Start learning 50% faster. Sign in now
The correct answer is D
Which type of malware disguises itself as legitimate software but has malicious intent once installed?
In mobile computing, which type of network allows devices to connect directly to each other without using a central router or switch?
Which tree traversal is most suitable for finding the shortest path in an unweighted graph represented as a tree?
Which of the following is a valid operation on a linked list data structure?
What is the output of the following code: x = 5; y = 2; print(x ** y)?
Which of the following algorithms is commonly used in Machine Learning for clustering tasks?
Which of the following algorithms is most commonly used in Operating Systems for deadlock prevention?