When two different keys “hash into” the same cell in an array, this is known as a ________.

a) error
b) collision
c) problem
d) crash

b) collision

Computer Science & Information Technology

You might also like to view...

The data security manage function is geared around ____ creation and enforcement.

A. procedure B. policy C. standard D. resource

Computer Science & Information Technology

In Design view, you can double-click the ____________________ button to open the property sheet for the entire report.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology