1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KatRina [158]
4 years ago
8

Please explain external hashing, B-trees, and traversals. 3-5 sentences per

Computers and Technology
1 answer:
katrin [286]4 years ago
4 0

Answer: In external hashing the hash table is in disk where each slot of the page table holds multiple entries which refers to pages on the disk organised in the form of buckets.

B-trees are self balancing trees which contains sorted data and allows insertion, deletion, traversals

Traversal is the process of visiting the nodes of the tree data structure.

Explanation:

External hashing is different from internal hashing and it refers to concepts in database management systems. Internal hashing stores only single record maintained in page table format, whereas external hashing holds multiple entries.

B-trees are generalisation of binary trees where it can have more than 2 children.

Traversal of trees helps in insertion, deletion, modification of nodes in tree data structure

You might be interested in
A "shooting star," or meteor, is actually a meteoroid that burns up in Earth's atmosphere.
Vikentia [17]

The answer is true. Shootings stars are, in fact, meteors. The trail you see behind them is the burning, chemical trail it leaves behind. Kinda like a rocket reentering the atmosphere.

4 0
4 years ago
Why is cyberbullying so devastating to many people beyond just the victim?
Lynna [10]

Answer: If the situation goes undetected, it can lead to serious situations, self-harm, and damaged relationships. According to Superintendent Alex Geordan, some common long-term effects of cyberbullying include depression, low self-esteem, unhealthy addictions, trust issues, and poor mental health.

6 0
3 years ago
before Katie turns in the paper she typed she wants a peer to review it and give her feedback Katie uses her all in one printer
masha68 [24]

It is an input and an output. The scanner scans the paper which is the input ,and the output is when the printer prints the paper.

3 0
3 years ago
When you send an email how many computers does it go to
Xelga [282]

once you have sent the email it will only go to the server which then the person receiving it would log on therefore requesting the emails recived.

I'm not 100% sure my answer is classed as correct but I would say it doesn't go to a computer it just gets stored on a server in till requested

4 0
3 years ago
If an ips identifies an attack, it can ________.
Gennadij [26K]

Answer:

a. drop the attack packet(s)

Explanation:

An IPS not only detects and alerts system administrators but it also stops attacks. It is built to consistently monitor a network, report malicious incidents and take preventative actions. So, how does an IPS work exactly? An IPS does a deep packet inspection and either blocks the IP of whoever sent the malicious packet or removes the malicious packet's content and repackages its payloads. Thus, this means that the malicious packet is completely dropped by stripping off of its header information and any infected items in the packet.

5 0
3 years ago
Other questions:
  • Ponce is the largest city on which coast of Puerto Rico
    13·1 answer
  • The answer for 1 and 2
    5·1 answer
  • Each time the enter key is pressed, word creates a new paragraph. (points : 2) true false
    7·1 answer
  • Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Granite Sales C
    12·1 answer
  • Review the following statements and select the ones that are correct regarding sorting accounts from the Adjusted Trial Balance
    5·1 answer
  • Can anyone fill in the space please
    6·1 answer
  • Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, acc
    9·1 answer
  • An individual involved with the aspect of a project will be concerned with budgets and the costs associated with running a busin
    10·2 answers
  • Please explain what is Ribbon?  give examples​
    7·2 answers
  • a request for records of features based on their attributes (contained in tables associated with features)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!