After this module, you should:

  • understand how to resolve collisions in a hash table by open addressing
  • know some strategies for converting non-integer objects to hashcodes
  • be able to articulate the difference in behavior between hashing a set and hashing a sequence
  • be able to describe a hashDoS attack and to explain why most common hash functions are not resistant to a malicious attacker
  • be prepared for the second exam