1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mice21 [21]
3 years ago
7

The material of this section assumes that search keys are unique. However, only small modifications are needed to allow the tech

niques to work for search keys with duplicates. Describe the necessary changes to insertion, deletion, and lookup algorithms, and suggest the major problems that arise when there are duplicates in each of the following kinds of hash tables: (a) simple (b) linear (c) extensible
Computers and Technology
1 answer:
WARRIOR [948]3 years ago
5 0

Answer:

The description of the given points can be described as follows:

Explanation:

A hash table is a specific array, which is used to contain items of key value. It uses a hash to calculate an index of an array, which inserts an item, and the given point can be described as follows:

  • In option a, It includes several duplicates, which is a large number of unavailable tanks, although there is a large overflow list for the used tanks.
  • In option b, multiple copies are painful to scan because we have to read and understand rather than a single line.
  • In option c, It can break frequently, if there are several exact copies.

You might be interested in
Explain the different types of computer software programs. Be specific and use examples.
lorasvet [3.4K]

Answer: well there are many types of software out there and let's use Microsoft for an example there a really protective company so more people would want to buy from Microsoft they have a lot of high-tech computers so and I'm not favoriting Microsoft it's just what I've use Chrome also is really good but you would kind of want to go off like reviews that you see and everything like that because I'm not a big computer tech but that's just what I know

Explanation:

3 0
3 years ago
Network layer protocols specify the _______ structure and processing used to carry data between hosts.
kari74 [83]

Network layer protocols specify the  <u>packet structure</u> and processing used to carry data between hosts.

<h3>What is the Network layer protocols  about?</h3>

The header, payload, as well as the trailer of a network packet are its three component pieces. The underlying network architecture or protocol employed determines the format and size of a network packet. A network packet resembles a package in concept.

Therefore, Network layer protocols define the packet format and processing needed to transfer data from one host to another host, in contrast to the Transmission layer (OSI Layer 4), which controls the data transport between the programs operating on each end computer.

Learn more about Network layer from

brainly.com/question/14476736
#SPJ1

3 0
1 year ago
The true or false questions.<br><br> 1.egrep can accept multiple filenames as input arguments.
BlackZzzverrR [31]

Answer: True  

Explanation: yes, it is true that egrep can accept multiple filenames as input arguments for example egrep -r "text1/text2", so this will search in all the sub directories . E grep is also known as 'grep -E' which belongs to the group of grep function and we used egrep to separate multiple patterns for OR conditions. This is also very less time consuming if you are going to search multiple input arguments in multiple different logs at the same time.

5 0
3 years ago
7.4.4: Length of User's Name
Natalija [7]

Answer:

user_name = input("input user name: ")
print(len(user_name))

Explanation:

input - input function in python

len - length of value

print - print data

6 0
2 years ago
In the design phase of the systems development life cycle (SDLC), the _____ indicates hardware and software, such as specifying
Genrish500 [490]

Answer:

Option A

Explanation:

6 0
3 years ago
Other questions:
  • This type of server spools documents and puts them in a queue.
    12·1 answer
  • How might your use of computers and knowledge of technology systems affect your personal and professional success?
    7·2 answers
  • The speed of sound depends on the material the sound is passing through. Below is the approximate speed of sound (in feet per se
    9·1 answer
  • Software on your computer is taking a long time to load. What could help solve this problem?
    5·1 answer
  • Identify the benefit of modeling to communicate a solution.
    10·1 answer
  • If I wanted to include a picture of a dog in my document, I could use
    13·2 answers
  • Plsss help anyone PLSSSSS ​
    13·1 answer
  • 2 WAp to input the radius and print<br> the area of circle
    8·1 answer
  • How many domains are there in the classification system?
    13·1 answer
  • Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!