This function has:

```
1 bool search( Node ptr, Bird & bird, Bird dove )
2 {
3 if ( ptr == NULL )
4 return false;
5 if ( ptr->info == dove ) {
6 bird = ptr->info;
7 return true;
8 }
9 return search( ptr->next, bird, dove );
10 }
```
which is called for a linked list (where start points to the first node) using the lines of code:
```
if ( search( start, bird, dove ) )
cout << “search successful” << endl;
```
A. one base case
B. the number of base cases depends on the length of the linked list
C. two base cases
D. three base cases


1

Computer Science & Information Technology

You might also like to view...

See the code in CalculatorApplet.java.

The applet can be created most easily by modifying the code from Chapter 13 Project 4, DecimalToBinary. Change it from a Swing application to an applet (follow the steps described in the text), and, of course, modify the binary conversion code so it converts to hexadecimal, instead. Fortunately, the same successive division algorithm works, regardless of the base: just change the divisor from 2 to 16 and add code to translate each remainder from a decimal integer value to a hex character code (a switch statement works very nicely, is very readable, and also is usually compiled very efficiently).

Computer Science & Information Technology

The Form selector is the box where the ________ meet, in the upper left corner of a form in Design view

A) controls B) sections C) rulers D) properties

Computer Science & Information Technology

Pointing to a button with the mouse pointer is sometimes referred to as ____.

A. rolling over B. hitting C. linking D. clicking

Computer Science & Information Technology

Margot is investigating suspicious activity on her network and uses a protocol analyzer to sniff inbound and outbound traffic. She notices an unusual packet that has identical source and destination IP addresses. What type of attack uses this packet type?

A. Fraggle B. Smurf C. Land D. Teardrop

Computer Science & Information Technology