Starting with the 2-3 tree from question 5), remove the element 17. Sketch the tree.
What will be an ideal response?
17 is in a 3-node at the root of the tree. Removing 17 means promoting its inorder successor, 19. The tree
looks like this:
(19 23)
/ \
(13) (29)
However, the root node is a 3-node with only 2 children. Rotate 19 down to the left child node, which makes the root of the
tree a 2-node. The tree now looks like this:
(23)
/ \
(13 19) (29)
You might also like to view...
A class instance creation expression contains:
a. Parentheses. b. The new keyword. c. The name of the class. d. All of the above.
What is a “has a” relationship?
What will be an ideal response?
If you double-click a color stop, you will open the ____ panel.
A. Color B. Gradient C. Swatches D. New Color
Snort, Firewall and IDS Logs. What actions are taken after a match is found?
Firewalls and Intrusion Detection Systems (IDS) are often deployed to partially automate the traffic monitoring task. Both firewalls and IDSs match incoming traffic against administrative rules. Firewalls usually compare the packet header against a rule set while IDSs often use the packet payload for rule set comparison. Because firewalls and IDSs apply the pre-defined rules to different portions of the IP packet, IDS and firewall rules have different structures. While there is a difference in rule structure, some similarities between the components of the rules remain. For example, both firewall and IDS rules contain matching components and action components. What actions are taken after a match is found?