1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
2 years ago
5

SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm.

Computers and Technology
1 answer:
prisoha [69]2 years ago
7 0

SHA-1 produces a(n) 160-bit message digest, which can then be used as an input to a digital signature algorithm.

<h3>What is SHA-1?</h3>

Secure Hash Algorithm 1 or SHA 1 is a function which take the input value. In the result, it produces the hash value of 20 byte.

As there is 8 bit in 1 byte. Thus, the number of bits in 20 byte are,

n=20\times8\\n=160\rm\; bits  

Hence, it produces 160 bit of hash value, which is known as the massage digest.

Thus, SHA-1 produces a(n) 160-bit message digest, which can then be used as an input to a digital signature algorithm.



Learn more about the SHA-1 here;

brainly.com/question/9979590

#SPJ1

You might be interested in
3. What report shows what mobile devices were used to view a website?
mrs_skeptik [129]

The report that shows what mobile devices were used to view a website is the Devices report under “Mobile”

<h3>What is a mobile device?</h3>

This is known to be a is a small hand-held device that shows screen with touch input and it is said to be also made up of QWERTY keyboard as well as others.

Note that The report that shows what mobile devices were used to view a website is the Devices report under “Mobile”

See full question below

What report shows what mobile devices were used to view a website?

The Exit Pages report under “Site Content”

The Landing Page report under “Site Content”

The Engagement report under “Behavior”

The Devices report under “Mobile”

Learn more about website from

brainly.com/question/13171394

#SPJ12

4 0
2 years ago
In 3–5 sentences, describe the unique challenges e-mail presents for business communications.
alina1380 [7]
One of the things that are a challenge, is that you have to get the correct puntuation, correct capitilization, because it's a buisness email. You ont want to mess a buisness email up. You also have to have no repating phrases and sentences. You can't be adding random words and saying "and" all the time. 
7 0
3 years ago
Read 2 more answers
To improve performance on an iSCSI SAN, a network technician configured an MTU value of 9000 on the Ethernet LAN. What did the t
nevsk [136]

Answer:

Jumbo frames

Explanation:

Ethernet frames having a payload size above 1500 bytes are called Jumbo frames. The maximum MTU value set by the IEEE 802.3 is 1500 bytes, but jumbo frames have sizes up to a maximum of 9000 bytes, hence they do not meet the standards of IEEE 802.3. They are used in local area networks that can transmit data at high rates of 1 gigabits per second.

6 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
Pie

Answer:

Eveidence

Explanation:

<3

7 0
3 years ago
Read 2 more answers
Lookup functions allow<br> spreadsheet users to
Fofino [41]

Answer:

Lookup functions look for a value in the leftmost column of a table and then returns the value from the same row in another table placed in another column, and that is mentioned as the third argument. It can return an exact match or the approximate match. And this formula and concept can be applied horizontally as well.

Like vlookup( column-name, range to be searched, column number in the range mentioned from the first column in the range, true for exact match and false for the approximate match). Thus there are four arguments.

Explanation:

Please check the answer section.

3 0
3 years ago
Other questions:
  • Where is the Outlook Search Folder located?
    5·1 answer
  • What is an (CR) Optical character recognition?
    13·2 answers
  • Plz tell me a storage device that should be used for this and why
    11·1 answer
  • Styles are modified by using the Office clipboard in the Home tab. true or false
    5·2 answers
  • Browsing the web is one of the most common activities performed by individuals who use computers.
    12·1 answer
  • (70 points) This is a legit question that I have for a device FOR my homework.
    5·2 answers
  • Where is the typical location of a touchpad inside of a laptop?
    13·1 answer
  • If your pulse is higher than your Target Heart Rate during exercise, what should you do?
    5·2 answers
  • Algorithm that has been coded into something that can be run by a machine.
    10·1 answer
  • WAP to find area of circle​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!