The listing of the nodes produced by the postorder traversal of a binary tree is called the ____.
A. postsequence
B. postorder sequence
C. postorder table
D. post-script
Answer: B
Computer Science & Information Technology
You might also like to view...
One of the preparatory parts of the attack methodology is the collection of publicly available information about a potential target, a process known as ____.
A. sniffing B. reconnaissance C. auditing D. trapping
Computer Science & Information Technology
What is the universal MAC address for broadcast?
A. 0.0.0.0 B. FF-FF-FF-FF-FF-FF C. 127.0.0.1 D. 1.1.1.1
Computer Science & Information Technology