1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
7

What are the advantages and disadvantages of the various collision resolution strategies for hashes?

Computers and Technology
2 answers:
Digiron [165]3 years ago
6 0

Linear probing

It does a linear search for an empty slot when a collision is identified

Advantages

Easy to implement

It always finds a location if there is one

Disadvantages

When clusters and keys fill most of the array after forming in adjacent slots of the table, the performance deteriorates

Double probing/hashing

The idea here is to make the offset to the next position probed depending on the key value. This is so it can be different for different keys.

Advantages

Good for double number generation

Smaller hash tables can be used.

Disadvantages

As the table fills up, the performance degrades.

Quadratic probing

It is used to resolve collisions in hash tables. It is an open addressing scheme in computer programming.

Advantage

It is more efficient for a closed hash table.

Disadvantage

Has secondary clustering. Two keys have same probe sequence when they hash to the same location.

sineoko [7]3 years ago
6 0

Answer:

Vector: each vector position holds one

information. If the hashing function applied to a

set of elements determine the information I1,

I2, ..., In, so the vector V [1 ... n] is used to

represent the hash table.

! Vector + Chain List: Vector contains

pointers to lists that represent the

information.

Hashing Function

! The Hashing Function is responsible for generating a

index from a given key.

! Ideally, the function should provide unique indexes for the

set of possible input keys.

! Hashing function is extremely important,

because she is responsible for distributing the information through

Hash table.

Explanation:

Hope this helps :) -Mark Brainiest Please :)

You might be interested in
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
Any idea how to make my simple python projects such as guess the number, mad libs, etc. even better?
-Dominant- [34]

Answer: Person's name.

Explanation:

3 0
2 years ago
Read 2 more answers
What specific record type is found in every zone and contains information that identifies the server primarily responsible for t
ValentinkaMS [17]

The SOA is the specific record type found in every zone and contains information that identifies the sever primarily responsible for the zone as well as some operational properties for the zone.

Explanation:

The Start of Authority Records (SOA) has the following information they are

Serial Number: This number is used to find when zonal information should be replicated.

Responsible person: The Email address of a person is responsible for managing the zone.

Refresh Interval: It specifies how often a secondary DNS server tries to renew its zone information.

Retry Interval: It specifies the amount of time a secondary server waits before retrying the zone information has failed.

Expires After: IT specifies the amount of time before a secondary server considers its zone data if it can't contact with the primary server.

Minimum TTL: It specifies the default TTL value for a zone data when a TTL is not supplied.

4 0
3 years ago
TRUE/FALSE: In order to use an object in a program, its class must be defined.
FinnZ [79.3K]
Yes that is correct. True
3 0
3 years ago
Speech about society being normal
Kisachek [45]

Answer:

Do you know what is best about America? It’s really the fact that the right to equality has been ensured at the maximum level, and for all. And the citizens respect their family and this is being showcased proudly by Sir Donald Trump who not only looks after the whole US without ever hesitating no matter whatever might be the issue and at the same time also look after his great and proven proud family. And that explains in itself why America is so great. And this is a perfect specimen of an inordinate democracy, and that is why American Democracy is so fruitful. There is sufficient money, all sorts of resources, the most influential military, and the world's finest technology. And American history can be a petite one, but it is one of the most noticeable histories in the entire world. You will not find such a great history in any other part of the world. And George Washington, the father of the country set such an example that the next various generations of great leaders were able to build such a great America. It is a society where every citizen enjoys equal rights, and a day before Sir Trump issued various prisoners with graduate degrees, to help them to return to the mainstream of life. No other society in the whole world enjoys such a level of privileges on behalf of equality. And that’s why the US society can be termed as the most normal in the whole world.

Explanation:

Please check the answer section. And I have chosen US as it is the most fruitful democracy of the world. And I feel all the counrtries from the entire world, should learn a lesson from the short history of United States. This is the way in which we can sight a normal society.

3 0
3 years ago
Other questions:
  • The code selection above is taken from the Color Sleuth activity you just completed. This selection would count as an abstractio
    12·1 answer
  • Which of the following represent typical account fees?
    7·1 answer
  • Which command would you use to move a file from one location to another?
    6·2 answers
  • .All of the following are true with the respect to implicitinvocation except:
    8·1 answer
  • Que funcion tiene la sombrilla forrada de aluminio​
    6·1 answer
  • James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the d
    12·1 answer
  • Kevin gets a call from a user who is trying to install a new piece of software. The user doesn’t have administrative rights, so
    10·1 answer
  • Free points,
    15·2 answers
  • How many passes will it take to find the five in this list?
    6·2 answers
  • Which of the following shows data conversion taking place?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!