What is a hash function? A. A function that computes the location of the values in the array B. A function has allocated memory to keysC. A function that create an arrayD. None of these

Answers

Answer 1

Answer:

A hash function is a function which when given a key, generates an address in the table. The example of a hash function is a book call number. Each book in the library has a unique call number. ... The later is always possible only if you know (or approximate) the number of objects to be proccessed.

Explanation:

A

Answer 2
A hash function is a function that computes the location of the values in the array which means it would be A.

Related Questions

Which command provides the source reference on the last page of a document?

A.Citation
B.Endnote
C.Footnote
D.Reference

PLS help

Answers

Answer:

C. Footnote

Explanation:

Which option correctly describes a DDMS application?
OA. Software used to organize files and folders
OB.Software used to develop specialized images
OC.Software used to create effective presentations
OD. Software used to manage sets of information

Answers

OD. Software used to manage sets of information.

What is the output?
numB = 25
while numB > 13:
numB = numB - 5
print(numB)
Output:

Answers

Answer:

The answer is 10

Explanation:

i got it right on the assignment

Answer: 10

Explanation: got it right on edgen

Reports produced by the United Nations are considered
O relevant sources, -A
O irrelevant sources. -B
O biased sources. -C
O disputed sources. -D

Answers

Answer:

The correct answer is Option A: "Relevant Sources"

Explanation:

Relevant sources are the reports and information regarding a specific field, profession or an area of study. The reports generated by United Nations are usually related to a specific subject or area of study i.e. report on security etc.

Hence,

The correct answer is Option A: "Relevant Sources"

Answer: relevant sources

Explanation:

Suppose we have a 4096 byte byte-addressable memory that is 32-way high-order interleaved, what is the size of the memory address module offset field?

a. 10

b. 7

c. 5

d. 4

Answers

Answer:

7

Explanation:

Given that :

Byte-addressable memory = 4096

Order = 32

Rwqritying such that they have the same base ;

4096 = 2^12

32 = 2^5

2^12 - 2^5

12 - 5 = 7

Write code to complete RaiseToPower(). Sample output if userBase is 4 and userExponent is 2 is shown below. Note: This example is for practicing recursion; a non-recursive function, or using the built-in function pow(), would be more common.
4^2 = 16
#include
int RaiseToPower(int baseVal, int exponentVal){
int resultVal = 0;
if (exponentVal == 0) {
resultVal = 1;
}
else {
resultVal = baseVal * /* Your solution goes here */;
}
return resultVal;
}
int main(void) {
int userBase = 0;
int userExponent = 0;
userBase = 4;
userExponent = 2;
printf("%d^%d = %d\n", userBase, userExponent, RaiseToPower(userBase, userExponent));
return 0;
}

Answers

Answer:

Replace /* Your solution goes here */ with

RaiseToPower(baseVal, exponentVal-1);

Explanation:

From the question, we understand that the program uses recursion.

The essence of recursion is to call a function from the function itself.

This is done by RaiseToPower(baseVal, exponentVal-1);

Because it passed the baseVal and the exponentVal reduced by 1 to the RaiseToPower function.

This is repeated until exponentVal = 1.

However, I've added the full program as an attachment where I used comments to explain some lines.

In this exercise we have to use the knowledge of computational language in C++ to write the code.

This code can be found in the attached image.

To make it simpler the code is described as:

#include<iostream>

#include<stdio.h>

int RaiseToPower(int baseVal, int exponentVal){

int resultVal = 0;

if (exponentVal == 0) {

resultVal = 1;

}

else {

resultVal = baseVal * RaiseToPower(baseVal, exponentVal-1);

}

return resultVal;

}

int main(void) {

int userBase = 0;

int userExponent = 0;

userBase = 4;

userExponent = 2;

printf("%d^%d = %d\n", userBase, userExponent, RaiseToPower(userBase, userExponent));

return 0;

}

See more about C code at brainly.com/question/19705654

how can e-group help in collaborating online​

Answers

Answer:

Collaborative learning is an e-learning approach where students are able to socially interact with other students, as well as instructors. ... Collaborative learning is based upon the principle that students can enrich their learning experiences by interacting with others and benefiting from one another's strengths.

Explanation:

inclusion of collaborative activities in an online course leads to positive student performance outcomes. Collaborative group interactions facilitate active learning, shared knowledge, and promote social interaction and a supportive eLearning community

To answer the research question "how I'm I going to find the information I need on the topic?" The best thing Georgia should do first is

Answers

Answer:

it is currently c

Explanation:

because i got it right on a quiz trust me!

Do you think the divide will fade in time. Write your opinion.

Answers

Hello. Your question is incomplete and without context, which makes it impossible for it to be satisfactory and satisfactory. However, I will try to help you in the best possible way.

For you to have an opinion on whether the division may disappear over time, you must analyze the composition of that division and how it was created, based on this analysis, you can reflect on whether the composition of the division in the environment in which it is located is likely to be temporary, or if it is impossible to determine the period of time for which it will remain active.

Do you think the divide will fade in time? Write your opinion

Answers

Answer:

The answer is "true".

Explanation:

When ICTs are becoming more daunting and easier, that violation may eventually subside. However many people have reasons to believe that even in fact the racial literacy will persist, and even grow.  

It is constantly shrinking by 5% every year in terms of raw figures, and increasing estimates show that just by 2028 100% of the world's population will have access to the internet.

features present in most DUIs include _________________?​

Answers

Answer:

"Common features provided by most GUIs include: -icons; ... The icons displayed on most desktops represent resources stored on the computer—files, folders, application software, and printers. Another icon commonly found on the desktop is a place to discard items."

Explanation:

plz mark braniliest i answered first

Help quickly!!

Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses.

Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.

Decide on a list of items the program will ask the user to input.
Your program should include at least four interactive prompts.
Input from the user should be assigned to variables and used in the story.
Use concatenation to join strings together in the story.
Print the story for the user to read.


Write your pseudocode here:











Part 2: Code the Program
Use the following guidelines to code your program.

Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Conclude the program with the main() statement.
Include at least two print statements and two variables.
Include at least four input prompts.
Use concatenation to join strings.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.

please help me I don't know what code to type in.

Answers

def main():

   name = input("Enter your name: ")

   age = input("Enter your age: ")

   color = input("Enter you favorite color: ")

   birth = input("Enter your birthday: ")

   print(name + " is "+age+" year(s) old.")

   print(name + "'s favorite color is "+color)

   print(name + " was born on "+ birth)

main()

I hope this helps! The code runs perfectly fine for me.

In this exercise we want to write a pseudocode, so this way we will find how:

the code is in the attached image

What is pseudocode?

Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.

To make it simpler to copy the code is below as:

def main():

  name = input("Enter your name: ")

  age = input("Enter your age: ")

  color = input("Enter you favorite color: ")

  birth = input("Enter your birthday: ")

  print(name + " is "+age+" year(s) old.")

  print(name + "'s favorite color is "+color)

  print(name + " was born on "+ birth)

main()

See more about pseudocode at brainly.com/question/13208346

HOW TO BE A EXPRET PLAYING AMONG US

Answers

Answer:

Just keep playing

Explanation:

That’s so how

Answer:

If inposter look afk and they will think you are afk and vote everyone else out

(;

Kristen wants to view the records of her database in ascending order. What should she do?
OA. Index the report
OB. Create a table
OC. Sort the table
OD. Create a report

Answers

the answer is Sort the table

The answer is OC. Sort the table

A job placement agency helps match job seekers with potential employers. The agency
would like to design a simulation in order to help predict the likely job placement
outcomes for job seekers based on historical trends and patterns. Which of the following
is most likely to be a benefit of the simulation?

Answers

Answer:

The answer is "Option C".

Explanation:

Please find the complete question in the attached file.

The model presented above is an AI design. The specific variable within each AI model becomes reduced. There is also no AI model showing 100% reliability, or just not as reliable as just a man in certain situations. That is why the option C opposes this fact explicitly, and that model is least likely to benefit.

How many RTTs does it take until the sender's congestion window reaches 2M bytes? Recall that the congestion window is initialized to the size of a single segment, and assume that the slow-start threshold is initialized to a value higher than the receiver’s advertised window.

Answers

The question is incomplete, Below is the complete question.

Suppose that you are using an extended version of TCP that allows window sizes much larger than 64K bytes.1 Suppose you are using it over a 1Gbps link with a round-trip time (RTT) of 200ms to transfer 16M-byte file, and the TCP receiver's advertised window is 2M bytes. If TCP sends 1K-byte segments, and assuming no congestion and no lost segments:

(a) How many RTTs does it take until the sender's congestion window reaches 2M bytes? Recall that the congestion window is initialized to the size of a single segment, and assume that the slow-start threshold is initialized to a value higher than the receiver’s advertised window.

(b) How many RTTs does it take to send the file?

(c) If the time to send the file is given by the number of required RTTs times the RTT value, what is the effective throughput for the transfer? What percentage of the link capacity is utilized?

Answer/Explanation:

(A)

When;

RTT0 = 1KB

RTT2 = 4KB

RTT1 = 2 KB

RTT3 = 8KB

RTTn = 2nKB.......

We need n = 11 to have 2 MB = 211.

With that, the window size will become 2MB after 11 RTTs.

(B)

By the 11th RTT 2MB have been transmitted and the window is 2MB, then, by the end of the 12th RTT,2MB have been transmitted and the window is now 2MB. Similarly during the next 3 RTTs, another 2MB will be transmitted, 4MB and another 2MB, thus 15 RTTs is needed to transmit the entire file.

c) Effective throughput for the transfer is the file size over the needed time i.e,

= 8 * 16Mb / (15 * 200 * 10-3)

which is;

= 144 / 3000 * 10-3

Then;

= 144 * 103 / 3000

And;

= 48 Mbps(Megabit per second)

Bandwidth Utilization = effective throughput / Available link speed

= 48 / 1024

= 0.0468

= 4.68 %

MB = MegaBytes

while

Mb = Megabits

which of the following reflects the order of operations

Answers

Answer: PEMDAS

Parenthesis, Exponents, Multiplication, Division, Addition, Subtraction

Explanation:

pemdas .. parentheses , exponents , multiply , divide , add , subtract.. DO THAT IN ORDER

in what domain electrica energy is the most use

Answers

Answer:the main signal bearing entities are voltage and their current in circuit environments.

Explanation:

How do you get a potion of fire-protection in the overworld because I am having a hard time in the Nether? I will give away 14 points and mark you as brainliest.

Answers

Answer:

It's physically impossible. You'd have to go to the nether and kill one of the nether slimes.

Explanation:

Or you can just cheat, give yourself creative and give yourself a fire res potion. Plus, you can't brew anything without a brewing stand or nether wart.

Answer:

Get a trident from a drowned and enchant it with Channeling and strike a villager with it. Contain the witch and burn it using flint&steel. It will try to drink the potion, but kill it as fast as you can. There now you can go through the Nether portal without having to worry about lava.

Explanation:

3. Which of the following components would not normally be found on an industry standard
motherboard?
A. Keyboard controller
B. CPU
C. Video controller
D. Modem​

Answers

Answer:

B.

Explanation:

because it is computer science unit(CPU) is the portion of a computer that retrieves and executes instructions.

the celestial sphere is divided into
1. 88 different areas that identify, name, and plot the celestial objects.
2. 44 different areas that identify, name, and plot the celestial objects.
3. 22 different areas that identify, name, and plot the celestial objects.
4. constellations, such as Orion, Rigel, and Sirius

Answers

Answer:

A.

Explanation:

The answer is 1. or A.

please tell fast plzzzzzzzz​

Answers

Answer:

window.............

Answer:

Window

Explanation:

Im not sure if this is correct, but I'm pretty sure

Viruses and worms can affect a system by:
A. Deleting hard drives
B. Slowing down the system
C. Improving system functions
D. Productive fake applications

Answers

Answer:

A

Explanation:

Worms can modify and delete files, and they can even inject additional malicious software onto a computer. Sometimes a computer worm's purpose is only to make copies of itself over and over — depleting system resources, such as hard drive space or bandwidth, by overloading a shared network

A is the correct answer boss

by what other name can the folders in Windows 7 be called?

Answers

I think document folder

The other name for the folders in Windows 7 be called as Directories.

What is Windows 7?

The Windows 7 operating system (OS) was made available for purchase in October 2009 to replace Windows Vista. Windows 7 was created as an update to the Windows Vista operating system and is based on the Vista kernel. It makes use of Windows Vista's original Aero user interface (UI).

The folder of the Windows 7 is also called as files, other folders, directory etc.

Additionally, folders enable you to have several files with the same name. The person might have a file named Resume.doc in your My Documents folder and a different file named Resume.doc in a folder called Resume templates, for example. Every file would require a distinct file name if they were all in one location.

Therefore, it can be concluded that The other name for the folders in Windows 7 be called as Directories.

Learn more about Windows 7 here:

https://brainly.com/question/1285757

#SPJ2

Write a function writel that will write the length of a side of a square. If only one argument is passed to the function, it is the length, and the output will go to the Command Window. If two arguments are passed, however, the first argument will be the length and the second argument will be the file identifier for an output file to which the length should be printed.

Answers

def writel(length, file_name = ""):

   if file_name!="":

       f = open(file_name, "w")

       f.write(str(length))

       f.close()

   else:

       print(str(length))

writel(3, "FileName.txt")

I hope this helps!

Remember, you must have the file created prior to running this program. Best of luck.

Answer: Answer to this question for MatLab

Explanation:

function out = write1(length,varargin)

if nargin == 1

   disp(length)

end

if nargin == 2

   fid = fopen(varargin{1},'w');

   fprintf(fid,'%d',length) %

   fclose(fid);

end

end

%varargin{1} needs to be the name of a file you already created

What is the size of an iPad Air 2 when rotated

Answers

size of ipad air 2 is 360degree

I believe it’s 360 like the person above me said

What are two options available for highlighting changes in the Highlight Changes dialog box?
A) for a specific website or by a specific user
B) by a specific user or in a specific file format
C) in a specific file format or for a specific website
D) within a specific time period or by a specific user

Answers

Answer: D

Within a specific time period or by a specific user

Explanation:

Answer:

D)

Explanation:

within a specific time period or by a specific user

What is output? Select all that apply.
C = 0
while (c 10):
C = c + 5
print (c)

Answers

Answer:

The answer is:

5

10

Explanation:

In the while loop, we specify, if C is not equal to 10, C += 5 and print(c). When python reads the loop, python will check to see if C is equal to 10 and if not it will add 5 until C is more than or equal to 10. In addition, python will print(c) to the console until it hits 10. Once C is less than or equal to 10 the loop will stop. In this scenario, since we print c in the loop, the codes output will be the following:

5

10

hope this helps :D

The file includes 4993 tweets including the keyword 'election'. Each tweet is represented in a separate line. Write a program to open the file and read through its lines, then only if a tweet includes a hashtag (a term beginning by the

Answers

Answer:

import re

with open("../../Downloads/Tweets.txt","r", encoding="utf-8") as tweets:

   myfile = tweets.readlines()

   for item in myfile:

       item = item.rstrip()

       mylist = re.findall("^RT (.*) ", item)

       if len(mylist) !=0:

           for line in mylist:

               if line.count("#") >=1:

                   ln = line.split("#")

                   dm = ln[1]

                   print(f"#{dm}")

Explanation:

The python source code filters the document file "Tweets" to return all tweets with a hashtag flag, discarding the rest.

Write a program that prompts the user to enter a date, using integer values for the month, day, and year, and then prints out the day of the week that fell on that date. According to the Gregorian Calendar, January 1, 1601 was a Monday. Observe all leap years (and keep in mind that 1700, 1800, and 1900 were not leap years).

Answers

Answer:

import datetime

user = input("Enter date in yyyy,m,d: ").split(",")

int_date = tuple([int(x) for x in user])

year, month, day =int_date

mydate = datetime.datetime(year, month, day)

print(mydate)

x = mydate.strftime("%B %d, %Y was a %A")

print(x)

Explanation:

The datetime python module is used to create date and time objects which makes it easy working with date-time values. The user input is converted to a tuple of integer items, then they are converted to date time objects and parsed to string with the strftime method.

Other Questions
Express as an integer. A gain of 56 points in a game. What are the advantages and disadvantages of robots? I am writing to respond to a problem I am becoming increasingly aware of. I cannot help but notice the growing lack of motivation among many of my fellow students. Being one of a few who bothers to try for (and achieve) A's in my classes, I am sometimes regarded as an outsider.My message to these students is this (and you know who you are): grow up. You are being provided with a free education and you are lucky to get it. Since you are not taking advantage of this, you don't really deserve it. Your parents, your friends' parents and your neighbors all have to dish out hard-earned money to your town government, which in turn has to struggle to find a way to pay for your education, along with all of the other needs of the town. Still, you abuse the system by flunking your exams, not doing your homework, and subjecting your teacher to both verbal abuse and the difficult task of putting up with you.You obviously aren't going to achieve anything with your life when you graduate, considering that few colleges accept students with grade point averages of zero, so you might as well stop acting like a lazy slob and begin to work at being something. You are being provided with the tools for success but you aren't using them.It is possible to get A's on your report card and have fun too. Some of us actually survive the day without once threatening a teacher. There are students with some disabilities who manage good marks, but this is possible only because they try. You are obviously in a more advantageous situation than these students, so why is it you're not doing the same?It takes just as much effort to hide that report card from your parents as it does to open up your textbook and read the script within. It's better to worry about how you can improve your test scores than to have to worry about how you can alter them to make it appear as though you passed.There are many children throughout the world who would jump at the chance to receive an education, yet you, the underachiever, go to school at absolutely no personal expense every day. Not everyone can become the next NBA super star, the rest of us have to work at getting anywhere in life. Stop wasting the town's tax dollars by lounging around all day, and start improving your attitude and workmanship before it's too late. Diamond used a number line to add. She started counting at 8, and then she counted until she was on -5 on the number line. If Diamond is modeling addition, what number did she add to 8 in order to get to -5 Someone please help Ik in desperate need pls pls help asap pls can u even txt ppl privatly on here ? It has been suggested that the Dinomatron shortage was a conspiracyto drive up prices, but I disagree. First of all, no one could havepredicted the immense popularity of this toy. Just last year, a verysimilar dinosaur-building kit was ignored by shoppers. Second, severewinter weather all along the East Coast led to shipping delays,contributing to the shortage. Could someone have conspired to createbad weather? I don't think so. The Dinomatron price increase was thenatural result of supply and demand economics. During the busyholiday shopping season, weather prevented toy stores from receivingenough toys to fill demand. Therefore, they became more valuable.How would the author best respond to counterclaim that Dinomatron ismade by the same company that created a holiday toy shortage the previousyear?A. By pointing out the lack of severe weather during the previousyear's holiday seasonB. By suggesting that this company simply releases great toys thateveryone wantsC. By explaining how the Dinomatron toy is different from last year'spopular toyD. By including a quote from someone who was unable to purchase aDinomatron toyanswer quick for 16 points no joke or I will report 6. Find the sum or difference.(6g - 3) - (4g + 5) how do i send messages??? and read??? What is the difference between a meteor and a meteorite? Yo _____la ropa en el centro comercial.C. est comprandoA. estamos comprandoB. ests comprandoD. estoy comprando Which of the following verbs should you use to say that you remember something?A. DevenirB. Revenir C. ConvenirD. Se souvenir The goal of a statement of purpose is: ( A. To test a hypothesis), (B. To explain why an experiment is being done.), ( C. To make accurate measurements.), (D. To record observations during an experiment.) We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty, and the pursuit of Happiness. That to secure these rights, Governments are instituted among Men, deriving their powers from the consent of the governed. That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or abolish it and to institute new Government.Declaration of IndependenceAccording to the passage, what are important unalienable rights? 2.02034 : 2.02033 = 2.020 Will give Brainly. Look at picture!!! James rolls a number cube, with sides labeled 1 through 6, two times. What is the probability James will roll an even number the first roll, and roll a number greater than 4 the second roll? What is the answer to 12-2u=9u+45 Given mlln, find the value of X.