1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
3 years ago
14

What is open addressing?

Computers and Technology
1 answer:
victus00 [196]3 years ago
3 0

Answer:

Open addressing is the technique used in the hash tables  during the collision resolution. This method is also known as closed hashing.This techniques helps in the solving the issue of collision.

All the keys gets placed in the hash table and so the size of hash table equal to or greater number of overall keys.There are three techniques used for open addressing, which are linear probing ,quadratic probing and  double hashing

You might be interested in
Write a function called committee to compute the number of ways of forming a single committee with r members from a collection o
andrezito [222]

Answer:

This program is written in C++.  The explanation of the code is given below in the explanation section.

Explanation:

#include <iostream>

using namespace std;

//factorial calculation

int fact(int n) {

  if (n == 0 || n == 1)

     return 1;

  else

     return n * fact(n - 1);

}

int main() {

  int n, r, comb; /* n represent number of people (population), r represent the number of selection from population and combination represent number of ways or combination */

  cout<<"Enter n : ";// prompt user to enter population i.e. total number of people

  cin>>n;//store into n

  cout<<"\nEnter r : ";//prompt user to enter number of selection from population

  cin>>r;

  comb = fact(n) / (fact(r) * fact(n-r));// calcuate combination- number of differnt ways to form a committe

  cout << "\nCombination : " << comb; //show the result

  return 0;

}

5 0
3 years ago
A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.
ratelena [41]

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

8 0
3 years ago
I have a problem with my Nintendo DS lite does anyone know how to fix it?
Sonbull [250]

Try checking if the battery is still working, they usually tend to give out at times.

6 0
3 years ago
3. Write a function named sum_of_squares_until that takes one integer as its argument. I will call the argument no_more_than. Th
kenny6666 [7]

Answer:

Following are the program to this question:

def sum_of_squares(no_more_than):#defining a method sum_of_squares that accepts a variable

   i = 1#defining integer variable  

   t = 0#defining integer variable

   while(t+i**2 <= no_more_than):#defining a while loop that checks t+i square value less than equal to parameter value  

       t= t+ i**2#use t variable to add value

       i += 1#increment the value of i by 1

   return t#return t variable value

print(sum_of_squares(12))#defining print method to call sum_of_squares method and print its return value

Output:

5

Explanation:

In the program code, a method "sum_of_squares" is declared, which accepts an integer variable "no_more_than" in its parameter, inside the method, two integer variable "i and t" are declared, in which "i" hold a value 1, and "t" hold a value that is 0.

In the next step, a while loop has defined, that square and add integer value and check its value less than equal to the parameter value, in the loop it checks the value and returns t variable value.

6 0
3 years ago
What console can be used to enable disable start or stop a service
umka21 [38]
That would be msconfig!
5 0
3 years ago
Other questions:
  • Search engines enable you to
    13·2 answers
  • Truncation is a keyword search technique that helps you find useful variations of a term or terms. You want to find books on the
    5·1 answer
  • Write a function that, given an array of integers and its size, reverses the elements in the array. For example, if the original
    13·1 answer
  • Learning in a digital environment is also called learning.
    6·2 answers
  • With ____________________, you can insert and remove a device while the computer is running.
    11·1 answer
  • 3.
    5·1 answer
  • Write the definition of a public class Simple. The class has no constructors, methods or instance variables.
    6·2 answers
  • An electrician uses a device called a volt meter. The volt meter is an example of
    8·1 answer
  • A is a program for editing,rearranging and storing text
    13·2 answers
  • Which describes the "Network Effect?"
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!