Name three major concerns which constitute a good hash function.

What will be an ideal response?


function easy and fast to compute, function scatters data evenly throughout hash table, how well does function scatter random data

Computer Science & Information Technology

You might also like to view...

Method getSelectedValues of class JList returns:

a. an array of ints representing the indices of the selected items. b. an array of doubles representing the indices of the selected items. c. an array of Strings representing the selected items. d. an array of Objects representing the selected items.

Computer Science & Information Technology

A(n) ____ is a detailed description of the activities that occur during an attack, including the preliminary indications of the attack as well as the actions taken and the outcome.

A. trigger B. database journal C. event D. attack profile

Computer Science & Information Technology

In Picture Tools, the button used to place a border around a picture is found on the ________ tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

A monitor that will not come out of power saver mode might

A) Need degaussing B) Need more RAM C) Need a driver update D) Be bad

Computer Science & Information Technology