The ____ of a hashed list is the number of elements in the list divided by the number of physical elements allocated for the list, expressed as a percentage.

A. balance factor
B. clustering factor
C. load factor
D. hashing factor


Answer: C

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. As with Playfair, the strength of the Hill cipher is that it completely hides single letter frequencies. 2. A scheme known as a one-time pad is unbreakable because it produces random output that bears no statistical relationship to the plaintext. 3. The one-time pad has unlimited utility and is useful primarily for high-bandwidth channels requiring low security. 4. The most widely used cipher is the Data Encryption Standard. 5. Steganography renders the message unintelligible to outsiders by various transformations of the text.

Computer Science & Information Technology

Internet Explorer's ____ filter also can be used to create gradient effects in which a page object appears to fade away in a linear, radial, or rectangular direction.

A. Opera B. Alpha C. Beta D. WebKit

Computer Science & Information Technology

A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs? 

A. /etc/cron.deny B. /etc/cron.d/cron.deny C. /etc/cron.allow D. /etc/cron.d/cron.allow

Computer Science & Information Technology

To help determine if you want to use a site as a reference, you can check the _______ in a website's URL to see if it tells where a webpage originated.

A. domain B. kernel C. business name D. webpage name

Computer Science & Information Technology