Where there is a collision we try to find some otherplace in our array. This approach is calld.

a) open addressing

b) closed hashing

c) open addressing and closed hasing

d) none of the aboe.

Answers

Answer 1

Answer:

a) open addressing

Explanation:

Where there is a collision we try to find some other place in our array. This approach is called, open addressing.

Open addressing is where you talk about a problem or situation freely.

Answer 2

Where there is a collision we try to find some otherplace in our array. This approach is calld.

a) open addressing

b) closed hashing

c) open addressing and closed hasing

d) none of the aboe.


Related Questions

Computer Science (IT). My lecture was asking to do the final year project but i still haven't got the title. Does anyone can give me good recommendation of what the project i should do for my final year project?

Answers

Answer:

Hi, of course.

Project ideas:

Household temperature monitoring  Internet of things

Registration of people entering a shopping center during peak hours  with Internet of things

Smart houses with Internet of things

Explanation:

At the moment I am working on projects related to Internet of things and it is a fantastic world in which to enter, try searching  Internet of things fundamentals on yt and you soak up the subject, then you can start looking on the first hello world in arduino with Internet of things.

In this moment I'm working on a gps tracker for a public buses and it's not too hard as it's sound.

I hope it's help you

Choose a final year project that interests you and showcases your skills, such as machine learning, web development, mobile apps, cybersecurity, or IoT. Engage with faculty for guidance and consider past coursework to generate ideas.

Here are some recommended project ideas:

Machine Learning Algorithms: Develop a project that uses machine learning algorithms to solve a real-world problem, such as predicting stock market trends or diagnosing medical conditions based on patient data.Web Development: Create a comprehensive web application, perhaps an e-commerce site or a social networking platform, focusing on both front-end and back-end development.Mobile Application Development: Build a useful mobile app, such as a fitness tracker, budgeting tool, or educational game. Include features that integrate with various APIs for an enhanced user experience.Cybersecurity: Design a system for detecting and preventing cybersecurity threats, which could involve creating a new type of firewall, intrusion detection system, or a secure communication protocol.Internet of Things (IoT): Develop an IoT solution, like a smart home automation system or an environment monitoring network, utilizing sensors and cloud computing for data analysis and real-time monitoring.

When choosing a project, consider what interests you the most and what areas you want to become more proficient in. Engage with faculty members who have expertise in your area of interest for mentorship and guidance. Additionally, reflect on past coursework that you found particularly engaging or challenging, as it might spark project ideas.

Write a conditional expression that assign the value 0 to a credits variable if it is less than 0; otherwise the value of the credits variable remains unchanged.

Answers

Answer:

credits = (credits < 0) ? 0 : credits;

Explanation:

This is the ternary conditional operator.

Answer:

void updateCredit(float credit){

if credit < 0.0

credit = 0.0;

}

Explanation:

I am going to write a C function for this.

The input is your credit value, and it has just a conditional to verify if it is not negative.

void updateCredit(float credit){

if credit < 0.0

credit = 0.0;

}

What are .Classification for computer softwares?

Answers

Answer: Classification of computer software are:-

System softwareApplication software

Explanation:

System software-it is the type of software that takes input from other  device ans sources and then covert it into machine language that is understood by the operating software.E.g.-UNIX Application software- it is the software that is connected with the end user through application present on the operating system which is accessed directly by the user. E.g.-Internet Explorer

1) All the elements of an array in Java MUST conform to the same data type.

a) True
b) False

Answers

Answer:

TRUE

Explanation:

The array is allow to store the multiple values but with same data type.

It cannot store element with different data type.

For example:

int array[] = {1, 'b', 8.7, 9, 'z'}

the above is wrong way to declare the array.

the correct ways is:

int array[] = {1,2,3,4};

float array[] = {1.2, 3.4, 9.6};

we can store only same data type element in multiple tiles.

Given a int variable named callsReceived and another int variable named operatorsOnCall write the necessary code to read values into callsReceived and operatorsOnCall and print out the number of calls received per operator (integer division with truncation will do).

Answers

// c++ code to read the recieved calls

cout<< " Enter the calls recieved :";

cin>>callsRecieved;

cout<< " Enter operator on call : ";

cin>>operatorsOnCall;

// calculating the call per operator

calls_per_operator = callsRecieved/operatorsOnCall;

// printing the vaule.

cout<<" Calls recieved per operator are : " << calls_per_operator <<endl;

Final answer:

To find the number of calls received per operator, read inputs for callsReceived and operatorsOnCall, then divide callsReceived by operatorsOnCall using integer division and print the result.

Explanation:

To calculate the number of calls received per operator, you will first need to read values into the variables callsReceived and operatorsOnCall. You can do this using an input method appropriate for the programming language you're using (e.g., scanf in C, cin in C++, or input() in Python). Once you have these values, you perform the division of callsReceived by operatorsOnCall and print the result. Here is an example code snippet in Python:

# Read the number of calls received and the number of operators on call
callsReceived = int(input('Enter the number of calls received: '))
operatorsOnCall = int(input('Enter the number of operators on call: '))

# Calculate the calls per operator with integer division
callsPerOperator = callsReceived // operatorsOnCall

# Print the result
print('The number of calls received per operator is:', callsPerOperator)

Note that integer division with truncation is used (// in Python) to get an integer result.

: Differentiate between serial and parallel data transfer withat least one example of each from computer sciencedomain.

Answers

Answer:

In serial communication transfers one bit of data at a time, while parallel communication transfers many bits of data at the same time. Serial communication transmits the data bits sequentially, while parallel communication transmits data bits simultaneously, allowing greater amounts of data to be transferred.

-Serial communication is the one used to communicate the Arduino with the Computer through the USB cable.

-An example of a parallel port is the printer port. The Parallel Port was only created and used in the printers interface and the computers.

Explanation:

In serial communication, each bit is sent by its own clock flank where conditions are defined after each byte, if it is synchronous or asynchronous. In parallel communication there is only one single clock flank where the information is sent where it is an advantage to use it where there are several input or output data.

I hope it's help you.

define the role of cache memory in computers.

Answers

Answer:

Cache memory is relatively small in size as compared to the main memory. The cache memory stores programs, variables which are frequently used by the processor.

Explanation:

The cache memory is placed very close to the processor so that the programs and variables can be accessed very quickly as and when required by the processor. The size of the cache memory is small and also cost more. There is also a secondary cache in many systems which enables to store more programs which cannot be store in the primary cache.

A ____________________ can be used to hierarchically represent a classification for a given set of objects or documents. A. taxonomy B. framework C. scheme D. standard

Answers

Answer:

A. taxonomy

Explanation:

A taxonomy can be used to hierarchically represent a classification for a given set of objects or documents.

Explain the purpose (using only two sentence in each case) of eachof the following
components of UML

• Use case diagram
• Use case description
• Class diagram
• Sequence diagram
• Business or Domain model

Answers

Answer:

UML - Unified Model Language

Explanation:

Use case diagram:

A use case diagram is used to tell how many ways a   user can interact with  a system. We use special   symbols and connectors to build use case   diagrams.  

We use  horizontal shaped ovals to represent use   cases, stick figures to represent actors, lines to   represent associations between use cases and  

actors, packages to put elements into  groups.  

Use case description:  

By the name itself, we can say that it is used to   describe the activities of user that  he can do with   the system and how the system responds to those.  Before use case diagram created, we need to write   a use case description.  

Class diagram:  

UML diagrams are of two types. They are,  

Structural UML diagrams Behavioral UML diagrams

A class diagram comes under Structural UML   diagrams.

Classes are building blocks of an application that   uses OOPs concepts. Class diagrams are used to   represent classes, relationships, association,  

interface.  

Sequence diagram:  

A sequence diagram comes under  Behavioral UML   diagrams.It is used to tell the sequential order of   objects' interaction.We have many notations in this   diagram like actors, lifeline, create message, delete   message, lost message, found message etc. It is   used to tell how messages move between objects in   a system.  

Domain model :  

A domain model is a visual representation of real-  situation objects. In UML,  the Domain Model is   illustrated with a set of class diagrams

Write difference in the form of a table between Ping and TraceRoute command?

Answers

Explanation:

Ping

A network utility which is mainly used to test the connection between two devices or nodes. Ping is used to test the connectivity of a network and its name resolution.Syntax: ping <ip address>

TraceRoute

A network utility which is mainly used to track the path followed by a packet within a network from the source to the destination.It helps to trace the exact pathway of the data packet from the source to the destination.Syntax: tracert <ip address>

 

 

Non proprietary standard is also termed as____________

a. De facto standard

b. Le facto standard

c. Pre facto standard

d. Non facto standard

Answers

Answer: Option A) De facto standard

Non proprietary standard is also termed as de facto standard.

Explanation:  Non proprietary standard is also termed as de facto as when the proprietary standard such as window are widely used, then it becomes  de facto standard. When de facto standard is referring in terms of computers, it is an accepted application, design or language standard that is used in industry but not officially recognized.  

An example of de facto standard is paper clip ion used in e-mail to represent an attachment.  

Write a Java program that calculates and prints the monthly pay check for an employee. The net pay is calculated after taking the following deductions:

Federal Income Tax: 15%
State Tax: 3.5%
Social Security Tax: 5.75%
Medicare/Medicaid Tax: 2.75%
Pension Plan: 5%
Health Insurance: $75.00

Answers

Final answer:

A Java program can calculate an employee's net pay by deducting federal, state, Social Security, Medicare/Medicaid taxes, pension plan contributions, and health insurance costs from the gross pay. The net pay is then output as the amount the employee would receive in their paycheck.

Explanation:

To calculate the net pay for an employee after deductions, we need to write a Java program that considers the following deductions: Federal Income Tax at 15%, State Tax at 3.5%, Social Security Tax at 5.75%, Medicare/Medicaid Tax at 2.75%, a pension plan deduction at 5%, and a fixed amount for health insurance at $75.00.

Here is a simple example of how this Java program might look:

public class PaycheckCalculator {
   public static void main(String[] args) {
       double grossPay = 5000; // Example gross pay
       double federalTax = grossPay * 0.15;
       double stateTax = grossPay * 0.035;
       double socialSecurityTax = grossPay * 0.0575;
       double medicareTax = grossPay * 0.0275;
       double pensionPlan = grossPay * 0.05;
       double healthInsurance = 75;

       double netPay = grossPay - (federalTax + stateTax + socialSecurityTax + medicareTax + pensionPlan + healthInsurance);

       System.out.println("Net pay: $" + netPay);
   }
}

This program calculates each of the deductions based on the gross pay, subtracts them from the gross pay, and prints out the resulting net pay.

What are the advantages and disadvantage of integers and floating numbers?

Answers

Answer:

Explanation:

Advantages of int and disadvantages of float are as following :-

1.Arithmetic operation on int variables are much faster than float variables.

2.int variables does not suffer from precision loss while float variable sometimes suffer from it.

Advantages of float variables and disadvantages of int variables are as following:

1.float variables can represent values between integers.While integers cannot do that.

2.Float can represent much greater range of values than integers.

When you declare a method as abstract method ? Can I call a abstract method from a non abstract method ?

Answers

Answer: A method without body is called abstract method. A abstract method can be called from a non abstract  class or method provided it is inherited using a subclass.

Explanation:

An abstract method is a method which does not have a body, it just has opening and closing curly braces. A class having an abstract method is also declared as abstract class. We cannot make an object of the abstract class.

example : public abstract float multiply(float x, float y);

is an example of abstract method.

calling an abstract method from a non  abstract method is possible provided it is inherited by a non abstract subclass.

What is the advantages and disadvantagesof International Standards for NetworkProtocols.

Answers

Answer:

Advantages and disadvantages of international standards for network protocols are:

Advantages -

Due to common underlying standard maintenance and installation become easy. Many computers can connect together from all the worldwide, as they are using the international standard for network protocol. One of the main advantage using international standard as it boost up growth and economy.

Disadvantages -

Every network standard has its own limitations in a particular domain. Once it is spread worldwide then it is difficult to resolve network issues.

True / False
The exponent in floating point is stored as a biased value.

Answers

Answer:

True

Explanation:

The bias value present in a floating point number deals with the positiveness and negativeness of the exponent part for a floating point number.  The bias value for a floating point number is 127. It means that 127 is always needed to be added to the exponent part of any floating point number.

In a single precision floating point number, we need 8 bits to store the exponent. Rather than storing it as a signed two's complement number, it is easier to simply add 127 to the exponent (because the lowest value that can be in 8 bit signed is -127) and simply store it as an unsigned number. If the stored value is bigger than the bias then it would mean the value of the exponent is positive otherwise it is negative, but if they are equal then it is 0.

Programs that are embedded in a Web page are called Java ____.

a.
consoles

b.
windowed applications

c.
applications

d.
applets

1 points

Answers

Answer:

applets

Explanation:

Java applets are dynamic programs that can be embedded on a webpage and run on a web browser like internet explorer,firefox or google chrome. The code for applets is developed using java programming language and facilitates interesting and complex display entities to be included as part of the web page. HTML provides a special tag called <Applet> for providing details of the applet.

Write a program that prompts the user to enter the number of students and each student's name and score, and finally displays the student with the highest score and the student with the second highest score.

Answers

Answer:

  see attachment

Explanation:

You have not specified the language, or the details of the I/O form or prompts. Here is a program that does that, written in Wolfram language (the language of Mathematica).

It prompts separately for student name and student score. The minimum score is presumed to be higher than -99999. If only one student name is entered, the second output is that score with no name listed. There is no error checking.

We have elected to keep a list only of the two two scores, and to sort that list again each time a new entry is made.

__

The attachment shows the output of the program below the program listing.

A database is called "self-describing" because it contains a description of itself.

A.

True

B.

False

Answers

Answer:

true

Explanation:

An objective function in linearprogramming is a(n):

decisionvariable.
environmentvariable.
resultvariable.
independentvariable.
constant.

Answers

Answer: An objective function in linear programming is a decision variable.

Explanation: An objective function is a function which has the target towards the model whether it should be maximized or minimized according to the relation between the  variables present in the function. There are set of variables which are responsible for the controlling of objective function that is known as decision variables.

In a database, data is stored in spreadsheets which have rows and columns.

A.

True

B.

False

Answers

The answer is A. True.
Final answer:

A spreadsheet is a collection of data organized into rows and columns. However, it has limitations compared to relational databases in terms of data organization and accessibility.

Explanation:

A spreadsheet is a collection of data that is organized into rows and columns. Each column represents a field or attribute, while each row represents a record or data instance. While spreadsheets can function as a type of database, they have limitations in terms of data organization and accessibility compared to relational databases which use a tabular structure and allow for easier reorganization and access of data.

. Frequency band in which 99% of the total power resides iscalled _________

a. Power bandwidth

b. half power bandwidth

c. 3dB bandwidth

d. 4dB bandwidth

Answers

Answer:

Frequency band in which 99% of the total power resides iscalled Power bandwidth-a.

what is Interrupt?and give me information about Interruptstypes and processes and works?

Answers

Answer:

Interrupt is defined as, in computer system interrupts are the signal sent to the central processing unit by the external devices. The main function of interrupt is that, an operating system that provide multiprocessing and multitasking. The interrupt is a signal that causes the operating system to stop work on one processor and started work on another processor.

There are basically two type of interrupts:

Hardware interrupts - For the processor, if the signal is from external device and hardware is called hardware interrupts.Software interrupts - The interrupt which is caused by the software instructions are called software interrupt.

What are fields? Instance variables? object? methods?

Answers

Answer:

Explained

Explanation:

Fields: Fields represent data and should be a noun. It should begin with a lower case letter.

Instance variable: it is a variable defined in class but outside the constructor and the method. instance variables are created when an object is instantiated.

Object: An object is the basic unit of object oriented programming language.and represents the real life entities. An object consists of state behavior and properties.

Method: Method in a collection of statements that perform some specific task and return the result to the caller.

.The operation signature has all the following except:
A.name of the operation B.object accepts C.algorithm ituses D.value returned by the operation

Answers

Answer: C) algorithm it uses

Explanation: The operation signature has the name of operation ,objects that it accepts and the value returned by the operation but it does not have algorithm that it uses.As algorithm defines all the steps that are to be used to find the result so signature operation does not include the whole algorithm that is to be used. The signature operation verifies the steps of the algorithm in way.

True / False
Some versions of the Von Neumann model include the stored program concept, but not all of them.

Answers

Answer: True

Explanation:

The Von Neumann model is based on the concept of stored program where both of the program and instruction data are stored in the same electronic memory. Though it is still used in many models but due to the Von Neumann bottleneck we have the introduction of the secondary memory.

Give brief comparison of Broadcast, Unicastand Multicast?

Answers

Answer:

In broadcast the message is transmitted from one to all , in uni cast we have one to one transmission and in multicast we have transmission from one to many.

Explanation:

If we take the example of a simple messaging application it will be clear. If a message is exchanged between one person to another, then it is uni casting. If a person sends a message to all the persons in his contact list then it is broadcasting and  if a person sends messages to select persons in his contact list then it is multi casting. In multi casting management of the group is required regarding who can receive messages which is not required in broadcasting.

Why cli and sti instructions are used during hooking aninterrupt?

Answers

Answer: Cli(Clear interrupt flag ) and sti(set interrupt flag) instructions are used for clearing the flag and setting or enabling a flag respectively while hooking an interrupt.

Explanation: During the action of hooking an interrupt,there are certain interruptions while changing of real time interrupt vector and to avoid those interruptions two instructions are used that is cli ans sli. Cli is present for the clearing or disabling the interrupt flag and sti is used for setting or enabling a interrupt flag.

What is the role of a Chief Information Officier in anorganization?

Answers

Answer and Explanation:

There are several roles of a Chief Information Officer in any organization and these are as follows:

He must fulfill his responsibility as a business leader.He must be able to make executive decisions regarding sales and purchase related matters. He must be able to deal with all the Information Technology related problems.He must be able to recruit the best candidates in the best interest of the organization.He is required to map out the ICT policy(includes procurement, external and internal standards of an organization, future proofing) and ICT strategy.He must be able to write up ICT policy  with detail of its utilization and application.He must possess organizational skills

What is one property of a good hash code?

Answers

Answer:- Major property of a good hash code is that objects which are equal should return the same hash code .

Explanation: Hash codes is a numeric value which  is used for identify a object while a equality testing .Hash code can occupy the value of any length and then returns a fixed length value. The value of hash codes are variable.

If two objects are equal then by the method of equal(object) if the hashcode() function is called on both the objects , they produce the same value.

Other Questions
Soles the differential equations using the substitution u=y; u=yyy=2 WILL GIVE BRAINLIEST!!!!!!Which of the following describes a phenomenon that occurs when we observe plants that wilt? A. The xylem releases all its water. B. The stomata close, cutting off transpiration and gas exchange. C. The roots begin to rot, causing them to no longer uptake water. D. The plant begins absorbing oxygen and releasing carbon dioxide into the atmosphere. The data below shows the temperature of the water in a swimming pool over a two week period. Week 1 Day-------Temperature (F) Monday 58Tuesday 48Wednesday 49 Thursday 61Friday 58Saturday 51 Sunday 39 Week 2 Day--------Temperature (F) Monday 68 Tuesday 74 Wednesday 73 Thursday 75 Friday 70 Saturday 67 Sunday 63 How many degrees greater is the mean temperature in week 2 than in week 1? A: ________ Find the values of x and y1-2i/ 2+i + 4-i/3+2i = x+iy Which of the following was true of Napoleon Bonaparte? He came from an impoverished Sardinian family. He trained as a lawyer before joining the military. He won brilliant victories in Italy in 1796 and 1797. His campaign in Egypt was a great military success.Which of the following was true of Napoleon Bonaparte? He came from an impoverished Sardinian family. He trained as a lawyer before joining the military. He won brilliant victories in Italy in 1796 and 1797. His campaign in Egypt was a great military success. HELPPPPPPP ASAPPPPPMatch each graph with the logarithmic function it represents. The principal randomly selected six students to take an aptitude test. Their scores were: 81.6 72.0 81.1 86.4 70.2 83.1 Determine a 90% confidence interval for the mean score for all students Fraction 3 over 4x = Fraction 1 over 5. x = ___? 3Fraction 3 over 4 Fraction 11 over 20 Fraction 4 over 15 Fraction 3 over 20 How does an enzyme increase the rate of the chemical reaction it catalyzes? Tata Motors assembles cars from their own parts and subassemblies and also controls the mining and fabrication of the materials used to create those parts. When Anand ordered their luxury sedan with the platinum dashboard he knew he wouldn't be taking delivery of his dream car the next week. Rather, he would be waiting a while thanks to: a.a mismatch between supply chain lead time and customer demand. b.a mismatch between overall demand levels and productive capacity. c.a mismatch between demand and the most efficient production volume. d.a mismatch between demand and the most efficient shipment volume. A tennis player tosses a tennis ball straight up and then catches it after 2.00 s at the same height as the point of release. (a) What is the acceleration of the ball while it is in flight? (b) What is the velocity of the ball when it reaches its maximum height? Find (c) the initial velocity of the ball and (d) the maximum height it reaches Select the correct text in the passage.Which two words in this poem symbolize youth?Wild Astersby Sara TeasdaleIn the spring, I asked the daisiesIf his words were true,And the clever, clear-eyed daisiesAlways knewNow the fields are brown and barrenBitter autumn blows,And of all the stupid astersNot one knows A ladder that is 4.6 m long is leaning against a wall at an angle of 66.0 with respect to the ground. If the base of the ladder is moved 0.31 m away from the wall, how far will the top of the ladder go down? When trying to identify the sorted column in a table, you would look for the column where A. an arrow is displayed in the field name. B. data is in alphabetical order. C. only a few records appear. D. data is presented from low to high. Which of the following statements is FALSE? Which of the following statements is FALSE? The difference in melting temperature between a saturated fatty acid and an unsaturated fatty acid with the same chain length is only a few degrees C. Some unsaturated fatty acids are liquid at physiological temperatures. Most types of fat in many animals is used in energy production. The longer the chain length of a saturated fatty acid, the higher the melting temperature. Ellie wants to double her savings of 8000 by investing her money for 16 years.What interest rate doesshe need to look for? Indicate weather each statement is logico or ilogico : (A) Pedro est en la farmacia porque necesita un producto para lavarse la cara (lgico / ilgico)(B) Gabriela est en la farmacia porque quiere comprar un producto de Marisol (lgico / ilgico) (C) Ral est en la farmacia porque necesita un abrigo (lgico / ilgico) Is the following shape a right triangle? How do you know? What is China biggest source of income last week 24,000 fans attended a football match. this week three times as many bought tickets, but one-sixth of them cancelled their tickets. how many are attending this week.A.48,000B.54,000C.60,000D.72,000Please explain, Thank you!