Hashing

Hashing

University

20 Qs

quiz-placeholder

Similar activities

Understanding Rabin Karp Algorithm

Understanding Rabin Karp Algorithm

University

20 Qs

PWEB XII RPL

PWEB XII RPL

University

15 Qs

Transport Layer Security

Transport Layer Security

University

20 Qs

Câu hỏi về phương pháp truy cập

Câu hỏi về phương pháp truy cập

University

20 Qs

004_Non-repudiation - CompTIA Security+ SY0-701 - 1.2

004_Non-repudiation - CompTIA Security+ SY0-701 - 1.2

12th Grade - University

19 Qs

Block Chain  & Cloud Computing

Block Chain & Cloud Computing

University

25 Qs

DSA SE B

DSA SE B

University

20 Qs

Week1 A.D.A

Week1 A.D.A

University

15 Qs

Hashing

Hashing

Assessment

Quiz

Computers

University

Hard

Created by

Surabhi Gosavi

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A hash function f defined as f(key) = key mod 7, with linear probing insert the keys 37, 38, 72, 48, 98, 11, 56,  into a table indexed from 0, in which location the key 11 will be stored (Count table index 0 as 0th location)?

3

4

5

6

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which collision resolution technique involves placing collided elements in the next available empty slot in the hash table? 

  1. Linear probing

  1. Quadratic probing 

  1. Separate chaining

  1. Double hashing 

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In hashing, collision results when _______.

  1. an attempt is made to insert a record at full primary bucket.

  1. an attempt is made to insert a record anywhere in primary bucket.

  1. an attempt is made to insert a record at empty primary bucket.

  1. an attempt is made to delete a record at full primary bucket.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In hashing, collision resolution is carried out by close addressing. Which of the following is close addressing technique –

I. Double hashing

II. Separate Chaining

Only I

Only II

Both I and II

None

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a hash table?



A structure that maps values to keys

A structure that maps keys to values

A structure used for storage

A structure used to implement stack and queue

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

If several elements are competing for the same bucket in the hash table, what is it called?

Diffusion

Replication

Collision

Duplicate

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a hash function?

A function has allocated memory to keys

A function that computes the location of the key in the array

A function that computes the location of the values in the stack

A function that creates an array

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?