When two different keys “hash into” the same cell in an array, this is known as a ________.

a) error
b) collision
c) problem
d) crash


b) collision

Computer Science & Information Technology

You might also like to view...

Which of the following statements is true?

a. Interpreted programs run faster than compiled programs. b. Compilers translate high-level language programs into machine language programs. c. Interpreter programs typically use machine language as input. d. None of the above.

Computer Science & Information Technology

____ attacks can be successful when the ciphertext consists of relatively few characters.

A. Correlation B. Man-in-the-middle C. Dictionary D. Timing

Computer Science & Information Technology

Which of the following Excel screen components can NOT be turned on or off?

A) Formula Bar B) Status Bar C) Tool Bar D) None of above

Computer Science & Information Technology

The process giving someone the legal right to practice a profession is called

a. certification. b. licensing. c. matriculation. d. professional ethics. e. professional development.

Computer Science & Information Technology