Together, these functions execute a program that creates a hash table and manages its collisions through the open addressing strategy, which consists of 3 different functions: linear probing, ...