Let X be a node in a binary tree. Any node on the path from X to the root is called

A) a descendant of X
B) an ancestor of X
C) a superior of X
D) a subordinate of X


B) an ancestor of X

Computer Science & Information Technology

You might also like to view...

The ____ tool expands to select the edges of any object in an image that you paint over to enclose it in a selection marquee.

a. Quick Selection b. Proximate Selection c. Edge Selection d. Nearby Pixel Selection

Computer Science & Information Technology

You use subscripts 1 through 10 to access the elements in a ten element array.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A technician has been given the task to install a wireless network in a user's home. Which of the following should the technician consider when implementing the network? (Select TWO).

A. That there is strong encryption enabled and configured on the access point. B. The user's home network has a correctly completed WHOIS entry. C. The access point is broadcasting the SSID based upon manufacturer's standards. D. There are no conflicts of channels in use by neighboring wireless networks. E. There are redundant internal DNS names set in the access point's settings. F. That the access point's MAC address is properly set in its configuration settings.

Computer Science & Information Technology

Packets that exceed the medium's maximum packet size are known by what term??

A. ?giants B. ?runts C. ?ghosts D. ?jabbers

Computer Science & Information Technology