1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allochka39001 [22]
1 year ago
8

you have just finished developing a new application. before putting it on the website for users to download, you want to provide

a checksum to verify that the object has not been modified. which of the following would you implement?
Computers and Technology
1 answer:
Nostrana [21]1 year ago
3 0

If you have just finished developing a new application, but before putting it on the website for users to download, you want to provide a checksum to verify that the object has not been modified, a process which you must implement is: C. Code signing.

<h3>What is SDLC?</h3>

SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.

<h3>What is code signing?</h3>

In Computer technology, code signing can be defined as a process through which software developer and computer programmers digitally sign executable software codes and scripts in order to confirm the author of the software, as well as guaranteeing that the software code has not been altered (modified) or corrupted, especially through the use of a cryptographic hash so as to validate authenticity and integrity.

In this context, we can reasonably infer and logically deduce that it is important for software developer and computer programmers to implement code signing before making a software available for download on a website.

Read more on software development here: brainly.com/question/28262663

#SPJ1

Complete Question:

You have just finished developing a new application. Before putting it on the website for users to download, you want to provide a checksum to verify that the object has not been modified.

Which of the following would you implement?

answer choices

Normalization

Code obfuscation

Code signing

Memory management

You might be interested in
QUIZLET Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer networ
anastassius [24]

Answer:Screening

Explanation:Packet screening is the process in which whenever a packet is received at the destination port, there is the examining of the packet.The examination of the packet rote from source to destination takes place. The screening takes place for evaluating that the data in the packet is adequate and carries no error that can risk in the security, tracks the routes  of the packet path etc.

5 0
3 years ago
Discuss the purpose purpose of of network attached storage devices
valentinak56 [21]

Answer:

A network attached storage (NAS) device is a server connected to a network with the sole purpose of providing storage. NAS devices often use a RAID configuration. An external hard disk is a separate freestanding hard disk that connects with a cable to a USB or FireWire port on the system unit or communicates wirelessly. External hard disks have storage capacities up to 4 TB and more. A removable hard disk can be inserted or removed from a built-in or external drive. Removable hard disks have storage capacities up to 1 TB. A disk controller consists of a special-purpose chip and electronic circuits that control the transfer of data, instructions, and information from a disk to and from the system bus and other components in a computer. A hard disk controller may be part of the hard disk on the motherboard, or it may be a separate adapter card inside the system unit.

Please Mark Brainliest If This Helped!

5 0
3 years ago
3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, proces
andriy [413]

Answer:

a,b,c,d,f,g are true only e is false

6 0
3 years ago
What type of device is OMR input or Output<br>​
slamgirl [31]

Answer

input

Explanation:

modern ones are now input

5 0
2 years ago
Of what is famous Ted Nelson?​
dsp73

Answer:

Nelson proposed a system where copying and linking any text excerpt, image or form was possible.

Explanation:

Ted Nelson is one of the theoretical pioneers of the world wide web who is best known for inventing the concept of hypertext and hypermedia in the 1960s. As one of the early theorists on how a networked world would work.

How I know:

I goggle it.

8 0
3 years ago
Other questions:
  • What are the two major categories of computer software? word-processing software and spreadsheet software applications software
    13·1 answer
  • Social scientists who study criminal behavior.
    7·2 answers
  • Sara works in the IT department for a large retail store. She has been testing a theory about why an error message keeps popping
    14·1 answer
  • Computer programs and games are called what?
    13·1 answer
  • What information should the subtitles in the clips of your video per folio provide?
    14·1 answer
  • The integrity of a program's output is only as good as the integrity of its input. For this reason, the program should discard i
    6·1 answer
  • Which element is represented by the electron configuration in example B? Example B: 1s22s22p63s23p64s1 Aluminum Cesium Potassium
    12·2 answers
  • The computer that can be used for performing the daily life tasks that might include emailing, browsing, media sharing, entertai
    11·1 answer
  • What is a query? State it's uses.​
    8·1 answer
  • What is it called when you define a variable for the first time
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!