A heap whose root contains the item with the largest search key is called a ______.

a. minheap
b. maxheap
c. complete heap
d. binary heap


b. maxheap

Computer Science & Information Technology

You might also like to view...

In 1976, Whitfield Diffie and Martin Hellman, researchers at Stanford University, developed_______ to solve the problem of exchanging keys securely.

a) public-key cryptography. b) symmetric-key cryptography. c) private-key cryptography. d) None of the above.

Computer Science & Information Technology

Which of the following is not true regarding generational differences?

A) Many older members of this community have very rudimentary computer skills, and their needs are very simple. B) Our society is in the midst of a technology shift and all older members of this community are just barely, if at all, computer literate. C) Many senior citizens rely on e-mail to communicate with family members, but they are only comfortable accessing it from their home computer where an e-mail program is easily accessed via a desktop icon without a password. D) Senior citizens probably do not travel with their own computer and have to rely on what is available.

Computer Science & Information Technology

____________________ is the assurance that an entity is who it claims to be.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

_____ enables analysts to make judgments about how to interpret and value the content of a message.

a. Metadata b. Microdata c. Macrodata d. Inlinedata

Computer Science & Information Technology