1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
7

What is the consequence of not having a good hashing function?

Computers and Technology
1 answer:
omeli [17]3 years ago
7 0

Answer:

A good hash function maps the key value pair with minimal collisions. When the hash function is not good there are frequent collisions in the mapping of the key value pair.

Collision means that if there is a key present in the container already with some value.If the hash function again maps the same key with different value at the same location in the container that previous key was present.

You might be interested in
Explain the following terms:<br><br> a) Atomicity<br><br> b) DML
GenaCL600 [577]

Answer:

a) Atomicity:- It is among the one of the ACID properties of transactions.It states that an atomic transaction is irreducible and indivisible series of data operations such that either nothing occurs or all occurs.

b) DML(Data Manipulation Language):- It is a computer programming language that is used for inserting,deleting,manipulating data in the database.For example -SQL.

6 0
4 years ago
I need help! Please please
Scorpion4ik [409]

The correct answers are given as:

  1. Turning the lens dial clockwise
  2. Manual settings
  3. Tone
  4. File format
  5. JPEG or RAW

The given questions had to do with taking photos, photography, and the likes and how lenses are used to capture images, and file formats are used to select the size and quality of images.

<h3>What is Photography?</h3>

This refers to the art of taking pictures in a background in a bid to make still images.

Hence, we can see that The correct answers are given:

  1. Turning the lens dial clockwise
  2. Manual settings
  3. Tone
  4. File format
  5. JPEG or RAW

The given questions had to do with taking photos, photography, and the likes and how lenses are used to capture images, and file formats are used to select the size and quality of images.

Read more about photography here:

brainly.com/question/13600227

#SPJ1

6 0
1 year ago
Compare Fibonacci (recursion vs. bottom up)
ipn [44]

Answer:

C++ code explained below

Explanation:

#include<bits/stdc++.h>

#include <iostream>

using namespace std;

int FiboNR(int n)

{

int max=n+1;

int F[max];

F[0]=0;F[1]=1;

for(int i=2;i<=n;i++)

{

F[i]=F[i-1]+F[i-2];

}

return (F[n]);

}

int FiboR(int n)

{

if(n==0||n==1)

return n;

else

return (FiboR(n-1)+FiboR(n-2));

}

int main()

{

long long int i,f;

double t1,t2;

int n[]={1,5,10,15,20,25,30,35,40,45,50,55,60,65,70,75};

cout<<"Fibonacci time analysis ( recursive vs. non-recursive "<<endl;

cout<<"Integer FiboR(seconds) FiboNR(seconds) Fibo-value"<<endl;

for(i=0;i<16;i++)

{

clock_t begin = clock();

f=FiboR(n[i]);

clock_t end = clock();

t1=double(end-begin); // elapsed time in milli secons

begin = clock();

f=FiboNR(n[i]);

end = clock();

t2=double(end-begin);

cout<<n[i]<<" "<<t1*1.0/CLOCKS_PER_SEC <<" "<<t2*1.0/CLOCKS_PER_SEC <<" "<<f<<endl; //elapsed time in seconds

}

return 0;

}

7 0
3 years ago
What is authenticity​
jeka94

Answer:

the quality of being authentic

Explanation:

7 0
3 years ago
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
Other questions:
  • You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows custom
    14·1 answer
  • Using a loop, write a program that reads in exactly five integers and outputs the sum.
    11·1 answer
  • How to tell if screen or screen protector is cracked?
    5·2 answers
  • He has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, ta
    8·1 answer
  • In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
    15·1 answer
  • What’s the best description of an opportunity cost
    5·1 answer
  • RAM that can be changed. True or False
    9·2 answers
  • A teacher wants to check the typing proficiency of five students. She gives all of them the same passage to type. Which student
    11·1 answer
  • What settings are available in the Properties dialog box of a message? Check all that apply.
    6·2 answers
  • Hoda needs to create a chart that is associated with an Excel spreadsheet. She needs to ensure that if the data in the spreadshe
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!