A table of keyed elements which uses a hash function to located positions in the table is a(n):

A. keyed table
B. function table
C. hash table
D. chained table

C

Computer Science & Information Technology

You might also like to view...

Which of the following is used to filter incoming and outgoing traffic?

a. IDS b. IPS c. Firewall d. DMZ

Computer Science & Information Technology

To move a section of text from one part of your document to another, first select the text, then click the _____ button.

A.
B.
C.
D.

Computer Science & Information Technology