1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
3 years ago
8

How do you do 2b and please explain?

Computers and Technology
1 answer:
klemol [59]3 years ago
5 0

Answer:

Key = k mod 10

for 13

     =13 mod 10 =3

for 44 =44 mod 10 =4

for 103 = 103 mod 10 =3 which collides

hence, we use quadratic probing (u + i ^2) mod 10 for i = 0 to m-1

     =(103 + 0)mod 10 =3

     =(103 +1) mod 10 =4

      =(103 +4) mod 10 =7

Now for 113

         = (113+ 0) mod 10 =3

         =(113 + 1) mod 10 = 4

         =(113 +4) mod 10 =7

          =(113 + 9) mod 10 = 1

for 2

          = 2 mod 10 =2

   so position filled are =[ -, 113, 2, 13, 44,-. -, 103,-.-]

Now we need to search for 33  and 22

= list.contains(33), and this will probe in one go, and will return false

= list.contains(22) will also probe in one go, and will return false.

In fact hashset has response time O(1), and hence it searches the two numbers in one go, and returns true or false.

Hash set has unique values always, and hence there will be no collision.

Explanation:

Please check the answer section.

You might be interested in
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
We look for trends when we are looking at data. What is a trend?
yulyashka [42]
A subject of what people say at the time, most used, famous at the present time
4 0
3 years ago
Read 2 more answers
In early PCs, a DIMM in any one of the DIMM slots could fill the 64-bit bus; therefore, each slot was called a(n) ______________
Svetach [21]

Answer:

The correct answer to the following question will be Option A (Bank).

Explanation:

  • Sometimes on a motherboard, the memory modules are grouped into different groups and that each group is named as a branch. Furthermore, the term "bank" may be used loosely to describe a basic computing data storage area. When the record is stored in the database it can be accessed at a specific time by the user.
  • Because the 486 is a 32-bit processor and a 30-pin SIMM is 8-bit, four SIMMs (8x4=32) is called a bank when installing memory on an 80486 processor computer; Install four 16 MB SIMMs when upgrading to 64 MB. 

Therefore, Option A is the right answer.

3 0
3 years ago
Format Painter cannot be used to copy only character attributes. True or False
andrey2020 [161]
Format painter are used for copying texts, shape and even pictures. It is located on the top left part of your home button of your microsoft product. The statement " Format painter cannot be used to copy only character attributes." is absolutely False. As it can copy things individually.
4 0
4 years ago
All of the following are organization habits except:
atroni [7]
A. multitasking 
the rest of them are 

6 0
3 years ago
Other questions:
  • A tracking signal A. is a measurement of how well a forecast is predicting actual values. B. is computed as the mean absolute de
    13·1 answer
  • It is important to avoid using a person’s title in an email to avoid offending him or her.
    9·2 answers
  • What does nntp stand for?
    12·2 answers
  • A good example of an agency relationship in a hotel is the relationship between a bartender and a server. True False
    6·1 answer
  • Write code for a function with the following prototype: /* Addition that saturates to TMin or TMax */ int saturating_add(int x,
    12·1 answer
  • Which of the following tasks would you most likely use a spreadsheet to complete
    15·1 answer
  • Grandma Ester normally gives you hugs for your birthday - one for every year old you are. When you turned 15, she squished you w
    8·1 answer
  • Which of the following would not be considered a polymer?
    14·2 answers
  • Which of the following correctly describes the reason for quality customer service?
    9·1 answer
  • Rudy accidentally sent a sensitive work report to a personal friend named James instead one of his co-workers, who is also named
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!