1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
2 years ago
6

What are the limits of hashing and verifying that files haven’t changed?

Computers and Technology
1 answer:
earnstyle [38]2 years ago
5 0

The hashing function can take any number of key-value pairs and there is no specific limit to it.

<h3>What is hashing?</h3>

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

brainly.com/question/13106914

#SPJ1

You might be interested in
Refer to the exhibit. An administrator is examining the message in a syslog server. What can be determined from the message? Thi
ad-work [718]

Answer:

This is a notification message for a normal but significant condition

Explanation:

Syslog represents the standard for logging message, it sends messages through UDP port 514. Familiar syslog facilities includes IP, OSPF protocols, etc. The messages from syslog are both about facility and level.

A syslog server is a means through which network devices sends messages about events into a logging server which is called syslog server. Since a syslog protocol supports so many devices, it can also be used to log a good number of events.

8 0
3 years ago
Read 2 more answers
How do you find binary?
trasher [3.6K]

Answer:

To convert integer to binary, start with the integer in question and divide it by 2 keeping notice of the quotient and the remainder. Continue dividing the quotient by 2 until you get a quotient of zero. Then just write out the remainders in the reverse order.

Explanation:

3 0
3 years ago
Can someone write me a cyber bullying brochure I need it ASAP
Sever21 [200]

Answer:

how quick do you need it

8 0
3 years ago
Read 2 more answers
A search engine searches what to find a match for the query
mylen [45]

Answer:

your keyword

Explanation:

3 0
3 years ago
The _________keys include the home, end, and arrow keys.
katovenus [111]
The answer would be Functional Keys.
8 0
3 years ago
Other questions:
  • You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component sh
    14·1 answer
  • Match each storyboarding technique with its appropriate description
    9·1 answer
  • ________ is the process of translating a task into a series of commands that a computer will use to perform the task.
    5·1 answer
  • How do you return a value from a function?
    6·1 answer
  • Consider the code fragment below (with nested loops). int sum = 0;for (int i = 1; i &lt; 5; i++) for (int j = 1; j &lt;= i; j++)
    15·1 answer
  • Microsoft word's spell checker?
    10·1 answer
  • Which of the following scenarios is an example of irrelevant media?
    11·1 answer
  • A line beginning with a # will be transmitted to the programmer’s social media feed.
    11·2 answers
  • What font family is Times New Roman an what font family is Arial?
    9·2 answers
  • The way a student prepares for a test or reviews academic material is referred to as
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!