1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
13

What is a perfect hashing function?

Computers and Technology
1 answer:
antiseptic1488 [7]3 years ago
3 0

Answer:

First we understand what is hash function.A hash function is mostly used in Hashmaps. It maps different keys to a set of values.There may occur a case when we have same key but different values.This case is called collision.So we have to use different collision handling techniques that are open addressing and separate chaining.

A perfect hash function maps key-value pair such that there are no collisions.

You might be interested in
Limitations of systems analysis and design​
Sonja [21]

Answer:

<h3 />

Explanation:

<h3>Although System analysis offers an extensive range of benefits it might also have some disadvantages. One of the main disadvantages which is mostly overlooked is the risk of too much analysing which may be costly and time consuming. It is therefore part of the analyst's job to find the right balance.</h3>
6 0
3 years ago
Does anyone take bca on plato
SVETLANKA909090 [29]
I do. do you need help with it?
7 0
3 years ago
What system calls have to be executed by a command interpreter? Why is it usually separate from the kernel?
Licemer1 [7]

Answer:

The exec command by interpreter to start new process

Explanation:

On Unix systems, a call to the fork system must be made followed by a call to the e x e c system to begin a new process. The fork call clones the process that is currently running, while the executive call overlays a new process based on a different executable over the calling process.

It is seperate from Kernal because

It Read user commands or a script and execute them, generally turning them into one or more system calls. Is usual It is not part of the kernel since the command interpreter is subject to change.

6 0
3 years ago
The Technology Librarian asks you to find out how many hops it takes to get to the first Wi-Fi kiosk. What Windows command can y
V125BC [204]

Answer:

The number of routers arrived in the path of a packet from sender to receiver are called hops. It is term used usually in computer networking.

<u>Command Used to find Hops</u>

In windows command prompt is used to find the number of hops.

1. In Command Prompt type "<em>tracert</em>" after host name and IP address of destination.

<u>Hardware devices Represented by Hop</u>

The main devices that is counted as hop in networking is <em>Router</em>. Nut Sometimes many devices such as <em>switches, repeaters and access points</em> are also count as hops. It depends on the configuration and role of the devices.

8 0
3 years ago
____ are the computers that store network software and shared or private user files.
kodGreya [7K]
Servers <span>are the computers that store network software and shared or private user files.</span>
3 0
3 years ago
Other questions:
  • The spreadsheet below shows the names years in office, and number of terms for five US presidents
    7·2 answers
  • What is the danger in judging someone according to his or her social networking profile
    12·1 answer
  • The major difference between a calculator and a computer, when performing calculations, is that a
    14·2 answers
  • A c++ member function that uses, but does not change, the value of a member variable is called
    13·1 answer
  • On a wireless router, what gives out IP addresses?<br> DHCP<br> DNS<br> WPA<br> WPS
    7·1 answer
  • Select the correct answer.
    13·1 answer
  • The file descriptor stderr is represented by the number ____.
    6·1 answer
  • How to delete Brainly account ?​
    12·1 answer
  • fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating
    10·1 answer
  • (lesson 7.9: acceptance-rejection --- continuous examples.) consider the constant . on average, how many iterations (trials) wil
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!