ping command to determine whether a host is active on a network?

a. UDP b. ICMP c. FTP d. IP

Computer Science & Information Technology