1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
4 years ago
11

What is one property of a good hash code?

Computers and Technology
1 answer:
larisa [96]4 years ago
8 0

Answer:- Major property of a good hash code is that objects which are equal should return the same hash code .

Explanation: Hash codes is a numeric value which  is used for identify a object while a equality testing .Hash code can occupy the value of any length and then returns a fixed length value. The value of hash codes are variable.

If two objects are equal then by the method of equal(object) if the hashcode() function is called on both the objects , they produce the same value.

You might be interested in
What is a Layer 2 device that receives an electrical signal in one port, interprets the bits, and makes a filtering or forwardin
iren2701 [21]

Answer:

Router

Explanation:

Router -

It is a networking device which helps to forward the data packets between the networks of the computer .

It acts as a traffic director in the internet .

The data which is sent via internet is made into data packets . And then the packet is forwarded from one router to another , until the packed reaches its destination .

The function given in the question is about router .

5 0
4 years ago
You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
Gnoma [55]

Answer:

B. Update the UEFI firmware

Explanation:

UEFI (Unified Extensible Firmware Interface) is a standard firmware interface for PCs. It is responsible for waking up the computer hardware components and ensure they are functioning properly.

The old processor was controlled by an older version of the UEFI but to run the new processor, you update the Firmware Interface to enable it communicate with the computer's hardware components.

6 0
3 years ago
Which element of presentation software can you use to add callouts and banners?
Harrizon [31]
<span><span>1.)From the Insert tab, select the Shapes command. A drop-down menu will appear.
</span><span>2.)Select the desired shape
3.)</span></span>Click and drag<span> the slide to create the shape. You may need to move or resize the shape so it points to the desired part of the image.
4.)</span><span>f you want your callout to contain text, start typing while the shape is selected.
5.)</span><span>From the </span>Format<span> tab, you can use the options in the </span>Shape Styles<span> group to customize the appearance of the shape. You can also adjust the font from the Home tab</span>
7 0
3 years ago
Read 2 more answers
Which options are available when saving a video of a presentation? Check all that apply. file type
Lemur [1.5K]

Answer: file name, folder location, narration and audio, seconds per-slide timing

Explanation:

I just did it.

6 0
3 years ago
Read 2 more answers
Can u guys tell me what is the definition of umbra​
oksian1 [2.3K]

Answer:

the fully shaded inner region of a shadow cast by an opaque object, especially the area on the earth or moon experiencing the total phase of an eclipse.

Explanation:

i go.ogled it

5 0
3 years ago
Read 2 more answers
Other questions:
  • How do you subscribe to Darthmaul Productions on YT?
    13·1 answer
  • Baris script yang digunakan mendefinisikan website yang akan diblokir proxy server adalah
    5·1 answer
  • Which tool is used to view stars in galaxies far from the Milky Way?
    10·1 answer
  • Write a program that will prompt the user to enter an integer. The program should square the number and then print the squared n
    5·1 answer
  • ________ did you sell your computer to?​
    9·1 answer
  • A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th
    15·1 answer
  • These are the records and traces an individual leaves behind as they use the internet
    8·2 answers
  • Xxx<br>uuuuuu<br>uuuu<br>jjnmn<br>jjh
    12·1 answer
  • Name two reasons why we don't make use of optical drives that often any more​
    5·1 answer
  • What are the 4 types of satellite?​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!