A table of keyed elements which uses a hash function to located positions in the table is a(n):
A. keyed table
B. function table
C. hash table
D. chained table
C
Computer Science & Information Technology
You might also like to view...
Which of the following is used to filter incoming and outgoing traffic?
a. IDS b. IPS c. Firewall d. DMZ
Computer Science & Information Technology
To move a section of text from one part of your document to another, first select the text, then click the _____ button.
A.
B.
C.
D.
Computer Science & Information Technology