A(n) ______ maps the search key of a table item into a location that will contain the item.
a) hash function
b) hash table
c) AVL tree
d) red-black tree
a.
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT an example of a best practice?
A. Using an Application Programming Interface (API) B. Using inheritance C. Using accessor methods D. Using the Model-View-Controller design pattern
Computer Science & Information Technology
Organizations that use the Internet for internal activities, such as keeping their staff connected to a corporate database, are following the ____________________ e-business model.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology