Method used for Disk searching..
a.linked list b.AVL c.B-tree d. binary tree

Answers were Sorted based on User's Feedback



Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree ..

Answer / guest

d

Is This Answer Correct ?    7 Yes 3 No

Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree ..

Answer / vikas

c

Is This Answer Correct ?    5 Yes 1 No

Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree ..

Answer / kalyani.kalamata@gmail.com

AVL

Is This Answer Correct ?    4 Yes 2 No

Post New Answer

More Operating Systems AllOther Interview Questions

Virtual memory size depends on [a] address lines [b] data bus [c] disc space [d] a & c [e] none

15 Answers   Infosys, SafeNet, Satyam, TCS, VIT Infotech, Wipro,


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

0 Answers  


What is difference between kernel and os?

0 Answers  


What are Odm Commands.

0 Answers   IBM,


What is a file in computer terms?

0 Answers  






What is the best os for laptop?

0 Answers  


Explian T - Factor?

0 Answers   IBM,


How do I clean up and speed up my laptop?

0 Answers  


The flushing policy is described in the subsection on process migration strategies: a) From the perspective of the source, which other strategy does flushing resembles? b) From the perspective of the target, which other strategy does flushing resemble?

0 Answers  


What do you know about the latest android version Lollipop?

0 Answers   Akamai Technologies,


how does virtual memory work?

1 Answers  


What is the most powerful processor?

0 Answers  


Categories