An associative container uses __________ to access elements rapidly.

a. data
b. functions
c. keys
d. complex sort algorithms
e. None of these

c. keys

Computer Science & Information Technology

You might also like to view...

The __________ key exchange involves multiplying pairs of nonzero integers modulo a prime number q. Keys are generated by exponentiation over the group with exponentiation defined as repeated multiplication.

A. Diffie-Hellman B. Rabin-Miller C. Micali-Schnorr D. ElGamal

Computer Science & Information Technology

Jane brought a laptop in from home and connected the Ethernet interface on the laptop to a wall jack with a patch cable. Jane was unable to access any network resources. Which of the following is the MOST likely cause?

A. Flood guards were enabled on the switch. B. Loop protection prevented the laptop from accessing the network. C. Port security was enabled on the switch. D. Router access control lists prevented the laptop from accessing the network.

Computer Science & Information Technology