1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KatRina [158]
4 years ago
8

Please explain external hashing, B-trees, and traversals. 3-5 sentences per

Computers and Technology
1 answer:
katrin [286]4 years ago
4 0

Answer: In external hashing the hash table is in disk where each slot of the page table holds multiple entries which refers to pages on the disk organised in the form of buckets.

B-trees are self balancing trees which contains sorted data and allows insertion, deletion, traversals

Traversal is the process of visiting the nodes of the tree data structure.

Explanation:

External hashing is different from internal hashing and it refers to concepts in database management systems. Internal hashing stores only single record maintained in page table format, whereas external hashing holds multiple entries.

B-trees are generalisation of binary trees where it can have more than 2 children.

Traversal of trees helps in insertion, deletion, modification of nodes in tree data structure

You might be interested in
In what way are high-level programming languages limited? (5 points)
Nat2105 [25]

Answer: High-level computer languages must be translated into assembly or machine languages by a compiler before they can be executed, making them slightly slower to execute than raw assembly or machine language. The answer is D.

4 0
3 years ago
Read 2 more answers
When you are working on an unsaved document on a PC, where is the document temporarily saved?
Serga [27]

Answer:

RAM

Explanation:

RAM or Random Access Memory is a volatile storage memory which means if a power is turned off and turned on again it will be clear, that is why, if we do not save our work and a power failure occurs, our data is lost. It is where all our running programs are located while we are working. There is another memory, which is ROM(Read Only Memory). This is a non-volatile storage and saved work is stored in ROM.

3 0
3 years ago
How is cell phone usage changing American Society? Is this a good change or a bad change? Explain.
klio [65]

Answer:

Causing too many eye problems and changing and influecing people too much. Causes anxiety. BAD

Explanation:

7 0
3 years ago
Does anyone know how I can fix this? It keeps saying that it’s an illegal start of an expression and that it is missing an ; at
tangare [24]

Answer:

Use stackoverflow it's a website for proggramers

7 0
3 years ago
Wi-fi refers to a network that is based on the ____ standard
Reil [10]

Answer:

Wi-fi refers to a network that is based on the 802.11 standard.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Some smartphones use ______ text, where you press one key on the keyboard or keypad for each letter in a word, and software on t
    13·1 answer
  • Which of the following functions does a browser perform?
    5·1 answer
  • Write a function (named n_pointed_star) to make the turtle draw an n-pointed star. The function should return nothing, and accep
    10·1 answer
  • list the network characteristics of the wireless network(s) in the decode -- SSIDs, channels used, AP names, presence of Bluetoo
    6·1 answer
  • A junior network administrator has used the wrong cable type to connect his/her computer to the administrative port on a router
    7·1 answer
  • A simulation model includes: a. a description of the components of the system. b. a simulation clock. c. a definition of the sta
    8·1 answer
  • Does anyone know to get Google updated if it failed to update?
    12·1 answer
  • Your company is planning to storage log data, crash dump files, and other diagnostic data for Azure VMs in Azure. The company ha
    12·1 answer
  • . Which responsibility belongs to the marketing function?
    11·1 answer
  • A company set up controls to allow only a specific set of software and tools to install on workstations. A user navigates to a s
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!