1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
7

What are the advantages and disadvantages of the various collision resolution strategies for hashes?

Computers and Technology
2 answers:
Digiron [165]3 years ago
6 0

Linear probing

It does a linear search for an empty slot when a collision is identified

Advantages

Easy to implement

It always finds a location if there is one

Disadvantages

When clusters and keys fill most of the array after forming in adjacent slots of the table, the performance deteriorates

Double probing/hashing

The idea here is to make the offset to the next position probed depending on the key value. This is so it can be different for different keys.

Advantages

Good for double number generation

Smaller hash tables can be used.

Disadvantages

As the table fills up, the performance degrades.

Quadratic probing

It is used to resolve collisions in hash tables. It is an open addressing scheme in computer programming.

Advantage

It is more efficient for a closed hash table.

Disadvantage

Has secondary clustering. Two keys have same probe sequence when they hash to the same location.

sineoko [7]3 years ago
6 0

Answer:

Vector: each vector position holds one

information. If the hashing function applied to a

set of elements determine the information I1,

I2, ..., In, so the vector V [1 ... n] is used to

represent the hash table.

! Vector + Chain List: Vector contains

pointers to lists that represent the

information.

Hashing Function

! The Hashing Function is responsible for generating a

index from a given key.

! Ideally, the function should provide unique indexes for the

set of possible input keys.

! Hashing function is extremely important,

because she is responsible for distributing the information through

Hash table.

Explanation:

Hope this helps :) -Mark Brainiest Please :)

You might be interested in
Which part of project management involves determining the required materials?
Katyanochek1 [597]
Resources I think because what u have all depends on resources
5 0
3 years ago
Read 2 more answers
Match the following
kakasveta [241]

Answer:

Eraser tool -removes the unwanted part of the drawing.

Row -horizontal space running from left to right.

Text -Primary component of a multimedia.

Drawing Area -Working are of ms point program.

I hope this helps!! Correct me plz if I'm wrong. If I'm right, could you mark me as brainliest?

8 0
2 years ago
When implementing best practices, you will use external standalone firewalls whenever possible, but you won't go without a built
Andrews [41]
The answer is true

Technically, we have two types of firewall, a one way firewall and a two way. A one-way firewall will protect you from incoming threats. A two-way built-in or standalone firewall will add another layer of protection and thus, it is a must have tool.


8 0
2 years ago
What was the strength of the Southern colonies? WILL GIVE BRAINLEST
Alex_Xolod [135]

Answer:

easy to grow crops should be the answer

4 0
3 years ago
What term refers to a written report given about an event or other newsworthy subject? A. press box B. press kit C. press pass D
guajiro [1.7K]
D. Press release is the correct answer. 
4 0
3 years ago
Read 2 more answers
Other questions:
  • (50 points) Write a program arrays1.cthat checks if two integer arrays are different by one and only one elementwhen compared el
    5·1 answer
  • James, a technician, needs to format a new drive on a workstation. He will need to configure read attributes to specific local f
    5·1 answer
  • An organization uses SAP financial management software to store accounting details and Microsoft CRM software to record customer
    12·1 answer
  • Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control
    10·1 answer
  • What are attribute grammars used for?
    8·1 answer
  • All Office programs have similar commands on the tab for changing the document view a. File b. View c. Locate d. display ​
    5·1 answer
  • The act of using computer equipment to “break into” the computer systems of others?
    6·1 answer
  • 1. what is the purpose of giving an id to an html element when using javascript?
    8·1 answer
  • An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
    13·1 answer
  • In the bremmer article, the author states that _________ translates into greater risks.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!