A node on the path from the root to node n is a(n) ______ of node n.

a. ancestor
b. descendant
c. subtree
d. leaf

b. descendant

Computer Science & Information Technology

You might also like to view...

Which of the following is not true about restricting access when collaborating?

A) The Restrict Access feature is located on the File tab, in the Info section, under Protect Presentation. B) It is a good idea to use the PowerPoint Restrict Access feature. C) Sharing your presentation with others from a shared folder can lead to unauthorized changes made to your presentation. D) To use this feature, your computer will need to be set up for Information Restrict Management though Microsoft Office.

Computer Science & Information Technology

Integrated tablet microphones are enabled/disabled through the Settings/General Settings icon

Indicate whether the statement is true or false

Computer Science & Information Technology