What is linear probing?

a. It is a form of open addressing. When the hash function causes a collision, the probing searches for the closest following free location and inserts the new key there.
b. It is a form of open addressing. When the hash function causes a collision, the probing operates by taking the original hash and adding successive values of an arbitrary quadratic polynomial.
c. It's a technique used to resolve collisions. When a hash function causes a collision, we repeatedly step forward by an interval until we find a free location. The interval is decided using a second, independent hash function.
d. It's a technique used to resolve collisions. When a hash conflicts with another hash, both the elements are stored in the buckets (linked-lists) stored under the hash code they produced.


a. It is a form of open addressing. When the hash function causes a collision, the probing searches for the closest following free location and inserts the new key there.

Computer Science & Information Technology

You might also like to view...

Which statement is false?

a. Classes are reusable software components. b. A class is to an object as a blueprint is to a house. c. Performing a task in a program requires a method. d. A class is an instance of its object.

Computer Science & Information Technology

Hypervisors run in ________ controlling hardware access for the virtual machines they host.

A) Ring 0 B) Ring 1 C) Ring 2 D) Ring 3

Computer Science & Information Technology

What points the domain to the web host?

a. Domain name b. Web host c. Name server d. FTP client

Computer Science & Information Technology

What is a flaw or weakness that allows a threat agent to bypass security?

A. risk B. vulnerability C. asset D. threat

Computer Science & Information Technology