After this module, you should:
- understand how to resolve collisions in a hash table by open addressing
- know some strategies for converting non-integer objects to hashcodes
- be able to articulate the difference in behavior between hashing a set
and hashing a sequence
- be able to describe a hashDoS attack and to explain why most common
hash functions are not resistant to a malicious attacker
- be prepared for the second exam