Suppose we have a list of part numbers, numbered from 0 to 1999 and we want to use a hash table for the part numbers. There is no chance that any new part numbers will be inserted and that no part numbers will be removed. We should use:

A. h( k ) = k
B. chaining
C. probing
D. a uniform

A

Computer Science & Information Technology

You might also like to view...

Both Title and Filename do NOT refer to the name the document was saved under

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is an attack where the hacker inserts himself between instructions, introduces changes, and alters the order of execution of the instructions, thereby altering the outcome?

A. memory leak B. bluesnarfing C. race condition D. integer overflow

Computer Science & Information Technology