1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
7

What are the advantages and disadvantages of the various collision resolution strategies for hashes?

Computers and Technology
2 answers:
Digiron [165]3 years ago
6 0

Linear probing

It does a linear search for an empty slot when a collision is identified

Advantages

Easy to implement

It always finds a location if there is one

Disadvantages

When clusters and keys fill most of the array after forming in adjacent slots of the table, the performance deteriorates

Double probing/hashing

The idea here is to make the offset to the next position probed depending on the key value. This is so it can be different for different keys.

Advantages

Good for double number generation

Smaller hash tables can be used.

Disadvantages

As the table fills up, the performance degrades.

Quadratic probing

It is used to resolve collisions in hash tables. It is an open addressing scheme in computer programming.

Advantage

It is more efficient for a closed hash table.

Disadvantage

Has secondary clustering. Two keys have same probe sequence when they hash to the same location.

sineoko [7]3 years ago
6 0

Answer:

Vector: each vector position holds one

information. If the hashing function applied to a

set of elements determine the information I1,

I2, ..., In, so the vector V [1 ... n] is used to

represent the hash table.

! Vector + Chain List: Vector contains

pointers to lists that represent the

information.

Hashing Function

! The Hashing Function is responsible for generating a

index from a given key.

! Ideally, the function should provide unique indexes for the

set of possible input keys.

! Hashing function is extremely important,

because she is responsible for distributing the information through

Hash table.

Explanation:

Hope this helps :) -Mark Brainiest Please :)

You might be interested in
Please help!! thank you so much!! <3
Zepler [3.9K]

Answer:

D. 4x as much

Explanation:

The answer is pretty simple. The question is asking about 10m/s and 20m/s right? Take a look at the energy at each point on the graph. At 10m/s the kinetic energy is 100 on the graph. At 20m/s the kinetic energy is 400. You'll notice that 100 x 4 is 400 - That's the answer.

You can also prove this mathematically. The formula for kinetic energy is

\frac{1}{2}mv^2

The question says: constant mass so we can ignore that for now.

(1/2) * 10^2 is (1/2) * 100 = 50

for the 20m/s ball it would be

(1/2) * 20^2 = 400 * 1/2 = 200

Once again, you see that it is 4x

3 0
3 years ago
Read 2 more answers
The manufacturer doesn't need it the buyer doesn't want it the user doesn't know they're using it
Vikentia [17]
That means that the production vause a loss in supply and demand
6 0
3 years ago
Write one for loop to print out each element of the list several things. then write another for loop
Kay [80]

Question:

Write one for loop to print out each element of the list several_things. Then, write another for loop to print out the TYPE of each element of the list several_things.

Answer:

The solution in python is as follows:

for element in several_things:

    print(element)

   

for element in several_things:

    print(type(element))

Explanation:

The solution assumes that the list several_things has already been initialized.

So, the rest of the code is explained as follows:

This line iterates through the list, several_things

for element in several_things:

This line prints each element

    print(element)

This line iterates through the list, several_things for the second time    

for element in several_things:

This line prints the type of each element

    print(type(element))

6 0
3 years ago
In which type of attack does the user respond to several external communication requests? Harry wants to watch a movie online by
Shkiper50 [21]

Answer:

They normaly do that to put a virus on your device And hack into your private info like passwords and credit cards and stuff like that

Explanation:

Always watch a movie leagly

3 0
3 years ago
Akira has trouble reading what is on the computer screen and sometimes seeing pictures on websites. As her friend, you explain t
aliina [53]

1. Using Listener Software:

Software like Adobe reader allows you to listen to the stored files rather than reading them, Akira can use this software while she need to read a file or an article, simply copy the article in pdf file and turn on listener for it.

2. Zoom in/ Zoom Out:

Most of the browsers these days allow you to zoom in and zoom out the web pages while reading them by pressing Alt and + sign for Zoom in and Alt and - for zoom out. This feature can be really helpful for reading purposes and also for images view as well.

3. Narrators

When Akira is completely fed up with reading the screen, she can use Narrators which are programs that convert every text on screen into audio file and she can listen to them.

4.Color Changers

These days software like color changer are very useful for people with low vision eyes. They change the color of screen such that there is no irritation in eyes while reading articles. They can also be used by her.

7 0
3 years ago
Other questions:
  • To decrease the size of text so it will fit into a text box without overflowing, select the
    14·2 answers
  • The cord of a bow string drill was used for
    14·1 answer
  • Using JavaScript, how does a web page react when the user enters a wrong email ID in a registration form?
    9·1 answer
  • What aspect should you consider before adding pictures to a document?
    8·2 answers
  • Who is the father of computer?​
    6·1 answer
  • Write a Java program to create a class called Cars. The class should include three instance variables: makes (type: String), mod
    12·1 answer
  • Which of the following is true of horror films like Insidious and The Conjuring?
    15·2 answers
  • An optical fibre has an attenuation of 0.3 dB/km. If a laser launches an optical power level of PIN (mW) into 35 km length of th
    8·1 answer
  • A small startup company has hired you to harden their new network. Because funds are limited, you have decided to implement a un
    8·1 answer
  • In a program you need to store identification numbers of 5 employees and their weekly gross pay.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!