Answer: B)Available positions
Explanation:Open addressing is the addressing method for the components that are present in the hash table. collision are controlled and managed by this process. The total count of keys is less or equal to the size of table.
Linear probing is the mechanism that helps in controlling of the collision happening by the process of key collection maintenance by encoding of the available positions of the element in the hash table.So,the correct option is option(B).
and (2, 2, 3, 5, 5, 7), the output should be (2, 5, 5).
Answer:
while list1 not empty AND list2 not empty {
if elements at leftmost positions are equal {
pop element from list1
pop element from list2
add element to result_list
} else {
pop lowest value from list1 or list2
}
}
Answer:discrimination
Explanation:
a)To document an antivirus pattern that continues to be sent to your mailbox
b)To insert as a Signature for all outgoing emails
c) To save your emails so that you can restore your mailbox if necessary
d)To create a file that deleted emails will be sent to for deletion
The purpose of creating a PST file is to
c) To save your emails so that you can restore your mailbox if necessary
Explanation:
Answer:
import java.util.Arrays;
public class sort{
public static void main(String []args){
int[] arr = {2,6,9,1,5,3};
int n = arr.length;
Arrays.sort(arr);
for(int i=0;i<n;i++){
System.out.println(arr[i]);
}
}
}
Explanation:
first import the library Arrays for using inbuilt functions.
create the main function and define the array with elements.
then, use the inbuilt sort function in java which sort the array in ascending order.
syntax:
Arrays.sort(array_name);
then, use for loop for printing the each sorting element on the screen.
Answer:
C) X=40.24 Y=24.33 Z=20.75
Explanation:
Answer:
Well, I am studying software engineering and ethical hacking, with the terms I mentioned it is very self explanatory how I use computers for those fields. In case it is still not self explanatory, we use computers to make software and websites accessing tools that can only be access using a computer and a working internet connection is required. Ethical hacking requires a computer to test the website or application security in order to do that we need a active internet connection in order to access the website itself.
Explanation:
i dont really know i am not really sure what i qill be in the future