Maps allocate keys to values and cannot contain duplicate keys, i.e., the key-to-value mapping is a __________ mapping.

a. many-to-many.
b. many-to-one.
c. one-to-many.
d. one-to-one.


d. one-to-one.

Computer Science & Information Technology

You might also like to view...

Which TCP flag can be the default response to a probe on a closed port?

A. RST B. URG C. PSH D. SYN

Computer Science & Information Technology

If you calculate payments that are too high for your budget, you might consider:

A) borrowing less money. B) increasing the interest rate. C) borrowing more money. D) decreasing the time period to repay the loan.

Computer Science & Information Technology

___________ encryption uses a single, private key to both encrypt and decrypt data

a. Asymmetric b. Symmetric c. Secure d. Clear

Computer Science & Information Technology

What causes a lot of memory leaks?

A. deallocation of objects B. allocation of objects C. compling code too often D. low memory in CPU

Computer Science & Information Technology