______ is a collision-resolution scheme that searches the hash table sequentially, starting from the original location specified by the hash function, for an unoccupied location.

a) Linear probing
b) Quadratic probing
c) Double hashing
d) Separate chaining


a.

Computer Science & Information Technology

You might also like to view...

A coworker is asking for your advice on a problem with a computer that will not communicate on the network. While assisting the coworker, you suspect that the wired NIC may have failed.   Which of the following will you recommend to your coworker as the best tool to diagnose this issue? (Select TWO.)

A. Wi-Fi analyzer B. Loopback plug C. Network multimeter D. Punchdown tool E. Cable tester

Computer Science & Information Technology

The sending of a phony email that pretends to be from a credit-card company or back, luring you to a website that attempts to obtain confidential information from you, is called

A. spoofing B. phishing C. spamming D. key logging E. cookies

Computer Science & Information Technology

For search engine optimization, limit the number of ____ in the head section to about a dozen.

A. keywords B. titles C. parameters D. indices

Computer Science & Information Technology

Which of these support management concerns directly affects the support staff's job?

A. The support mission statement B. Support performance measures C. Staffing the support group D. All of these

Computer Science & Information Technology