Let X be a node in a binary tree. Any node on the path from X to the root is called
A) a descendant of X
B) an ancestor of X
C) a superior of X
D) a subordinate of X
B) an ancestor of X
You might also like to view...
The ____ tool expands to select the edges of any object in an image that you paint over to enclose it in a selection marquee.
a. Quick Selection b. Proximate Selection c. Edge Selection d. Nearby Pixel Selection
You use subscripts 1 through 10 to access the elements in a ten element array.
Answer the following statement true (T) or false (F)
A technician has been given the task to install a wireless network in a user's home. Which of the following should the technician consider when implementing the network? (Select TWO).
A. That there is strong encryption enabled and configured on the access point. B. The user's home network has a correctly completed WHOIS entry. C. The access point is broadcasting the SSID based upon manufacturer's standards. D. There are no conflicts of channels in use by neighboring wireless networks. E. There are redundant internal DNS names set in the access point's settings. F. That the access point's MAC address is properly set in its configuration settings.
Packets that exceed the medium's maximum packet size are known by what term??
A. ?giants B. ?runts C. ?ghosts D. ?jabbers