1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
4 years ago
6

What is the root of the tree?

Computers and Technology
1 answer:
Alexus [3.1K]4 years ago
3 0

Answer:

root is an ancestor of all other nodes in a tree.

Explanation:

Root is a special node in the tree which is an ancestor of all other nodes.For example, consider a binary tree with root R. Let C1,C2 be the children of R at level 1. Similarly, C11,C12 are the children of C1 at level 2 and C21,C22 are the children of C2 at level 2. Now the parent of C22 is C2 and the parent of C2 is root R. Similar is the case for all other child nodes. Hence, Each node in the tree will have the root node R as its ancestor.

You might be interested in
a publication usually issued daily,weekly or other regular times that provides news,views,features and other information of publ
leonid [27]

Answer:

adsfafdfads

Explanation:

afdafdsa

8 0
3 years ago
The _______ "represents a set of features that enables the user to inform himself whether a security feature is in operation or
quester [9]

Answer:

Visibility and configuration of security.

Explanation:

The visibility and configuration of security represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

4 0
4 years ago
What does getfenv() do?
mariarad [96]

Answer: getfenv() is a type of function. Particually a envirotment function. for a lua coding.

Explanation: What this does it goes thourgh  line of code in a particular order.

This means. getfenv is used to get the current environment of a function. It returns a table of all the things that function has access to. You can also set the environment of a function to another environment.

Forgot to include examples of where this could be used. Although not very common uses, there are some. In the past Script Builders used getfenv to get the environment of a script, and setfenv to set the environment of a created script’s environment to a fake environment, so they couldn’t affect the real one. They could also inject custom global functions.

Not entirely sure if this uses getfenv or setfenv, but the use in Crazyman32’s AeroGameFramework is making the environment of each module have access to other modules without having to require them, and having access to remotes without having to directly reference them.

5 0
3 years ago
Read 2 more answers
Which command will display each line in the text file based on the alphabet?
SSSSS [86.1K]
On windows, it is the type command.
On linux, the cat command outputs the file.
All bytes that represent printable characters will be displayed as ASCII or even Unicode.
6 0
4 years ago
3. What report shows what mobile devices were used to view a website?
mrs_skeptik [129]

The report that shows what mobile devices were used to view a website is the Devices report under “Mobile”

<h3>What is a mobile device?</h3>

This is known to be a is a small hand-held device that shows screen with touch input and it is said to be also made up of QWERTY keyboard as well as others.

Note that The report that shows what mobile devices were used to view a website is the Devices report under “Mobile”

See full question below

What report shows what mobile devices were used to view a website?

The Exit Pages report under “Site Content”

The Landing Page report under “Site Content”

The Engagement report under “Behavior”

The Devices report under “Mobile”

Learn more about website from

brainly.com/question/13171394

#SPJ12

4 0
2 years ago
Other questions:
  • Scratch and grinding marks on sedimentary rocks indicate which type of environment?
    6·1 answer
  • Identify the six components of an information system. Which are most directly affected by the study of computer security? Which
    8·1 answer
  • Your task in this assignment is to exploit the race condition vulnerability in the above set-uid program. more specifically, you
    14·1 answer
  • Good afternoon guys !!!
    14·2 answers
  • How to change color of object in photoshop?
    10·2 answers
  • What is the build in libary function to compare two strings?​
    15·1 answer
  • In Python what are the values passed into functions as input called?
    13·1 answer
  • What does the statement that follows do? double gallons[6] = { 12.75, 14.87 }; a. It assigns the two values in the initializatio
    13·1 answer
  • Document accurately describes the differences between servers and computers and between local and wide area networks. Document p
    5·1 answer
  • Which of the phases of the software development life cycle (SDLC) would the following action take place in?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!