1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
2 years ago
6

What are the limits of hashing and verifying that files haven’t changed?

Computers and Technology
1 answer:
earnstyle [38]2 years ago
5 0

The hashing function can take any number of key-value pairs and there is no specific limit to it.

<h3>What is hashing?</h3>

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

brainly.com/question/13106914

#SPJ1

You might be interested in
As part of its commitment to sustainability, a company is looking for a way to track the source of purchased goods and how they
luda_lava [24]

The primary technology that would enable the company to achieve this goal is Blockchain technology

  • Blockchain is commonly defined as an enclosed, encrypted, distributed database that is distributee in a wide range of multiple computers or nodes that are part of a community or system.

  • It is an exciting technologies as it helps to limit the incidence of security breaches by even its own users.

  • With Blockchain, a company can be able to guard against thefts of their products and also monitor them.

From the above we can therefore say that the answer to The primary technology that would enable the company to achieve this goal is Blockchain technology is correct

Learn more from:

brainly.com/question/24875333

6 0
3 years ago
Read 2 more answers
Select the correct answer from each drop-down menu.
Len [333]

Answer:

The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux

7 0
2 years ago
What code would you use to create the login button?
Simora [160]

Go To This Web Page

https://www.w3schools.com/howto/howto_css_login_form.asp

5 0
3 years ago
Once a table is inserted into a publication, which two tabs become available?
rusak2 [61]

Answer:

insert i think sry if its wrong :(

Explanation:

7 0
3 years ago
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
Other questions:
  • In Word, how can you tell when text is selected?
    8·1 answer
  • Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
    9·1 answer
  • If you were asked to subnet a network in such a way as to arrive at 6 network ids you would need to borrow 2 bits.
    7·1 answer
  • what would happen if a large number of computer users are attempting to access a web site at the same time that you are
    15·2 answers
  • DESCRIBE FLOPPY DISK
    15·1 answer
  • How can rows be added to a table​
    5·1 answer
  • Which Windows system utility contains a comprehensive list of the devices connected to your computer and displays warning icons
    8·1 answer
  • Based upon the contents of the BOOKS table, which line of the following SQL statement contains an error?
    13·1 answer
  • PowerPoint:
    7·2 answers
  • Which function in the plane manager allows you to create a new plane where both x and y axes are perpendicular to the line selec
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!