Quiz No. 2.2 Hash Tables

Quiz No. 2.2 Hash Tables

University

12 Qs

quiz-placeholder

Similar activities

Conceptos básicos para blockchain Quiz

Conceptos básicos para blockchain Quiz

University

14 Qs

HashTables

HashTables

University

8 Qs

Cyberecurity Ess 2

Cyberecurity Ess 2

University

12 Qs

TIC2001 Recap for Quiz 2

TIC2001 Recap for Quiz 2

University

10 Qs

JAVA FINAL QUIZ FOR ASSESSMENT

JAVA FINAL QUIZ FOR ASSESSMENT

University

15 Qs

Blockchain Basics: Algorithm and Techniques

Blockchain Basics: Algorithm and Techniques

University - Professional Development

12 Qs

Hashing Search - Data Structures

Hashing Search - Data Structures

University

15 Qs

Chapter 6 (Fundamentals of Cybersecurity

Chapter 6 (Fundamentals of Cybersecurity

University

10 Qs

Quiz No. 2.2 Hash Tables

Quiz No. 2.2 Hash Tables

Assessment

Quiz

Computers

University

Medium

Created by

Mark Anthony Dancalan

Used 6+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In this method of collision resolution technique, all the elements are stored in the hash table itself.

Chaining Method

Open-Addressing Method

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is the simplest approach to resolving the problem of collision in hashing.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a type of open-addressing method?

Linear Probing

Quadratic Probing

Binary Probing

Double Hashing

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a mathematical formula that when applied to a key, produces an integer used as an index to find a key in the hash table.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a data structure that supports one of the efficient searching techniques, that is, hashing.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In this method, a key 'k' is mapped into one of the 'm' slots by taking the remainder of 'k' divided by 'm'.

Mid-Square Method

Quadratic Probing

Division Method

Folding Method

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

In this method of collision resolution technique, a chain of elements is maintained that have the same hash address.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?