Deck 14: Multi-Way Search Trees
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/47
Play
Full screen (f)
Deck 14: Multi-Way Search Trees
1
In hashing, elements are stored in a hash table, with their _________ in the table determined by a hashing function.
A) Order
B) Location
C) Precedence
D) None of the above
A) Order
B) Location
C) Precedence
D) None of the above
Location
2
The situation where two elements or keys map to the same location in the table is called a __________.
A) Collision
B) Tie
C) Chaining
D) None of the above
A) Collision
B) Tie
C) Chaining
D) None of the above
Collision
3
A hashing function that maps each element to a unique position in the table is said to be a _________ hashing function.
A) Good
B) Practical
C) Perfect
D) None of the above
A) Good
B) Practical
C) Perfect
D) None of the above
Perfect
4
Extraction involves using _________ of the element's value or key to compute the location at which to store the element.
A) All
B) Only a part
C) None
D) None of the above
A) All
B) Only a part
C) None
D) None of the above
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
5
The __________ method is very effective when dealing with an unknown set of key values.
A) Division
B) Extraction
C) Shift Folding
D) Length Dependent
A) Division
B) Extraction
C) Shift Folding
D) Length Dependent
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
6
In the shift folding method, the parts of the key are _______ together to create the index.
A) Added
B) Subtracted
C) Multiplied
D) None of the above
A) Added
B) Subtracted
C) Multiplied
D) None of the above
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
7
The _____________ method and the mid-square method may also be effectively used with strings by manipulating the binary representations of the characters in the string.
A) Division
B) Extraction
C) Shift Folding
D) Length Dependent
A) Division
B) Extraction
C) Shift Folding
D) Length Dependent
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
8
The chaining method for handling __________ simply treats the hash table conceptually as a table of collections rather than as a table of individual cells.
A) Division
B) Extraction
C) Collisions
D) Chaining
A) Division
B) Extraction
C) Collisions
D) Chaining
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
9
The open addressing method for handling collisions looks for another open position in the table other than the one to which the element is originally hashed.
A) Chained
B) Hashed
C) Extracted
D) Added
A) Chained
B) Hashed
C) Extracted
D) Added
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
10
The ____________ is the maximum percentage occupancy allowed in the hash table before it is resized.
A) Load Factor
B) Hashing Factor
C) Thrashing Limit
D) None of the above
A) Load Factor
B) Hashing Factor
C) Thrashing Limit
D) None of the above
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
11
In hashing, elements are stored in a hash table, with their location in the table determined by a ______.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
12
The situation where two elements or keys map to the same location in the table is called a ______.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
13
A hashing function that maps each element to a ______ in the table is said to be a perfect hashing function.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
14
______ involves using only a part of the element's value or key to compute the location at which to store the element.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
15
The division method is very effective when dealing with an ______ set of key values.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
16
In the ______ method, the parts of the key are added together to create the index.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
17
The ______ method for handling collisions simply treats the hash table conceptually as a table of collections rather than as a table of individual cells.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
18
The ______ method for handling collisions looks for another open position in the table other than the one to which the element is originally hashed.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
19
The load factor is the ______ percentage occupancy allowed in the hash table before it is resized.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
20
In hashing, elements are stored in a hash table, with their location in the table determined by a hashing function.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
21
The situation where two elements or keys map to the same location in the table is called a collision.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
22
A hashing function that maps each element to a unique position in the table is said to be an ideal hashing function.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
23
Extraction involves using only a part of the element's value or key to compute the location at which to store the element.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
24
The division method is not very effective when dealing with an unknown set of key values.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
25
In the shift folding method, the parts of the key are added together to create the index.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
26
The length-dependent method and the mid-square method must not be used with strings.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
27
Java provides a hashcode method for all objects.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
28
The chaining method for handling collisions simply treats the hash table conceptually as a table of individual cells rather than as a table of collections.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
29
The open addressing method for handling collisions looks for another open position in the table other than the one to which the element is originally hashed.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
30
The load factor is the minimum percentage occupancy allowed in the hash table before it is resized.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
31
What is the difference between a hash table and the other collections we have discussed?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
32
What is a collision in a hash table?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
33
What is our goal for a hashing function?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
34
What is the consequence of not having a good hashing function?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
35
What is the extraction method?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
36
What is the division method?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
37
What is the shift folding method?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
38
What is the boundary folding method?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
39
What is the mid-square method?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
40
What is the radix transformation method?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
41
What is the digit analysis method?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
42
What is the length-dependent method?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
43
What is chaining?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
44
What is open addressing?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
45
What are linear probing, quadratic probing, and double hashing?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
46
Why is deletion from an open addressing implementation a problem?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
47
What is the load factor and how does it affect table size?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck