1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
13

What is a perfect hashing function?

Computers and Technology
1 answer:
antiseptic1488 [7]3 years ago
3 0

Answer:

First we understand what is hash function.A hash function is mostly used in Hashmaps. It maps different keys to a set of values.There may occur a case when we have same key but different values.This case is called collision.So we have to use different collision handling techniques that are open addressing and separate chaining.

A perfect hash function maps key-value pair such that there are no collisions.

You might be interested in
Bulleted and Numbered List button appear in the ………….. Toolbar.​
stich3 [128]

Answer:

The answer to this question is given below in the explanation section

Explanation:

Bulleted and Numbered List button appear in the <u>Paragraph </u>Toolbar.​

On word processing software, these options display in paragraph toolbar in the Home ribbon.

for example, in MS Word, you can find them in the Home tab under paragraph groups of command.

however, it is noted that these options are appear in some other software under the formating toolbar.

8 0
4 years ago
Write a program to create an interface Shape containing the method declarations of area and perimeter. Then, create a class Rect
irakobra [83]

Answer:

Explanation:

An interface is similar to a class, to create an interface we use interface keyword, in an interface there can be abstract methods and constants only,we can not instantiate an interface.All the variables declared inside an interface are public,static and final  by default.

While using interface child class must use implements keyword

We can define an  interface by using below syntax-

<interface> <interface-name>{

}

For example lets create Shpae interface

interface Shape{

public int area(int length, int width);

public int perimeter(int length, int width);

}

Now lets create Rectangle class-

class Rectangle implements Shape{

public int area(int length, int width){

int area = 0;

area = length * width;

return area;

}

public int perimeter(int length, int width);

int perimeter = 0;

perimeter = 2*(length+width);

return perimeter ;

}

6 0
3 years ago
How computer viruses spread from one computer to another​
morpeh [17]
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
8 0
3 years ago
Is a collection of computers and other devices that are connected in order to enable users to share hardware, software, and data
antoniya [11.8K]
That would be a Network.
8 0
4 years ago
What are the unique technology that characterised each generation of computer ​
Svetach [21]

Technology used: Transistor. Operating speed was in terms of a microsecond. Assembly language and machines independent language such as COBOL (Common Business Oriented Language) and FORTRAN (Formula Translation) were introduced the size of the computer. Magnetic core memory was used as primary memory.

7 0
3 years ago
Other questions:
  • This is tech question related to mobile and PC.
    6·1 answer
  • _ is a model of computing in which computer processing, storage, software, and other services are provided as a shared pool of v
    10·1 answer
  • Which feature does the web designer fail to apply in this layout for a web page? A. harmony
    8·2 answers
  • How does this app work?
    11·2 answers
  • What is an online recommendation engine?
    9·1 answer
  • Tina has made a database table in access containing field name class roll number and contact number she has set primary key for
    5·1 answer
  • According to the reading on the course web pages, the earliest usage of cooking began around _____ million years ago.
    12·1 answer
  • In what way can an employee demonstrate commitment?
    15·2 answers
  • What do you think color theory<br> in web design is?
    14·1 answer
  • 3. Choose the right statement bellow: Excel can not import external data from
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!