1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
2 years ago
6

What are the limits of hashing and verifying that files haven’t changed?

Computers and Technology
1 answer:
earnstyle [38]2 years ago
5 0

The hashing function can take any number of key-value pairs and there is no specific limit to it.

<h3>What is hashing?</h3>

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

brainly.com/question/13106914

#SPJ1

You might be interested in
Chemical reaction rates are proportional to a rate constant, k, which changes with temperature according to the Arrhenius equati
Vanyuwa [196]

Answer:

see answer below

Explanation:

the equation is given by

k=ko* e^(-Q/RT)

then replacing the known values

k=1200 min⁻¹ e^[-8000 cal/mole/ (1.987 cal/mole K *T)]

then replacing values of T every 50 K from 100 to 500 K we get the series of values

\left[\begin{array}{ccc}T&k\\100&3.924*10^{-15} min ^{-1} \\150&2.643*10^{-9} min ^{-1} \\200&2.17*10^{-6} min ^{-1} \\250&1.216*10^{-4} min ^{-1} \\300&1.781*10^{-3} min ^{-1} \\350&0.012 min ^{-1} \\400&0.051 min ^{-1} \\450&0.156 min ^{-1} \\500&0.382 min ^{-1} \end{array}\right]

7 0
3 years ago
Which is true for a hosted blog software
professor190 [17]
Since you have not provided the choices wherein I will have to choose from to arrive at an answer, I will just explain to you the concept revolving around a hosted blog software. Hosted blog software are basically installed by the owner of the web server in which among its famous platforms is the Blogger.
7 0
3 years ago
Read 2 more answers
What are the three main components of a for loop?
insens350 [35]

Answer:

Similar to a While loop, a For loop consists of three parts: the keyword For that starts the loop, the condition being tested, and the EndFor keyword that terminates the loop.

Explanation:

Loop statements usually have four components: initialization (usually of a loop control variable), continuation test on whether to do another iteration, an update step, and a loop body.

8 0
3 years ago
Create a button to play the playlist <br><br> Java, netbeans
Pavel [41]
I'm not sure but maybe one of the two websites can help you
.
http://wiki.netbeans.org/MusicAppUsingRESTRemoting

https://mukeshscience.wordpress.com/2014/05/26/adding-audio-to-java/

6 0
4 years ago
Read 2 more answers
Your boss is trying to modify a PDF file that he made a year ago. He asks you what he can use to do this. Which of the selection
Masteriza [31]
The answer is b. Office 2013
3 0
3 years ago
Read 2 more answers
Other questions:
  • Hybrid protocol is similar to which other protocol?
    10·1 answer
  • Insurance can help you:
    12·1 answer
  • A graph of an organization'snet income over the past 10 years is an example of an analogmodel.
    7·1 answer
  • 1. Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address
    7·1 answer
  • Please tell fast plzzzzzzzz​
    11·2 answers
  • Why do certain words change color in Python?
    6·1 answer
  • For a parking application that lets you pay for parking via your phone, which of these is an example of a functional requirement
    8·1 answer
  • What is the difference between RELIABLE and UNRELIABLE sources of<br> income?
    7·2 answers
  • Neview of related literature happens in two wayo (1) Traditional and
    6·1 answer
  • Why does computer uses 0s and 1s to procress data​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!