Exam 14: Multi-Way Search Trees
Exam 1: Introduction36 Questions
Exam 2: Analysis of Algorithms31 Questions
Exam 3: Introduction to Collections - Stacks49 Questions
Exam 4: Linked Structures - Stacks51 Questions
Exam 5: Queues28 Questions
Exam 6: Lists42 Questions
Exam 7: Iterators32 Questions
Exam 8: Recursion57 Questions
Exam 9: Searching and Sorting54 Questions
Exam 10: Trees47 Questions
Exam 11: Binary Search Trees50 Questions
Exam 12: Heaps and Priority Queues29 Questions
Exam 13: Sets and Maps47 Questions
Exam 14: Multi-Way Search Trees47 Questions
Exam 15: Graphs29 Questions
Exam 16: UML16 Questions
Exam 17: Object-Oriented Design54 Questions
Select questions type
What is the digit analysis method?
Free
(Essay)
4.9/5
(33)
Correct Answer:
In the digit analysis method, the index is formed by extracting, and then manipulating, specific digits from the key.
The ____________ is the maximum percentage occupancy allowed in the hash table before it is resized.
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
A
The division method is not very effective when dealing with an unknown set of key values.
Free
(True/False)
4.8/5
(43)
Correct Answer:
False
In hashing, elements are stored in a hash table, with their location in the table determined by a ______.
(Short Answer)
5.0/5
(38)
The situation where two elements or keys map to the same location in the table is called a collision.
(True/False)
4.8/5
(36)
The _____________ method and the mid-square method may also be effectively used with strings by manipulating the binary representations of the characters in the string.
(Multiple Choice)
4.9/5
(43)
In the shift folding method, the parts of the key are _______ together to create the index.
(Multiple Choice)
4.9/5
(42)
The ______ method for handling collisions looks for another open position in the table other than the one to which the element is originally hashed.
(Short Answer)
4.8/5
(38)
The division method is very effective when dealing with an ______ set of key values.
(Short Answer)
4.7/5
(39)
The length-dependent method and the mid-square method must not be used with strings.
(True/False)
4.7/5
(43)
In hashing, elements are stored in a hash table, with their location in the table determined by a hashing function.
(True/False)
4.9/5
(40)
The situation where two elements or keys map to the same location in the table is called a __________.
(Multiple Choice)
4.9/5
(35)
The open addressing method for handling collisions looks for another open position in the table other than the one to which the element is originally hashed.
(True/False)
4.8/5
(29)
Extraction involves using _________ of the element's value or key to compute the location at which to store the element.
(Multiple Choice)
5.0/5
(29)
The chaining method for handling __________ simply treats the hash table conceptually as a table of collections rather than as a table of individual cells.
(Multiple Choice)
4.8/5
(38)
In hashing, elements are stored in a hash table, with their _________ in the table determined by a hashing function.
(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 47
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)