In designing a hash table, why do we want the size of the table to be significantly larger than the maximum number of entries that we will insert into it?

What will be an ideal response?


To reduce the chance of a collision.

Computer Science & Information Technology

You might also like to view...

The classpath consists of a list of directories or archive files, each separated by a ________ on Windows or a ________ on UNIX/Linux/Max OS X.

a. colon (:), semicolon (;). b. semicolon (;), colon (:). c. comma (,), semicolon (;). d. semicolon (;), comma (,).

Computer Science & Information Technology

Vector graphic files may have an extension _____.

A. .jpg B. .tiff C. .wmf D. .bmp

Computer Science & Information Technology

A(n) ______ is an item that contains data, as well as the actions that read or process the data.

A. table B. field C. record D. object

Computer Science & Information Technology

Packet fragmentation, source routing, and IP address spoofing are attempts to circumvent detection techniques employed by IDS.

a. true b. false

Computer Science & Information Technology