The ____ data model follows a treelike structure.

a. distributed
b. hierarchical
c. network
d. relational


Ans: b. hierarchical

Computer Science & Information Technology

You might also like to view...

The __________ is described as being an abstract computing machine, consisting of an instruction set, a program counter register, a stack to hold variables and results, and a heap for runtime data and garbage collection, and a method area for code and constants.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If a long audio is used alone, adding ___________ can help listeners situate themselves in the piece and grasp the ideas.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

a. Layer above. b. Layer below. c. Lowest layer. d. Peer layer.

Computer Science & Information Technology

An attacker uses a network sniffer to capture the packets of a transaction that adds $20 to a gift card. The attacker then user a function of the sniffer to push those packets back onto the network again, adding another $20 to the gift card. This can be done many times. Which of the following describes this type of attack?

A. Integer overflow attack B. Smurf attack C. Replay attack D. Buffer overflow attack E. Cross-site scripting attack

Computer Science & Information Technology