Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

.net supports hash mapping

Posted on 2009-07-13
4
199 Views
Last Modified: 2013-11-08
HI


What is hash mapping? Does .net supports hash mapping.
0
Comment
Question by:KaranGupta
  • 3
4 Comments
 
LVL 53

Expert Comment

by:Dhaest
ID: 24838641
Both provide key-value access to data. The Hashtable is one of the original collection classes in Java. HashMap is part of the new Collections Framework, added with Java 2, v1.2. The key difference between the two is that access to the  Hashtable is synchronized on the table while access to the
HashMap isn't. You can add it, but it isn't there by  default.

Another difference is that iterator in the HashMap is fail-safe while the enumerator for the Hashtable isn't. If you change the map while iterating, you'll know.

And, a third difference is that HashMap permits null values in it, while Hashtable doesn't.

Source: http://www.allinterview.com/showanswers/67679.html
0
 
LVL 53

Accepted Solution

by:
Dhaest earned 500 total points
ID: 24838649
Hashtable Class

Represents a collection of key/value pairs that are organized based on the hash code of the key.

http://msdn.microsoft.com/en-us/library/system.collections.hashtable.aspx
0
 

Author Comment

by:KaranGupta
ID: 24838660
So you mean hash mapping is key/ value pair
0
 
LVL 53

Expert Comment

by:Dhaest
ID: 24838670
That's correct
0

Featured Post

How Do You Stack Up Against Your Peers?

With today’s modern enterprise so dependent on digital infrastructures, the impact of major incidents has increased dramatically. Grab the report now to gain insight into how your organization ranks against your peers and learn best-in-class strategies to resolve incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

IP addresses can be stored in a database in any of several ways.  These ways may vary based on the volume of the data.  I was dealing with quite a large amount of data for user authentication purpose, and needed a way to minimize the storage.   …
Many of us here at EE write code. Many of us write exceptional code; just as many of us write exception-prone code. As we all should know, exceptions are a mechanism for handling errors which are typically out of our control. From database errors, t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
In a recent question (https://www.experts-exchange.com/questions/29004105/Run-AutoHotkey-script-directly-from-Notepad.html) here at Experts Exchange, a member asked how to run an AutoHotkey script (.AHK) directly from Notepad++ (aka NPP). This video…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question