Answer: C)report the status of individual computer users
Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.
Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)
The hashing function can take any number of key-value pairs and there is no specific limit to it.
<h3>What is hashing?</h3>
Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.
When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.
However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.
Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.
Learn more about the hashing here:
brainly.com/question/13106914
#SPJ1
Here is the answer: <span>Tunneling</span>