The recursive Sierpinski gasket algorithm is an example of ____ because it calls itself three times.

A. linear recursion
B. mutual recursion
C. exponential recursion
D. iteration

Answer: C

Computer Science & Information Technology

You might also like to view...

________ opens the database so that changes can be made, but no one else may open the database at the same time

A) Open Exclusive Read-Only B) Open Exclusive C) Open Read-Only D) Read-Only Exclusive Open

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) The owner of the object can generally perform any action on the security descriptor. 2) The Security ID identifies a user uniquely across all of the machines on the network. 3) Manual analysis of logs is preferred, as it is more likely to identify abnormal activity. 4) The needs and policy relating to backup and archive should be determined during the final stages of implementation. 5) Firewalls are traditionally configured to limit access by port or protocol from some or all external systems.

Computer Science & Information Technology