Engineering
Engineering, 08.06.2021 07:30, gstinson98

Q.1. (10) We have to implement a hash table by initialize a character array of length 15 to store the keys in
it. Show the contents of array when the keys are “characters of your full name” inserted into an
empty hash table with double hashing to resolve collision in it. Take initial 10 letters of your name.
If you have letters less than 10 add X at the end. Use h (k) = k mod 26 and h’ (k) = k mod 10 as
the hash function for the kth letter of the alphabet. (Note: A = 1st letter of alphabet, B= 2nd letter
of alphabet ……. Z = 26th letter of the alphabet).
For e. g. name is “DUR E SHAWAR AGHA”
Keys = D U R E S H A W A R (initial 10 letters)
Keys = 4 21 18 5 19 8 1 23 1 18
Screenshots also required of output

answer
Answers: 2

Other questions on the subject: Engineering

image
Engineering, 04.07.2019 18:10, lerasteidl
Determine whether or not it is possible to compress air adiabatically from k to 140 kpa and 400 k. what is the entropy change during this process?
Answers: 3
image
Engineering, 04.07.2019 18:10, salazjlove
Which of the following refers to refers to how well the control system responds to sudden changes in the system. a)-transient regulation b)- distributed regulation c)-constant regulation d)-steady-state regulation
Answers: 1
image
Engineering, 04.07.2019 18:20, karatsgrande3772
Determine the damped natural frequencies and the steady state response of a decoupled damped forced two degrees of freedom system. 10ä1 + 2q1 20q1 10 cos t; 10q2 +4q2 + 40q2 10 cos t
Answers: 3
image
Engineering, 04.07.2019 19:10, rayne40
A)-in the process of engineering design, explain the contribution of material selection. b)- explain the procedure of synthesis as is employed in engineering design. c)- is there any relationship between ergonomics and engineering design? explain. d)- safety consideration in engineering design includes human, product and the enviroment . explain how safety will be incorporated into the design?
Answers: 3
Do you know the correct answer?
Q.1. (10) We have to implement a hash table by initialize a character array of length 15 to store t...

Questions in other subjects: