1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irga5000 [103]
3 years ago
5

)finding an unused location in the hash table is called

Computers and Technology
1 answer:
Ber [7]3 years ago
7 0

Answer:

D.Open Addressing.

Explanation:

It is a technique to handle collision in the hashmap. According to the design of the hash function if the location provided to the element is already full or not empty then the next free location is searched and the key is inserted  at that location.So it searches for an unused location in hash table so the answer is Open addressing.

You might be interested in
define a function named quarter_num that has one parameter number and return quarter of the number. For example: if we called th
IgorLugansk [536]
Idk what programming language you use so

private int quarter_num(int num) {
return num / 4;
}
3 0
3 years ago
How do you put pictures in your questions?
faust18 [17]

Answer:

there's a plus sign in the bottom right press it then another thing will pop up which looks like a clip then you press that

8 0
4 years ago
It was stated that the inclusion of the salt in the UNIX password scheme increases the difficulty of guessing by a factor of 409
Furkat [3]

Answer: Explanation:

Salting alters the hash of a password so that it does not physically match the hash of another password. A salt and password are concatenated and processed with a cryptographic hash function. Salt prevents use of rainbow and hash tables to attacking and cracking passwords.

For example, a user has the password, "password000" and is put through a SHA1 hash. In the password database, all of the users with the password "password000" will have the exact same hash, because of the nature of hashing functions.  So, if an attacker breaches the database and brute force the password of the user mentioned above, he could look for all the hashes that match the original user's and would know their passwords are also "password000".

By applying a salt, the password hashes would no longer be identical to one another, even though the actual password is still the same. This requires the attacker to go in and attempt to brute force the second password (which has a different salt), even though it may be the same as the first.

In conclusion, it prevents an attacker from uncovering one password and subsequently uncovering multiple others.

4 0
3 years ago
In which way(s) can numbers in a chart be formatted?
yuradex [85]
I'd go with all of these, honestly. 
5 0
3 years ago
_____ provides the best video resolution. *<br><br> VGA<br> HDMI<br> USB<br> DVI
malfutka [58]
HDMI provides the best video resolu
7 0
3 years ago
Other questions:
  • Write a Java program that can compute the interest on the next monthly mortgage payment. The program reads the balance and the a
    12·1 answer
  • PowerPoint’s _____ feature can assist you in finding answers to questions such as “How can I specify which slides to print?” a.
    6·1 answer
  • Two or more computers connected together is referred to as a(n)
    14·1 answer
  • What is the only way to remove a password encryption on an Excel file?
    6·2 answers
  • Suppose that you are asked to modify the Stack class to add a new operation max() that returns the current maximum of the stack
    8·1 answer
  • The RAND() function in Excel returns a pseudo-random number between 0 and 1. If you enter this function into 1000 cells (i.e. en
    5·1 answer
  • When using the Photo Album dialog box, a picture
    13·2 answers
  • Vhat is the result when you run the following program?
    6·1 answer
  • The ______ engine compares your entry against its database and returns a list of hits or sites that contain the keywords. (hint:
    8·1 answer
  • You are working on a ticket for a user who cannot access the Internet from their PC. After troubleshooting, how do you confirm t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!