Question

Suppose that the keys A through G, with the hash values given below, are inserted in...

Suppose that the keys A through G, with the hash values given below, are inserted in some order into an initially empty table of size 7 using a linear-probing table (with no resizing for this problem).

key: A B C D E F G

hash:2 0 0 4 4 4 2

Which of the following could not possibly result from inserting these keys?

a. EFGACBD

b. CEBGFDA

c. BDFACEG

d. CGBADEF

e. FGBDACE

f. GECADBF

Give the minimum and the maximum number of probes that could be required to build a table of size 7 with these keys, and an insertion order that justifies your answer.

Homework Answers

Answer #1

non of the choices are possible.

a) E F G A C B D (4 4 2 2 0 0 4) .
possible insertion order : G,A

other elements are unable to insert

b) C E B G F D A (0 4 0 2 4 4 2) .
possible insertion order : C, F, D

other elements are unable to insert

c) B D F A C E G (0 4 4 2 0 4 2) .
possible insertion order : B

other elements are unable to insert

d) C G B A D E F (0 2 0 2 4 4 4) .
possible insertion order : C, D, E, F

other elements are unable to insert

e) F G B D A C E (4 2 0 4 2 0 4) .
possible insertion order : null

no possible insertion

f) G E C A D B F (2 4 0 2 4 0 4) .
possible insertion order : D

other elements are unable to insert

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Data structure and Algorithm A hash table of length 10 using open addressing with hash function...
Data structure and Algorithm A hash table of length 10 using open addressing with hash function h(k) = k mod 10, and linear probing has been created. 0 1 2 32 3 73 4 12 5 15 6 82 7 37 8 65 9 9 Now the item 12 needs to be deleted using “Deletion with repair’. What is the resultant hash table? A) 0 1 2 32 3 73 4 15 5 82 6 37 7 65 8 9...
1.Consider a hard drive with an average seek time of 9 ms. Its disk spins at...
1.Consider a hard drive with an average seek time of 9 ms. Its disk spins at 7200 rpm. What’s the average access time? In your answer, ignore the drive transfer time and any controller overhead. 2.Suppose that we are using extendable hashing on a file that contains records with the following search-key values: (2, 3, 5, 7, 11, 17, 19, 23, 29, 31). Show the final extendable hash structure for this file if the hash function is h(x) = x...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
1.Ford initially tried to use vertical integration to control all aspects of the production and sale...
1.Ford initially tried to use vertical integration to control all aspects of the production and sale of its automobiles. Later, Ford abandoned vertical integration and adopted a strategy of partnerships with key suppliers. The partnership arrangements were expected to cut costs for Ford but still permit the suppliers to enjoy profits at the level of the industry standard. How would it be possible for a supplier’s profits to be preserved while Ford’s costs decreased? Select one: a. Ford would agree...
Item 1 In the case below, the original source material is given along with a sample...
Item 1 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version In contrast to the transmittal model illustrated by the classroom lecture-note taking scenario, the constructivist model places students at the center of the process--actively participating in thinking and discussing ideas while making meaning for themselves. And the professor, instead of being the "sage on the...
Item 1 In the case below, the original source material is given along with a sample...
Item 1 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version There is a desperate need for theorists and researchers to generate and refine a new breed of learning-focused instructional design theoriesthat help educators and trainers to meet those needs, (i.e., that focus on learning and that foster development of initiative, teamwork, thinking skills, and diversity)....
You are required to write a Business Plan Report and you are advised to follow the...
You are required to write a Business Plan Report and you are advised to follow the below given outline.  Part I- Product/service idea Business Plan Report (40%) To make the best impression, a business plan should follow a convention structure, such as the outline shown below. Cover page Table of contents 1. Executive Summary  A succinct highlight of the overall plan- include ownership structure, business address, product/service, the management team and strategy and strengths. 2. Industry Analysis ...
Describe what the following query does using lyrics database with mysql. lyrics database is posted below...
Describe what the following query does using lyrics database with mysql. lyrics database is posted below 1.) select m.lastname, m.firstname, s.lastname from members m inner join salespeople s using (salesID) order by m.lastname asc; 2.) select studioID, studioname, base from salespeople sa inner join studios st on (sa.salesID = st.salesid) where base < 300 3.) SELECT artistName FROM Artists WHERE artistID IN (SELECT artistID FROM Titles) DROP TABLES IF EXISTS Artists,Genre, Members, Titles, Tracks,SalesPeople,Studios,XrefArtistsMembers; DROP TABLES IF EXISTS Authors,Publishers,Titles,Title_Authors,Royalties; DROP...
One of Jim O’Brien’s customers, Mid-West Supply, has presented him with an opportunity for a significant...
One of Jim O’Brien’s customers, Mid-West Supply, has presented him with an opportunity for a significant amount of freight moving into a new market for Hardee. Hardee is a truckload carrier primarily moving freight in east/west lanes in the United States, with some movements into Canada. Hardee has dispatch centers located throughout the United States which have some dock and warehousing capacity. The new move would be between Lincoln, NE and Miami, FL. Hardee has avoided this market because of...
We constantly seem to be pricing ourselves out of some markets and not charging enough in...
We constantly seem to be pricing ourselves out of some markets and not charging enough in others. Our pricing policy is pretty simple: we mark up our full manufacturing cost by 50%. That means a computer that costs us $2,000 to manufacture will sell for $3,000. Until now I thought this was a workable approach, but now I’m not so sure. Steve Works, CEO, Cortland Manufacturing, Inc. (CMI) Steve’s Controller, Sally Nomer, had just told him that she believed the...