Which of (a) to (d) is false: The size of a hash table

a. should be a power of 2 for quadratic probing
b. should be a prime number for linear probing
c. should be about 2N for quadratic probing
d. should be about N for separate chaining
e. two or more of the above are false


A

Computer Science & Information Technology

You might also like to view...

Set list-style-type to the value ___________ to hide the display of the list markers on an ordered list.

a. none b. hide c. invisible d. nodisplay

Computer Science & Information Technology

How are virtual machine assignments made available for users to discover?

A. a record is added to DNS B. they are recorded in Active Directory C. the NetBIOS name is broadcast D. RD virtualization host announcements

Computer Science & Information Technology

Clip art images can consist of photographic images

Indicate whether the statement is true or false

Computer Science & Information Technology

iOS refers to

A) An integrated operating system B) An Internet operating system that allows modifications C) A closed source or vendor-specific operating system D) A type of operating system that does allow modifications

Computer Science & Information Technology