Suppose we have a list of part numbers, numbered from 0 to 1999 and we want to use a hash table for the part numbers. There is no chance that any new part numbers will be inserted and that no part numbers will be removed. We should use:
A. h( k ) = k
B. chaining
C. probing
D. a uniform
A
Computer Science & Information Technology
You might also like to view...
Both Title and Filename do NOT refer to the name the document was saved under
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following is an attack where the hacker inserts himself between instructions, introduces changes, and alters the order of execution of the instructions, thereby altering the outcome?
A. memory leak B. bluesnarfing C. race condition D. integer overflow
Computer Science & Information Technology