Use the double hashing procedure we have described with
Want to see the full answer?
Check out a sample textbook solutionChapter 4 Solutions
DISCRETE MATHEMATICS LOOSELEAF
- What the hash tags (#) stand forarrow_forwardIn the Blackpink Born Pink Concert, if 12 lucky Blinks (Blackpink fans) were chosen to take a picture with Jennie, Lisa, Rose, and Jisoo numbered from 0 to 11. With only 12 slots for the picture taking, the lucky Blinks are selected using the last two (2) digits of their ticket code. Using hashing function, which slot will be assigned to the lucky Blinks that has these last two digits on their concert ticket: 04, 15, 27, 39, 43, 55, 62, 33? If there is a collision, resolve it using quadratic probing. a. 04 will be assigned to slot number b. 15 will be assigned to slot number c. 27 will be assigned to slot number d. 39 will be assigned to slot number e. 43 will be assigned to slot number f. 55 will be assigned to slot number g. 62 will be assigned to slot number h. 33 will be assigned to slot number *Please prepare and write your complete and neat solution in a clean white/yellow paper. You will be required to upload your solution before proceeding and acquiring your access to the next…arrow_forwardIn the Blackpink Born Pink Concert, if 12 lucky Blinks (Blackpink fans) were chosen to take a picture with Jennie, Lisa, Rose, and Jisoo numbered from 0 to 11. With only 12 slots for the picture taking, the lucky Blinks are selected using the last two (2) digits of their ticket code. Using hashing function, which slot will be assigned to the lucky Blinks that has these last two digits on their concert ticket: 04, 15, 27, 39, 43, 55, 62, 33? If there is a collision, resolve it using quadratic probing. a. 04 will be assigned to slot number b. 15 will be assigned to slot number c. 27 will be assigned to slot number d. 39 will be assigned to slot number e. 43 will be assigned to slot number f. 55 will be assigned to slot number g. 62 will be assigned to slot number h. 33 will be assigned to slot numberarrow_forward
- Describe the family of shift ciphers as a cryptosytem.arrow_forwardConsider a region of the memory address space that is divided into 5 sequential portions. Assume that five files of various sizes are randomly inserted into this region (one file in one section). How likely is it that files will be written in the parts in order of their sizes? (the largest in the first section, the second largest in the second section, and so on).arrow_forwardConsider Z₁1 = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10).arrow_forward
- There are 6 numbered balls in a bag. Each ball has a distinct number and the numbers are in {1,2, 3, 4,5, 6}. Student A takes a ball from the bag randomly and records the number on the selected ball. The ball is taken without replacement. Student B then takes a ball from the bag randomly and records the number on his/her selected ball. Let X1 denote the number recorded by student A and X2 be the number recorded by student B. What's the probability of X1 > X2?arrow_forwardb) Which memory locations are assigned by the hashing function h(k) = k mod 101 to the records of insurance company customers with these Social Security numbers? 2473565arrow_forwardA freelance computer consultant keeps a database of her clients, which contains the names S = {Acme, Brothers, Cores, Dion, Energy, Floyd, Globe, Hilbert}. The following clients owe her money: A = {Acme, Cores, Energy, Globe}. The following clients have done at least $40,000 worth of business with her: B = {Acme, Brothers, Cores, Dion}. The following clients have employed her in the last year: C = {Acme, Cores, Dion, Energy, Globe, Hilbert}. A subset of clients is described that the consultant could find using her database. HINT [See Example 4.] the clients who owe her money or have done at least $40,000 worth of business with her Write the subset in terms of A, B, and C.arrow_forward
- Digital signatures have a potential weakness due to lazy users. In e-commerce transactions, a contract might be drawn up and the user asked to sign its SHA-1 hash. If the user does not actually verify that the contract and hash correspond, the user may inadvertently sign a different contract. Suppose that the Mafia try to exploit this weakness to make some money. They set up a pay Web site (e.g., pornography, gambling, etc.) and ask new customers for a credit card number. Then they send over a contract saying that the customer wishes to use their service and pay by credit card and ask the customer to sign it, knowing that most of them will just sign without verifying that the contract and hash agree. Show how the Mafia can buy diamonds from a legitimate Internet jeweler and charge them to unsuspecting customers.arrow_forwardI need to create a password for my bank account. I would choose each of the first 5 characters of the password from the English alphabet, each of the next 3 characters from the set of digits {0,1,2,3,4,5,6,7,8,9}, and each of the last two characters from the set of special characters {!,#,$,%,@}. How many different passwords are possible? (Your calculator may give you an answer in Scientific Notation, ask if you need explanations about the notation.)arrow_forwardThe figure to the right shows the results of a survey in which 1012 adults from Country A, 1009 adults from Country B, 1016 adults from Country C, 1010 adults from Country D, and 1005 adults from Country E were asked whether national identity is strongly tied to birthplace. A table labeled "National Identity and Birthplace, People from different countries who believe national identity is strongly tied to birthplace" consists of five rows containing the following information from top to bottom, with row listed first and information listed second: Country A, 31 percent; Country B, 20 percent; Country C, 25 percent; Country D, 53 percent; Country E, 12 percent.Country A31%20%25%53%Country BCountry CCountry DCountry E12% Construct a 99% confidence interval for the population proportion of adults who say national identity is strongly tied to birthplace for each country listed.arrow_forward
- Algebra & Trigonometry with Analytic GeometryAlgebraISBN:9781133382119Author:SwokowskiPublisher:CengageElements Of Modern AlgebraAlgebraISBN:9781285463230Author:Gilbert, Linda, JimmiePublisher:Cengage Learning,Mathematics For Machine TechnologyAdvanced MathISBN:9781337798310Author:Peterson, John.Publisher:Cengage Learning,