1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
3 years ago
6

g Q 2 Suppose I need a data structure having the following characteristics: a) must be very space efficient, and b) I have a goo

d idea of how much total data needs to be stored. b) must have fastest access possible, and c) once I add an item to the data structure, I do not remove it. Part 1: What data structure would I choose and why? (2,4) Part 2: If I remove characteristic b, what similar data structure is a possible candidate?
Computers and Technology
1 answer:
SIZIF [17.4K]3 years ago
5 0

Explanation:

a.I would choose an advanced data structure like  dispersion tables.

Scatter tables, better known as hash tables, are one of the most frequently used data structures. To get an initial idea, scatter tables make it possible to have a structure that relates a key to a value, such as a dictionary. Internally, the scatter tables are an array. Each of the array positions can contain none, one or more dictionary entries.

It will normally contain a maximum of one, which allows quick access to the elements, avoiding a search in most cases. To know at which position in the array to search or insert a key, a scatter function is used. A scatter function relates each key to an integer value. Two equal keys must have the same dispersion value, also called a hash value, but two different keys can have the same dispersion value, which would cause a collision.

B. If I eliminated the characteristic b, a possible candidate keeping the previous characteristics would be: Balanced binary trees

Balanced binary trees are data structures that store key-data pairs, in an orderly way according to the keys, and allow quick access to the data, given a particular key, and to go through all the elements in order.

They are appropriate for large amounts of information and have less overhead than a scatter table, although the access time is of greater computational complexity.

Although the storage form has a tree structure internally, this is not externalized in the API, making the handling of the data transparent. They are called balanced because, each time they are modified, the branches are rebalanced in such a way that the height of the tree is as low as possible, thus shortening the average time of access to the data.

You might be interested in
Why do some people put salt on sidewalks when it snows?
drek231 [11]
It help to melt the snow quicker. they salt eats away the snow.
6 0
4 years ago
Computers in a medical office should be protected by which of the following security tools?
Verizon [17]
<span> it is necessary to maintain your computer on a regular basis. .... Remember these key points when recommending the Internet to a patient

Hope it helps.
</span>
8 0
4 years ago
Read 2 more answers
All it services and servers are equally critical. <br> a. True <br> b. False
g100num [7]

False

Not all IT services are equally critical. In an increasingly digital world whereby cyber threats are a big threat, it is vital to prioritize the critical assets in order to achieve digital resilience. This involves building tighter defenses in systems that are critical.

4 0
3 years ago
A website is unencrypted. Which tool can be used to stop the website’s traffic and analyze the information on it?
liraira [26]

Answer:

Web analytics support information about the number of users to a website and the number of page views. It helps measure traffic and popularity trends which is useful for market study.

Explanation:

6 0
3 years ago
Data collected before an attorney issues a memo for an attorney-client privilege case is protected under the confidential work p
Shalnov [3]

Answer:False

Explanation: Attorney-client previlege is a rule that protects the confidentiality of the communication between the clients and the lawyer(attorney). This rule is put in place to encourage clients to communicate freely and give out adequate and necessary information in order for the Attorney to effectively handle the case. ANY DATA COLLECTED BEFORE THE ATTORNEY ISSUES A MEMO FOR AN ATTORNEY-CLIENT PRIVILEGE CASE IS NOT PROTECTED UNDER THE CONFIDENTIAL WORK PRODUCT RULE WHICH GUARANTEES THAT NO INFORMATION AFTER THAT MEMO SHALL BE DIVULGED WITHOUT APPROPRIATE CONSIDERATIONS.

7 0
4 years ago
Read 2 more answers
Other questions:
  • You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you nee
    9·1 answer
  • Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
    6·1 answer
  • To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
    6·1 answer
  • A virus enters a computer or network _____.
    13·1 answer
  • Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. H
    9·1 answer
  • 30 POINTS!!!
    9·2 answers
  • Explain how principles of computer programming are applied in different languages to produce
    5·1 answer
  • Match the title of the work of fiction to the description given.
    8·1 answer
  • hello fellows i need a help.Ineed to know about computer evolutions and computer generations.please hurry.Its my rankover questi
    10·1 answer
  • 6) Which of the following an OPERATING SYSTEM? a) Window 7 b) excel c) PowerPoint d) Publisher​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!