1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shutvik [7]
4 years ago
13

In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca

lled the __________ value.
a. hashing
b. hash
c. key
d. code
Computers and Technology
1 answer:
Zielflug [23.3K]4 years ago
7 0

Answer:

Option (B) i.e., Hash is the correct option.

Explanation:

A hash value is the number that has the fixed length and the data recognition is uniquely. It is also a type of file that is read by the special type algo, it uses the value of the bits in the following computer files which is used to manipulates the single number. That's why the following option is correct.

You might be interested in
uppose you are going on a road trip with friends. Unfortunately, your headlights are broken, so you can only drive in the daytim
tiny-mole [99]

Answer:

Explanation:

Algorithm:

a. In each day, you will have to loop through the hotels that come to the hotel after you stayed last night.

b. If a hotel 'h' is found at more than 'd' distance away from last stayed hotel, then the hotel previous of 'h' is chosen to wait for that night. This is the greedy step, and you stay in this hotel.

c. The process for steps a and b is then repeated until we've reached the last hotel xn.

Running time:

Notice that the worst case occurs if each hotel is at a distance of successive multiples of 'd'. The best move is to estimate the distance to each hotel twice the whole computation in the scenario.

Thus, the total running time that could occur in the worst case is O(2n) = O(n). This is said to be linear time.

6 0
3 years ago
The temperature in toronto canada was-4°c and tje temperature in brixton,england was 6°c warmer. what was the difference in temp
Oksana_A [137]

Answer:

It is 10°c difference between them

7 0
3 years ago
How would you log in as zach if you did not know his password but knew the root password?
Nuetrik [128]
You can login in root terminal and then type #sudo Zach 
8 0
3 years ago
Which statement describes the word "iterative"?
malfutka [58]

Answer:4 should be correct

Explanation:

5 0
3 years ago
Read 2 more answers
Jement Tools
Yuki888 [10]

Explanation:

I think it's either c or d but I don't remember

7 0
2 years ago
Other questions:
  • Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide
    12·1 answer
  • which of the following is not a name of one of the central features of Facebook timeline activity log Graph Search for Daily New
    6·1 answer
  • If anybody knows what does this mean I will answer any questions for you and plz answer this right plz what does that envelope w
    5·2 answers
  • You create a new document and save it to a hard drive on a file server on your company's network. then you employ an encryption
    9·1 answer
  • Which type of operating system requires a keyboard in order to issue commands?
    13·1 answer
  • In some networks, the data link layer handles transmission errors by requesting that damaged frames be retransmitted. If the pro
    13·1 answer
  • Write a program that print "Censored" if userInput contains the word "darn", else print userInput. End with newline.
    8·1 answer
  • Write a program that receives an character and displays its Unicode. Here is a sample run: Enter an character: E The Unicode for
    8·1 answer
  • When typing lists in a document, you must use single-spacing between each item in the list.
    8·1 answer
  • Cho lược đồ CSDL “Quản lý BÁN HÀNG” có các bảng như bên dưới. (Thuộc tính in đậm và
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!