The worst case in linear search is that every element must be checked to determine whether the search key exists, which occurs if the search key ________.
a. is the last array element
b. is not present
c. is the last array element or is not present
d. None of the above.
c. is the last array element or is not present
You might also like to view...
The data contents within a table can be seen in ________ view
Fill in the blank(s) with correct word
Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access.
1. Per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access) 2. Per-object access control list (that is, one list for each object tells all the subjects who have access to that object) 3. Access control matrix 4. Capability