**AMCAT Hash Tables Questions with answers under computer programming 2019:** Although Computer programming is an optional module in AMCAT exam, still it is recommended for all IT background candidates. Nevertheless, on personal interest of candidates, they can take up the computer section. The best part about this section is that it surely gives special attention to the job aspirant’s profile.Furthermore, we will be seeing AMCAT Hash Tables Questions.

Contents

**AMCAT Hash Tables Questions with answers 2019 – Computer Programming**

As has been noted, Hash table is one of the significant topics of Computer programming syllabus for AMCAT. In addition, 1-2 question comes from the topic frequently. It generally takes 50 seconds to solve a problem. Above all, the questions are more theoretical. So if the concept is clear, it is quite easier to answer the question. Moreover, here we will discuss sample questions on Hash tables with answers and explanation.

**Outline of Hash Tables**

Hashing is especially a technique which is used to uniquely identify a specific object from a group of similar objects. Following are some examples of how hashing is used in our lives include:

### Most Employability Test 2019

- In colleges, each student is assigned a unique roll number explicitly that can be used to retrieve information about them.
- Inside libraries, each book is assigned a unique identification number that can be used to determine information about the book, such as its exact position in the library or the users it has been issued to etc.

Under both the above examples the students and books are hashed to a unique number.

**Hashing**

Assume that you have an object and you want to assign a key to it to make searching process easy. Hence, to store the key/value pair, you can use a simple array like a data structure where keys (integers) can be used directly as an index to store values. However, in cases where the keys are large and cannot be used directly as an index, you should use *hashing*.

In hashing, large keys are converted into small keys by using **hash functions**. The values are then stored in a data structure called **hash table**. The idea of hashing is to distribute entries (key/value pairs) uniformly across an array. Each element is assigned a key (converted key). By using that key you can access the element in **O(1)** time. Using the key, the algorithm (hash function) computes an index that suggests where an entry can be found or inserted.

Hashing is implemented in two steps:

- An element is converted into an integer by using a hash function. This element can be used as an index to store the original element, which falls into the hash table.
- The element is stored in the hash table where it can be quickly retrieved using hashed key.hash = hashfunc(key)

index = hash % array_size

In this method, the hash is independent of the array size and it is then reduced to an index (a number between 0 and array_size − 1) by using the modulo operator (%).

**Hash function**

A hash function is any function that is used to map a data set of an arbitrary size to a data set of a fixed size, which falls into the hash table. The values returned through hash function are called hash values, hash codes, hash sums, or simply hashes.

To achieve a good hashing mechanism, it is important to have a good hash function with the following basic requirements:

- Easy to compute: It should probably be easy to compute and must not become an algorithm in itself.
- Uniform distribution: It should provide a uniform distribution across the hash table and hence should not result in clustering.
- Less collisions: Collisions occur when pairs of elements are mapped to the same hash value. These should be avoided.
**Note**: Irrespective of how good a hash function is, collisions will occur. Therefore, to maintain the performance of a hash table, it is important to manage collisions through various collision resolution techniques.

**Download AMCAT Hash Tables Questions 2019**

AMCAT Hash Tables Sample Questions pdf

**Mock questions for AMCAT Hash Tables**

**Question 1 **What is a hash function? a)

- Function has allocated memory to keys
- A function that computes the location of the key in the array
- Function that creates an array
- None of the mentioned

**Answer: **Option** B **

**Explanation:**In a hash table, there are fewer array positions than the keys, so the position of the key in the array is computed using the hash function.

**Question 2 **What is the search complexity in direct addressing?

- O(n)
- O(logn)
- O(nlogn)
- O(1)

**Answer: **Option** D **

**Explanation:**Since every key has a unique array position, searching takes a constant time

**Question 3 **What is the best that can be the techniques to avoid collision?

- Make the hash function appear random
- Use the chaining method
- Use uniform hashing
- All of the mentioned

**Answer: **Option** B **

**Explanation:**Making the hash function random is not really a good choice, although it is considered one of the techniques to avoid collisions along with chaining and simple uniform hashing. Chaining is the best

**Sample Questions**

**Question 4 **What is it called when several elements compete for the same bucket in the hash table, ?

- Diffusion
- Replication
- Collision
- None of the mentioned

**Answer:** Option **C **

**Explanation:**By definition

**Question 5 **What is a hash table?

- A structure that maps values to keys
- Structure that maps keys to values
- A structure used for storage
- Structure used to implement stack and queue

**Answer:** Option **B**

**Explanation:** A hash table is used to implement associative arrays which has a key-value pair, so the hash table maps keys to values.

**Question 6 **What is direct addressing?

- Distinct array position for every possible key
- Fewer array positions than keys
- Fewer keys than array positions
- None of the mentioned

**Answer:** Option **A **

**Explanation:**Direct addressing is possible only when we can afford to allocate an array that has one position for every possible key.

**Question 7 **What can be the techniques to avoid collision?

- Make the hash function appear random
- Use the chaining method
- Use uniform hashing
- All of the mentioned

**Answer: **Option** D **

**Explanation:**Making the hash function random is not really a good choice, although it is considered one of the techniques to avoid collisions along with chaining and simple uniform hashing.

**Question 8**

Consider a hash table with 100 slots. Collisions are resolved using chaining. Assuming simple uniform hashing, what is the probability that the first 3 slots are unfilled after the first 3 insertions? (GATE-CS-2014)

(A) (97 × 97 × 97)/100^3

(B) (99 × 98 × 97)/100^3

(C) (97 × 96 × 95)/100^3

(D) (97 × 96 × 95)/(3! × 100^3)

**Explanation:** In uniform hashing, the function evenly distributes keys into slots of hash table. Also, each key has an equal probability of being placed into a slot, being independent of the other elements already placed.

Therefore, the probability of remaining first 3 slots empty for first insertion (choosing 4 to 100 slot) = 97/100. As next insertions are independent on previous insertion, the probability for next insertions will also be 97/100. The required probability will be (97/100)^3

Practice more questions on AMCAT Hash Tables Questions to have command on the topic.

**Download AMCAT Computer Programming questions**

Functions Procedures and scope question in AMCAT

AMCAT Iteration recursion and decision statements

**More Articles AMCAT CSE Questions Paper:**

- Data Types
- Iteration, Recursion, Decision
- Procedure, functions and scope
- Arrays, Linked Lists, Trees, Graphs (Data Structure)
- Stacks, Queues
- Hash Tables
- Heaps Questions
- Searching and Sorting
- Polymorphism
- Abstraction
- Encapsulation
- Complexity Theory

**Looking for AMCAT Discount? – check here** AMCAT Discount Code

Any questions on AMCAT Hash Tables Questions, please comment below for help.