A member of your programming team suggests that your rehash() method first convert the key to a String using its toString() method, then hash on the resulting string. Evaluate this idea. Be sure to justify your claims.
What will be an ideal response?
: If the keys are already integers or characters, then converting to a String is simply extra work as the hashing method will then convert those characters in the String back to their ascii values. Otherwise, the idea would work fine, the folding hash technique could be used and all keys would be hashed in the same manner, producing a more even distribution of hash values.
You might also like to view...
Assume that you have a document with many subsections. Write the HTML markup to create a frame with a table of contents on the left side of the window, and have each entry in the table of contents use internal linking to scroll down the document frame to the appropriate subsection.
What will be an ideal response?
Which of the following would prevent the Intune client to be installed on an OS?
A. it's a 32-bit OS B. it's Windows Vista Enterprise C. the SMS client is installed D. the Windows Installer is version 3.2