Hash tables Flashcards

1
Q

What are the requirements for a Hashing function

A

Generate numeric value from a key
Uniform spread of indices
Minimise collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the mid-square method

A

First square the item.
Take the middle of the result
Then do the MOD for the address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the folding method

A

Divide item into equal pieces
Add the pieces together
Then do MOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many amount of slots should there be

A

The number of assigned slots must exceed the number of records by a third

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens if the hash table becomes >70% full

A

The hash table will be re-sized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens if there is a collision

A
  1. Rehashing: If there is a collision it will find the next available hash.
  2. Create a linked list (Chaining): If there is a collision it will create a list that is linked to the hash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Use of hash tables

A

Can be used in check sums with barcode readers.
It can also be used in digital signatures for asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are hash slots deleted

A

They will be marked with a dummy item. If a new item is added to the hash slot it will replace the dummy item.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are hash tables used in asymmetric encryption

A

When a file is sent a hash algorithm is calculated giving a unique hash.
The file is sent with a public key and digital signature
The receiver decrypts the digital signature using the given public key
Then calculates the hash and compares to original hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly