A(n) ______ maps the search key of a table item into a location that will contain the item.

a) hash function
b) hash table
c) AVL tree
d) red-black tree

a.

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT an example of a best practice?

A. Using an Application Programming Interface (API) B. Using inheritance C. Using accessor methods D. Using the Model-View-Controller design pattern

Computer Science & Information Technology

Organizations that use the Internet for internal activities, such as keeping their staff connected to a corporate database, are following the ____________________ e-business model.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology