When two different keys “hash into” the same cell in an array, this is known as a ________.
a) error
b) collision
c) problem
d) crash
b) collision
Computer Science & Information Technology
You might also like to view...
The data security manage function is geared around ____ creation and enforcement.
A. procedure B. policy C. standard D. resource
Computer Science & Information Technology
In Design view, you can double-click the ____________________ button to open the property sheet for the entire report.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology