This function has:
```
1 bool search( Node
2 {
3 if ( ptr == NULL )
4 return false;
5 if ( ptr->info == dove ) {
6 bird = ptr->info;
7 return true;
8 }
9 return search( ptr->next, bird, dove );
10 }
```
which is called for a linked list (where start points to the first node) using the lines of code:
```
if ( search( start, bird, dove ) )
cout << “search successful” << endl;
```
A. one base case
B. the number of base cases depends on the length of the linked list
C. two base cases
D. three base cases
1
You might also like to view...
See the code in CalculatorApplet.java.
The applet can be created most easily by modifying the code from Chapter 13 Project 4, DecimalToBinary. Change it from a Swing application to an applet (follow the steps described in the text), and, of course, modify the binary conversion code so it converts to hexadecimal, instead. Fortunately, the same successive division algorithm works, regardless of the base: just change the divisor from 2 to 16 and add code to translate each remainder from a decimal integer value to a hex character code (a switch statement works very nicely, is very readable, and also is usually compiled very efficiently).
The Form selector is the box where the ________ meet, in the upper left corner of a form in Design view
A) controls B) sections C) rulers D) properties
Pointing to a button with the mouse pointer is sometimes referred to as ____.
A. rolling over B. hitting C. linking D. clicking
Margot is investigating suspicious activity on her network and uses a protocol analyzer to sniff inbound and outbound traffic. She notices an unusual packet that has identical source and destination IP addresses. What type of attack uses this packet type?
A. Fraggle B. Smurf C. Land D. Teardrop