1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
4 years ago
12

Discuss Hashing and how it is utilized within the IT industry. Also, discuss how Hashing can improve our sorting and searching r

outines and how it can affect the running time or Big-O of our algorithms. g
Computers and Technology
1 answer:
shusha [124]4 years ago
5 0

Answer:

Hashing can be termed as the alteration of a string of characters into a frequently smaller fixed-length value or key that represents the original string.

Explanation:

Hashing are utilized to catalog and recover digital items in a database since it is quicker to find the item using the shorter hashed key than finding the items using the original value.

You might be interested in
What information will you find in the 16-bit field in an IP datagram?
faust18 [17]

Answer: This 16-bit field defines the entire packet size in bytes, including header and data. The minimum size is 20 bytes (header without data) and the maximum is 65,535 bytes. All hosts are required to be able to reassemble datagrams of size up to 576 bytes, but most modern hosts handle much larger packets.

Explanation: Hopefully this helps you with what ever u are doing.

7 0
3 years ago
Can someone start me off with a short 2 or 3 paragraphs about the pros and cons of Microsoft Word, and if you can recommend a si
Romashka-Z-Leto [24]
Microsoft Word is an overall very good application. It can be easily used with other Microsoft products, such as PowerPoint and Excel. However, there are some cons.

The spelling and grammar check is widely considered not very good. It does pick up many spelling errors, but many grammar errors are either not noticed, or are incorrectly noticed - it may say that you have made an error when you have not.
7 0
3 years ago
To use a resource from a module, you write the name of the module as a qualifier, using which symbol before the name of the reso
Sladkaya [172]

Answer:

d. .

Explanation:

Dot (.) symbol is used to access the resource from the module. It is used to establish the connection between resource and module.

While on the other hand "=" is an assignment operator that is used to assign a value to the variable. "*" is use for the purpose of multiplication of two values in variables. Double Inverted commas ("") used to print the statement written between them.

7 0
3 years ago
A total stranger is trolling jack online. He’s offended and annoyed. How can Jack stop the troll in his or her tracks ?
coldgirl [10]
A troll's main goal is to provoke a reaction from people, so I'd say the best way to stop the troll in his or her tracks would be to log off and not give the troll any satisfaction.

Then again, the troll might see you logging off as a win because he or she made you rage quit, so maybe replying with a quick "no u" to troll the troll before logging off would throw them off. That being said, the long term solution would still be not responding at all. After a while of no reactions the troll would most likely get bored.
8 0
3 years ago
Read 2 more answers
careful driving requires the appropriate Reaction Time both simple and complex breaking and then shifting gears followed by sign
arlik [135]

The examples listed all belong in the category of complex reaction time.

6 0
3 years ago
Other questions:
  • Why should you avoid the use of sarcasm cliches and idioms in busniess letters?
    9·2 answers
  • 4. The programmer who focuses on implementing the game mechanics, rules, and other elements essential for gameplay is the
    13·1 answer
  • Why does hamlet want to kill himself and what stops him from doing that?
    10·1 answer
  • You have an old photograph that you want to incorporate in a brochure for your antique business. To convert the photo into digit
    9·2 answers
  • Which term refers to the technical structure of the software, how users interact with the software, and how the software is phys
    10·1 answer
  • Which of these are examples of skills?
    5·2 answers
  • The practice of spamming has been growing because telephone solicitation is no longer legal. it is good advertising practice and
    14·1 answer
  • Which of these terms is a design principle?
    7·1 answer
  • Which of the following is not an operating system a) boss b) window xp c) linux d) bindux​
    15·1 answer
  • Why do we need on output device?​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!