Unix/Linux programming Question: Download Questions PDF
What are the techniques that you use to handle the collisions in hash tables?
Answer:
We can use two major techniques to handle the collisions. They are open addressing and separate chaining. In open addressing, data items that hash to a full array cell are placed in another cell in the array. In separate chaining, each array element consist of a linked list. All data items hashing to a given array index are inserted in that list.
Download Unix/Linux programming Interview Questions And Answers
PDF
Previous Question | Next Question |
What is the major advantage of a hash table? | In Unix OS, what is the file server? |