A node directly below node n in a tree is called a ______ of node n.
a. root
b. leaf
c. parent
d. child
d. child
Computer Science & Information Technology
You might also like to view...
________ refers to the process of testing the organization's security posture using similar techniques and tools as those of an attacker, but with the knowledge and approval of the organization.
A Recon-ng B Maltego C Social engineering D Penetration testing (pen testing)
Computer Science & Information Technology
Network _________ enables a computer to see other devices on a network and determines whether that computer can be seen by others.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology