Questions 59-60 are based on the following informationA hash table With hash functionH1(k)=k mod 13Is shown below.Collision is resolved using the hash function H2(k)=(k mod 11)+1How many key comparisons occur in searching for key 35 in the given hash tabl

题目

Questions 59-60 are based on the following information

A hash table With hash function

H1(k)=k mod 13

Is shown below.

Collision is resolved using the hash function H2(k)=(k mod 11)+1

How many key comparisons occur in searching for key 35 in the given hash table?

A.0

B.1

C.2

D.3


相似考题
参考答案和解析
正确答案:D
更多“Questions 59-60 are based on the following informationA hash table With hash functionH1(k)=k mod 13Is shown below.Collision is resolved using the hash function H2(k)=(k mod 11)+1How many key comparisons occur in searching for key 35 in the given hash tabl”相关问题
  • 第1题:

    Which three are properties of the MyISAM storage engine?()

    A.Transaction support

    B.FULLTEXT indexing for text matching

    C.Table and page level locking support

    D.Foreign key support

    E.Geospatial indexing

    F.HASH index support

    G.Table level locking only


    参考答案:B, E, G

  • 第2题:

    All three types of cryptography schemes have unique function mapping to specific applications. For example, the symmetric key( ) approach is typically used for the encryption of data providing ( ) , whereas asymmetric key cryptography is mainly used in key ( ) and nonrepudiation , thereby providing confidentiality and authentication. The hash ( ) (noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message ( ) and identity of peers during transport over insecure channels.

    A.Cryptography

    B.decode

    C.privacy

    D.security@@@SXB@@@A.Conduction

    B.confidence

    C.confidentiality

    D.connection@@@SXB@@@A.Authentication

    B.structure

    C.encryption

    D.exchange@@@SXB@@@A.Algorithm

    B.Secure

    C.structure

    D.encryption@@@SXB@@@A.Confidentiality

    B.integrity

    C.service

    D.robustness


    正确答案:D,C,C,A,C

  • 第3题:

    Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()

    A. Use default Layer 4 hash in core.

    B. Use default Layer 3 hash in distribution.

    C. Use default Layer 4 hash in distribution.

    D. Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.


    参考答案:D

  • 第4题:

    All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach (71) is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is maidy used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.

    A. Cryptography
    B.decode
    C.privacy
    D.security

    答案:A
    解析:

  • 第5题:

    Which two steps does a receiver perform to validate a message using HMAC? ()  

    • A、 decrypts the received MAC using a secret key
    • B、 compares the computed MAC vs. the MAC received
    • C、 authenticate the receivedmessage using the sender’s public key
    • D、 look up the sender’s public key
    • E、 extracts the MAC from the receivedmessage thenencrypts the received message with a secret keyto producethe MAC
    • F、 Computes the MAC using the receivedmessage and a secret key as inputs to the hash function

    正确答案:B,F

  • 第6题:

    Which data organization schemes are supported?()

    • A、PARTITION BY HASH and ORGANIZE BY  
    • B、PARTITION BY RANGE and ORGANIZE BY KEY SEQUENCE  
    • C、PARTITION BY HASH and ORGANIZE BY KEY SEQUENCE 
    • D、PARTITION BY RANGE and ORGANIZE BY

    正确答案:D

  • 第7题:

    通过hash 掩码方式实现RP 的负载分担,以下描述正确的有() 

    • A、 不同路由器上hash 掩码可以不同。
    • B、 hash 掩码由各路由器自己设置。
    • C、 hash 掩码由BSR 生成。
    • D、 hash 掩码方式下,RP 的选择与C-RP 优先级无关。

    正确答案:C

  • 第8题:

    Which of the following commands should be used to assure that a dump can be forced using the reset button on a system without a key switch?()

    • A、sysdumpdev -k 
    • B、sysdumpdev -L 
    • C、sysdumpdev -K 
    • D、sysdumpdev -P

    正确答案:C

  • 第9题:

    Which three are properties of the MyISAM storage engine?()

    • A、Transaction support
    • B、FULLTEXT indexing for text matching
    • C、Table and page level locking support
    • D、Foreign key support
    • E、Geospatial indexing
    • F、HASH index support
    • G、Table level locking only

    正确答案:B,E,G

  • 第10题:

    单选题
    Which of the following commands should be used to assure that a dump can be forced using the reset button on a system without a key switch? ()
    A

     sysdumpdev -k 

    B

     sysdumpdev -L 

    C

     sysdumpdev -K 

    D

     sysdumpdev -P


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing theoverhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()
    A

     Use default Layer 4 hash in core.

    B

     Use default Layer 3 hash in distribution.

    C

     Use default Layer 4 hash in distribution.

    D

     Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    Which two steps does a receiver perform to validate a message using HMAC? ()
    A

    decrypts the received MAC using a secret key

    B

    compares the computed MAC vs. the MAC received

    C

    authenticate the receivedmessage using the sender’s public key

    D

    look up the sender’s public key

    E

    extracts the MAC from the receivedmessage thenencrypts the received message with a secret keyto producethe MAC

    F

    Computes the MAC using the receivedmessage and a secret key as inputs to the hash function


    正确答案: C,B
    解析: 暂无解析

  • 第13题:

    设线性表(59,53,46,48,37,31,25)采用散列(Hash)法进行存储和查找,散列函数为H(Key)=Key MOD 7(MOD表示整除取余运算)。若用链地址法解决冲突(即将相互冲突的元素存储在同一个单链表中)构造散列表,则散列表中与哈希地址 (38) 对应的单链表最长。

    A.2

    B.3

    C.4

    D.6


    正确答案:C
    53,48,25对应的地址都为4.

  • 第14题:

    散列地址空间为0..(m-1),k为关键字,用整数p去除k,将其余数作为k的散列地址,即hash(k)=k%p。为了减少发生冲突的可能性,一般取p为(35)。

    A.小于等于m的最大奇数

    B.小于等于m的最大质数

    C.小于等于m的最大偶数

    D.小于等于m的最大合数


    正确答案:B
    解析:一般取p小于等于m的最大质数,这样才能最大程度地减少地址冲突的可能。

  • 第15题:

    ● 若线性表(24, 13, 31, 6, 15, 18, 8)采用散列(Hash)法进行存储和查找,设散列函数为H(Key)=Key mod 11,则构造散列表时发生冲突的元素为 (1) 。(其中的mod表示整除取余运算)

    (1)

    A. 24和13

    B. 6 和15

    C. 6 和24

    D. 18和8


    正确答案:A

  • 第16题:

    All three types of cryptography schemes have unique function mapping to specific.For example,the symmetric key approach( )is typically used for the encryption of data providing( ),whereas asymmetric key cryptography is maidy used in key( )and nonrepudiation,thereby providing confidentiality and authentication.The hash(本题)(noncryptic),on the other hand,does not provide confidentiality but provides message integrity,and cryptographic hash algorithms provide message( )and identity of peers during transport over insecure channels.

    A.Algorithm
    B.Secure
    C.structure
    D.encryption

    答案:A
    解析:

  • 第17题:

    The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()

    • A、The enable password is present for backward compatibility.
    • B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.
    • C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.
    • D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

    正确答案:A

  • 第18题:

    设有一个含有13个元素的Hash表(0~12),Hash函数是:H(key)=key%13,其中%是求余数运算。用线性探查法解决冲突,则对于序列(2、8、31、20、19、18、53、27),18应放在第几号格中()。

    • A、5
    • B、9
    • C、4
    • D、0

    正确答案:B

  • 第19题:

    Server load balancing (SLB) is the process of deciding to which server a load-balancing device should send a client request for service. Which predictors are supported on ACE in order to select the best server to fulfill a client request? ()

    • A、 Hash address: Selects the server by using a hash value based on either the source or destination IP address, or both
    • B、 Hash URL: Selects the server by using a hash value based on the requested URL
    • C、 Hash MAC.Selects the server by using a hash value based on either the source or destination MAC address, or both
    • D、 Hash header: Selects the server by using a hash value based on the HTTP header name
    • E、 Hash IP: Selects the server using a hash value based on the IP address

    正确答案:A,B,D

  • 第20题:

    In which scenario will you create a sorted hash cluster? ()

    • A、 if the application uses queries joining tables only occasionally
    • B、 if the full table scan is executed often on only one table of the clustered tables
    • C、 if the data for all the rows of a cluster key value exceeds one or two Oracle blocks
    • D、 when you want the data to be returned automatically in the chronological order

    正确答案:D

  • 第21题:

    根据Hash函数的安全水平,人们将Hash函数分成两大类,分别是()

    • A、弱碰撞自由的Hash函数
    • B、强碰撞自由的Hash函数
    • C、强Hash函数
    • D、弱Hash函数

    正确答案:A,B

  • 第22题:

    多选题
    Server load balancing (SLB) is the process of deciding to which server a load-balancing device should send a client request for service. Which predictors are supported on ACE in order to select the best server to fulfill a client request? ()
    A

    Hash address: Selects the server by using a hash value based on either the source or destination IP address, or both

    B

    Hash URL: Selects the server by using a hash value based on the requested URL

    C

    Hash MAC.Selects the server by using a hash value based on either the source or destination MAC address, or both

    D

    Hash header: Selects the server by using a hash value based on the HTTP header name

    E

    Hash IP: Selects the server using a hash value based on the IP address


    正确答案: D,B
    解析: 暂无解析

  • 第23题:

    多选题
    根据Hash函数的安全水平,人们将Hash函数分成两大类,分别是()
    A

    弱碰撞自由的Hash函数

    B

    强碰撞自由的Hash函数

    C

    强Hash函数

    D

    弱Hash函数


    正确答案: B,C
    解析: 暂无解析