Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Method used for Disk searching..
a.linked list b.AVL c.B-tree d. binary tree

Answers were Sorted based on User's Feedback



Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree ..

Answer / guest

d

Is This Answer Correct ?    7 Yes 3 No

Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree ..

Answer / vikas

c

Is This Answer Correct ?    5 Yes 1 No

Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree ..

Answer / kalyani.kalamata@gmail.com

AVL

Is This Answer Correct ?    4 Yes 2 No

Post New Answer

More Operating Systems AllOther Interview Questions

what is the difference between a soft real time operating system and hard real time operating system?

1 Answers   TATA,


What does download with adm mean?

0 Answers  


What is a semaphore?

20 Answers   Motorola, Persistent, TCS,


Which processor is better amd or intel?

0 Answers  


What is the meaning of slosh login in nfs?

0 Answers   3i Infotech,


Assume that passwords are selected from four-character combinations of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a) Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to discover the correct password?

4 Answers   FCI,


How do I merge folders on mac?

0 Answers  


What is Cycle Stealing in OS?

0 Answers   Verifone,


What is difference between post and put method?

0 Answers  


How do you find out computer specs?

0 Answers  


Is heap shared between processes?

0 Answers  


The flushing policy is described in the subsection on process migration strategies: a) From the perspective of the source, which other strategy does flushing resembles? b) From the perspective of the target, which other strategy does flushing resemble?

0 Answers  


Categories