In a B-tree, when an underflow occurs, we must reflow the nodes to make sure they are valid. Reflow first tries to balance by borrowing from the right, then it tries to borrow from the left; if both fail, it ____.

A. combines the left sibling its left child
B. exits with an error condition
C. combines the siblings
D. combines the left sibling with its parent


Answer: C

Computer Science & Information Technology

You might also like to view...

Which control is used to add a report to another report?

A. text box B. combo box C. subreport D. group section

Computer Science & Information Technology

Which of the following cannot be copyrighted?

a. Inventions b. Ideas c. Artistic works d. Designs

Computer Science & Information Technology

If you work for a company as a security professional, you will most likely be placed on a special team that will conduct penetration tests. What is the standard name for a team made up of security professionals?

A. pen team B. blue team C. red team D. security team

Computer Science & Information Technology

______________ testing is used to test the interactions between different functions in a program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology