Exam 9: Searching and Hashing Algorithms

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

When we check the array locations t, (t + 1) % HTSize, (t + 2) % HTSize, . . ., (t + j) % HTSize it is called the ____ of the hash table.

(Multiple Choice)
5.0/5
(34)

The keys of the items in a data set are used in such operations as searching, sorting, insertion, and deletion.

(True/False)
4.8/5
(40)

In ____, we assume that the array is circular so that if the lower portion of the array is full, we can continue the search in the top portion of the array.

(Multiple Choice)
4.9/5
(45)

Sequential and binary search algorithms are called ____ search algorithms.

(Multiple Choice)
4.9/5
(34)

All insertions and searches in the random probing method use a different sequence of random numbers.

(True/False)
4.8/5
(33)

The search item is called the ____.

(Multiple Choice)
4.8/5
(41)

If the sequential search is unsuccessful, -1 is returned.

(True/False)
4.8/5
(40)

A list is ordered if its elements are ordered according to some criteria.

(True/False)
5.0/5
(39)

The analysis of algorithms enables programmers to decide which algorithm to use for a specific application.

(True/False)
4.8/5
(34)
Showing 41 - 49 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)