1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
7

What are the advantages and disadvantages of the various collision resolution strategies for hashes?

Computers and Technology
2 answers:
Digiron [165]3 years ago
6 0

Linear probing

It does a linear search for an empty slot when a collision is identified

Advantages

Easy to implement

It always finds a location if there is one

Disadvantages

When clusters and keys fill most of the array after forming in adjacent slots of the table, the performance deteriorates

Double probing/hashing

The idea here is to make the offset to the next position probed depending on the key value. This is so it can be different for different keys.

Advantages

Good for double number generation

Smaller hash tables can be used.

Disadvantages

As the table fills up, the performance degrades.

Quadratic probing

It is used to resolve collisions in hash tables. It is an open addressing scheme in computer programming.

Advantage

It is more efficient for a closed hash table.

Disadvantage

Has secondary clustering. Two keys have same probe sequence when they hash to the same location.

sineoko [7]3 years ago
6 0

Answer:

Vector: each vector position holds one

information. If the hashing function applied to a

set of elements determine the information I1,

I2, ..., In, so the vector V [1 ... n] is used to

represent the hash table.

! Vector + Chain List: Vector contains

pointers to lists that represent the

information.

Hashing Function

! The Hashing Function is responsible for generating a

index from a given key.

! Ideally, the function should provide unique indexes for the

set of possible input keys.

! Hashing function is extremely important,

because she is responsible for distributing the information through

Hash table.

Explanation:

Hope this helps :) -Mark Brainiest Please :)

You might be interested in
The development of a new information system is economically justified if the _____.
ruslelena [56]
The development of new information system is economically justified when or if the organization or group handling the information system has assessed its cost feasibility. If so, this will only fall under the circumstances that the information system is justified economically
3 0
3 years ago
Read 2 more answers
_______ an embedded Word table to activate the Word features.
Bess [88]
The answer is C. double-click
3 0
3 years ago
REAL ANSWERS ONLY!!! BRAINLLIEST AND 50 POINTS FOR BEST ANSWER
BigorU [14]
I’m not sure what you’re asking, what about a presentation? Reply back to this and lmk so I can figure it out for ya!!
6 0
2 years ago
Read 2 more answers
. Pam is showing her audience, live on the internet, an article that was posted to a reputable website just hours before her spe
Afina-wow [57]

Answer:

webidence

Explanation:

Webidence is a web source or web sources displayed as evidence during a speech, found by using real-time web access or webpage capture software.

This is an online material which serve as a form of evidence to support ones speech or presentation.

It can be gathered or gotten by making use of capture software, real time web access or webpage.

The main idea behind it is to authenticate your presentation.

4 0
3 years ago
Uses of internet write in point.​
Vladimir [108]

Answer:

-Electronic mail. At least 85% of the inhabitants of cyberspace send and receive e-mail. ...

-Research.

-Downloading files.

-Discussion groups. ...

-Interactive games. ...

-Education and self-improvement. ...

-Friendship and dating. ...

-Electronic newspapers and magazines.

3 0
3 years ago
Other questions:
  • Ideally, how often should you back up the data on your computer? once an hour, once a day, once a month, once a year. Please hur
    5·2 answers
  • Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
    8·2 answers
  • With the range E2:E30 selected, create a new conditional formatting rule that uses a formula to apply yellow fill and bold font
    10·1 answer
  • Which shortcut key aligns text to the center of the paige
    5·1 answer
  • A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in
    15·1 answer
  • Select the correct answer.
    10·1 answer
  • 7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
    8·1 answer
  • Which contact field is used to control the name that would appear in the To field of an email message when a user is sending a m
    5·2 answers
  • Write a program named as reverse.c that reads a message, then prints the reversal of the message. The output of the program shou
    7·1 answer
  • What is the core function of an enterprise platform
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!