We call the set of keys that hash to the same location in our list ____.

A. duplicates
B. synonyms
C. errors
D. similarities


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. In the RGBA color system every color is represented by its red, green and blue color values, each ranging from 0 to 255, where 0 denotes no color and 255 full color. b. The alpha value (A of RGBA)—which ranges from 0.0 to 1.0—represents a color’s opacity, with 0.0 being completely transparent and 1.0 completely opaque. c. JavaFX makes extensive use of properties. A property is defined by creating set and get methods with specific naming conventions. public void setHour(int hour) public int getHour() define a read/write property named hour. Such methods manipulate a corresponding private instance variable that must have the same name as the property. d. In general, the pair of methods that define a read/write property have the form: public void setPropertyName(Type propertyName) public Type getPropertyName()

Computer Science & Information Technology

Which of the following is NOT a step in creating a many-to-many relationship?

A) Create a junction table. B) The junction table is on the many side of both relationships. C) Populate the junction table after the relationships have been created. D) Only add the keys to the junction table.

Computer Science & Information Technology

One way to detect rouge access points is by periodic site surveys

Indicate whether the statement is true or false.

Computer Science & Information Technology

Does a PKI use symmetric or asymmetric encryption? Explain your answer

What will be an ideal response?

Computer Science & Information Technology