1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
3 years ago
12

Discuss Hashing and how it is utilized within the IT industry. Also, discuss how Hashing can improve our sorting and searching r

outines and how it can affect the running time or Big-O of our algorithms. g
Computers and Technology
1 answer:
shusha [124]3 years ago
5 0

Answer:

Hashing can be termed as the alteration of a string of characters into a frequently smaller fixed-length value or key that represents the original string.

Explanation:

Hashing are utilized to catalog and recover digital items in a database since it is quicker to find the item using the shorter hashed key than finding the items using the original value.

You might be interested in
What is the preferred procedure for putting customers on hold​
vesna_86 [32]

Answer/Explanation:

Explain the reason you need to put the caller on hold.

Ask for the person's phone number, in case the conversation is cut off.

Promise to return in a minute—or your best estimate of how long the hold will last. If you think the delay will be longer than a couple of minutes, ask for a number and a time when you can call back.

If, despite your best efforts, the delay is taking longer than anticipated, check in with the caller so that he doesn't feel abandoned. Again, offer to call back, "rather than keep you holding."

When you return to the phone, apologize for the inconvenience and thank the caller for his patience.

Use the caller's name frequently to add a sense of connection.

The first step you can take when putting a caller on hold and making it a satisfying experience is a systematic one. When a caller is on hold, 60 seconds seems like an eternity, so see if you can program the phone system to play music (calming classical or jaunty jazz is best) to break this perception of an interminable wait. Aside from that, however, putting someone on hold in a professional way depends on your behavior. The golden rule to keep in mind is as follows: how would you like to be treated if you were on the other end of the line?

MAKE ME THE BRAINLIEST!!!!!!!!!!!!

8 0
3 years ago
Read 2 more answers
Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
konstantin123 [22]

Answer:

- Transform binary or unary M:N relationship or associative entity with its own key.

Explanation:

Transform binary relation is described as the method through which a decimal can easily be converted into binary while the unary relationship is described as a relationship in which both the two participants occurs from the same entity.

In the given case, 'transform binary or unary M:N relationship' can be created using 'the primary key linked with the relationship plus any non-key aspects of the relationship and the primary keys of the related entities' as it displays the existence of a relationship between the occurrences of a similar set of the entity i.e. associative entity here.

5 0
3 years ago
What is network topology? PLZZZ HURRY
Mashcka [7]

Answer:

Network topology is the arrangement of the elements (links, nodes, etc.) of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field busses and computer networks.

7 0
2 years ago
Brainlist will be added!✴
Bess [88]

You can transfer this file by inserting your USB or Lightening Cable into the computer's USB Port, then you go into the Computer Window on the computer and find your device and then look for the file in it's specific folder!

5 0
3 years ago
Show me how to create an argument essayshow me how to create an argument essay ​
Lady_Fox [76]

Answer:

1 Introduce the problem.

2 Explain your perspective.

3 Explain your opponent's perspective. Refute their points one-by-one as you go.

4 Present your evidence.

5 Conclude your argument.

1 Introduce the problem.

2 Explain your opponent's perspective first. ...

3 Explain your perspective.

Explanation:

3 0
2 years ago
Other questions:
  • Consider the following method: public static void arrayMystery(int[] array) { for (int i = 0; i < array.length - 1; i++) { if
    10·1 answer
  • How is typing speed measured
    12·2 answers
  • What is the term for sending emails that imitate legitimate companies?
    6·2 answers
  • The labels button is found under the
    7·2 answers
  • Please help. 15 points!!!!
    8·2 answers
  • Consider the classes below: public class TestA { public static void main(String[] args) { int x = 2; int y = 20 int counter = 0;
    8·1 answer
  • Which elements are in the Sort dialog box? Check all that apply.
    9·1 answer
  • Which statement is not true? An audit objective for systems maintenance is to detect unauthorized access to application database
    8·1 answer
  • What is assembler? What is Compiler?What is interpreter?
    9·2 answers
  • If there is a secure socket layer in place, what will you need in addition to a user id in order to access the shared files?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!