CSD201 Unit 10 Questions and Answers
CSD201 Unit 10 Questions and Answers AC - Correct Answer️️ -(Choice 2) Which of the following statement about Open Addressing are false: A. In linear probing of the open addressing method, the position in which key can be stored is found by sequentially searching starting from the begin of table. B. Linear probing has a tendency to create clusters in the table. C. Using quadratic probing gives much better results than linear probing and avoids the problem of cluster buildup. D. For quadratic probing, the size of table should not be an even number AD - Correct Answer️️ -(Choice 2) Which of the following statement are true: A. Coalesced hashing combines linear probing with chaning. B. In chaining, searches always fast if using linked lists. C. Self-organizing linked lists can be used to improve performance in chaining. D. Linked list can be used in Bucket Addressing. AC - Correct Answer️️ -(Choice 2) Which of the following statement about Perfect Hash Functions are true: A. Cichelli's method is used to hash relatively small number of reserved words. B. The searching process in Cichelli's algorithm is linear. C. Cichelli's method uses an exhaustive search. D. Cichelli's algorithm guarantees that a perfect hash function can be found. CD - Correct Answer️️ -(Choice 2) Select correct statements : A. Extendible hashing is directoryless technique. B. Linear hashing is directory technique. C. The characteristic feature of extendible hashing is the organization of the index, which is expandable table. D. A reorganization of the file is avoided by using extendible hashing if the directory overflows. E. Extendible hashing is faster than and requires less space than Linear hashing A - Correct Answer️️ -Hash function is function that can transform a particular key (K) (a string, number or record) into an index in the table used for storing items of the same type as K. A. True B. False A - Correct Answer️️ -Which of the following statement is true: A. If hash function transforms different keys into different numbers, it is called a perfect hash function. B. To create a hash function, the table has to contain at least the same number of positions as the number of elements being hashed. C. All of the others. D. None of the others AD - Correct Answer️️ -(Choice 2) Select correct statements: A. In shift folding method, the key is usually divided into even parts of some fixed size plus some remainder and added. B. In boundary folding method, the key is usually divided into even parts
Written for
- Institution
- CSD 201
- Course
- CSD 201
Document information
- Uploaded on
- June 16, 2024
- Number of pages
- 12
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
csd201 unit 10 questions and answers
Document also available in package deal