The condition that occurs when a hash function maps two or more distinct search keys into the same location is called a(n) ______.

a) disturbance
b) collision
c) rotation
d) congestion


b.

Computer Science & Information Technology

You might also like to view...

List two static routes to route data from LAN A to LAN C in the network shown in Figure 9-14, assuming the subnet mask 255.255.255.0.

Computer Science & Information Technology

The ________ passes the request to a central location

Fill in the blank(s) with correct word

Computer Science & Information Technology

TCP/IP uses a numeric value as an identifier to the applications and services on these systems.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The objective of the ________ control category is to avoid breaches of any law, statutory, regulatory, or contractual obligations, and of any security requirements.

A. access B. asset management C. compliance D. business continuity management

Computer Science & Information Technology