A table of keyed elements which uses a hash function to located positions in the table is a(n):

A. keyed table
B. function table
C. hash table
D. chained table


C

Computer Science & Information Technology

You might also like to view...

A declaration for an enumerated type begins with the __________ key word.

a. enumerated b. enum type c. ENUM d. enum

Computer Science & Information Technology

An independent Sub procedure can contain one or more parameters in its procedure header.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____________________ are pictures on the screen that can be selected by a mouse or other pointing device.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When forwarding a message, Gmail includes the original message in the message display area and adds a blank line ____ so you can add an optional message to provide context for the recipient.?

A. ?above the original message B. ?below the original message C. ?to the left of the original message D. ?to the right of the original message

Computer Science & Information Technology