In the ____ method, if a collision occurs with the hash function h, we use a series of hash functions, h1, h2, . . ., hs.

A. overhashing
B. recomputing
C. rehashing
D. precomputing


Answer: C

Computer Science & Information Technology

You might also like to view...

A Boolean variable can have which of the following values:

a. true b. false c. 1 d. 0 e. Any of the above are possible values for a Boolean variable

Computer Science & Information Technology

Develop a C# app that will determine whether any of several de- partment-store customers has exceeded the credit limit on a charge account. For each customer, the following facts are available:

a) account number, b) balance at the beginning of the month, c) total of all items charged by the customer this month, d) total of all credits applied to the customer’s account this month and e) allowed credit limit. The app should input all these facts as integers, calculate the new balance (= beginning balance + charges – credits), display the new balance and determine whether the new balance exceeds the cus- tomer’s credit limit. For those whose credit limit is exceeded, the app should display the message "Credit limit exceeded". Use sentinel-controlled iteration to obtain the data for each account.

Computer Science & Information Technology

The y value in a coordinate pair increases ____.

A. horizontally toward the right B. vertically downward C. horizontally toward the left D. vertically upward

Computer Science & Information Technology

In the Action Center, a red item is potentially serious or an important alert that should be addressed immediately

Indicate whether the statement is true or false

Computer Science & Information Technology