Hash Tables, Binary Trees, Graphs, Balanced Trees, Heaps & DP

Chapter 6: Hash Tables

What is a Hash Table?

A hash table is a data structure used to store key-value pairs efficiently. It uses a hashing function to compute an index (or hash) from the key, where the value is stored in an array-like structure.

1. Collisions

Collisions occur when two keys hash to the same index in the hash table. Hash tables must handle collisions to work correctly. Common methods for collision resolution:

  • Chaining
    • Each slot in the hash table holds a linked list of key-value pairs.
    • When
Read More

Essential MS Office & Access Commands and Functions

1. Essential Keyboard Shortcuts

  • Shift + Ctrl + M: Change font size
  • Shift + Ctrl + F: Change font type
  • Shift + Ctrl + D: Double underline text
  • Shift + Ctrl + L: Convert lowercase to uppercase
  • Ctrl + Alt + I: View document in Print Preview
  • Ctrl + M: Change font, font style, font size
  • Shift + Ctrl + U: Convert uppercase to lowercase
  • Ctrl + R: Close the existing document
  • F12: Show the “Save As” window

2. Formula for Table of Letters Results

Formula to display results for “PASA YEAR’S LOSE THE YEAR, SUPLETORIO”

Read More

Understanding Microprocessor Architecture: CISC vs RISC

Microprocessor Architecture Explained

Microprocessors: A component that incorporates all the functions of the CPU on a single integrated circuit.

Technological Characteristics

  • Instruction set that can run.
  • Word size (number of bits) which the microprocessor processes in a single operation.
  • The clock speed supported (the rate at which it can work).
  • Instruction pipelining (which allows multiple instructions to be processed simultaneously in a chain-like assembly).
  • Instruction set architecture.
  • Data path or
Read More

Data Transmission Networks: Delays, Losses, and Tools

Fiber Types and Distances

Q20. What are the three types of fiber in use? What are the distances they can cover without needing repeaters?

A20.

  • Multimode Step-Index Fiber:
  • Copper: 2000 meters at 100 Mbps.
  • Multimode Graded-Index Fiber: Covers 3000 meters at 100 Mbps.
  • Singlemode Fiber: Up to 80km.

Repeaters and Hubs

Q21. What are repeaters and hubs?

A21. Repeaters strengthen the signal by repeating electrical signals, amplifying both the signal and any noise. Hubs distribute the amplified signal across all

Read More

Tech Terms: Definitions of Computer and Mobile Technology

AAC: A music file format of higher quality than MP3.

Accuracy: A GPS’s measurement of correctness; the ability to measure correctly.

Anchor: A word, phrase, or image that includes a hyperlink.

Anti-antivirus virus: A virus that attacks anti-virus software.

Avatar: An image in a computer game that represents a person.

Automation: The use of machines to perform tasks without human assistance.

Backdoor: Part of a program giving undesired access.

Bluetooth: A wireless network that connects your phone with

Read More

Data Science Process, Applications, and Machine Learning Techniques

User

The Data Science Process

User

Steps in the Data Science Process

The data science process involves a series of steps that help data scientists analyze and derive insights from data. While different organizations and individuals may have variations in their approach, the following steps provide a general framework for the data science process:

  1. Problem Definition: The first step is to clearly define the problem or question you want to address with data science. This involves understanding the business or research

Read More