Maps allocate keys to values and cannot contain duplicate keys, i.e., the key-to-value mapping is a __________ mapping.

a. many-to-many.
b. many-to-one.
c. one-to-many.
d. one-to-one.

D

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. To avoid destroying valid output data residing in a buffer, UNIX responds to a write command by marking the appropriate buffer dirty. 2. UNIX implements pipes by taking advantage of its file system. 3. Under UNIX, although physical I/O may appear asynchronous, it is really synchronous. 4. Linux differs substantially from UNIX and Windows. 5. All Linux device drivers are in the kernel.

Computer Science & Information Technology

A circle is an example of a closed path.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology