__________ represent waiting lines; insertions are made at the back (also called the tail) and deletions are made from the front (also called the head) of a __________.

a) Linked lists, linked list
b) Queues, queue
c) Stacks, stack
d) Binary trees, binary tree

b) Queues, queue

Computer Science & Information Technology

You might also like to view...

Which of the following is a good candidate for a primary key?

A) A student ID in a college registration database B) A postal code in an address database C) A car model in a Motor Vehicle Department database D) A street name in an address database

Computer Science & Information Technology

____ attacks can be successful when the ciphertext consists of relatively few characters.

A. Correlation B. Man-in-the-middle C. Dictionary D. Timing

Computer Science & Information Technology