1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
11

What is one property of a good hash code?

Computers and Technology
1 answer:
larisa [96]3 years ago
8 0

Answer:- Major property of a good hash code is that objects which are equal should return the same hash code .

Explanation: Hash codes is a numeric value which  is used for identify a object while a equality testing .Hash code can occupy the value of any length and then returns a fixed length value. The value of hash codes are variable.

If two objects are equal then by the method of equal(object) if the hashcode() function is called on both the objects , they produce the same value.

You might be interested in
What is the answer to this?
Anit [1.1K]

Answer: I think the Valorous Unit Ribbon

Explanation: I don't really understand what's it asking but I sort of did to get this answer!

5 0
3 years ago
Explain four features of presentation packages​
hichkok12 [17]
You have add more for anyone to be able to answer this, sorry
4 0
2 years ago
Providing incentives for customers to learn more about your service is known as?
Julli [10]
B) Advertising is the answer
3 0
3 years ago
Linux implements _________ to determine how a user is to be authenticated and whether there are password policies associated wit
ira [324]

Answer:

Pluggable authentication modules (PAM).

Explanation:

These are schemes that are seen to be used in API authentication. It is relyed on to provide high authentification protocool in any correct form it is seen to be in use. also its ability to grant access to each other within two people interface are reasons big user clients refer to it in most of their policies that deals with their working system passwords and their database passwords to most of their files. This is why the company in the context which is a big firm rely on it for its services.

6 0
2 years ago
Describe two types of images you can open in photoshop
vredina [299]

Answer: PSD JPEG PNG

Explanation:

6 0
2 years ago
Other questions:
  • What is the purpose of the “little down arrow” next to many different functions in word
    6·1 answer
  • If you want to conserve ink or toner, you can instruct PowerPoint to print ____ documents.
    10·1 answer
  • Assuming a computer has a single processor and a single core with no support for parallel execution, explain why running a multi
    11·1 answer
  • When adopting the use of social media in emergency management, it is important to have
    10·1 answer
  • DTE just installed 500kW of solar capacity on the MCCC campus. the cost of the installation was about $3 million. what was the c
    10·1 answer
  • A _______ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or
    5·1 answer
  • Someone, please answer this.
    15·1 answer
  • In Java:
    15·1 answer
  • A plan budget time for studying and activities is referred to as?
    11·1 answer
  • Im coding and need help please answer or comment to help. any skilled coders comment below
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!