1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hoochie [10]
3 years ago
11

You've received an assortment of files along with accompanying hashes to guarantee integrity. Some of the hash values are 256-bi

t and some are 512-bit. Assuming they all use the same basic algorithm, what might it be?
Choose the best response.
a. MD5
b. RIPEMD
c. SHA-1
d. SHA-2
Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
3 0

Assuming they all use the same basic algorithm, what might it be SHA-1.

c. SHA-1

<u>Explanation:</u>

As solution hash value for system will used only 160 bit even though performance is bit slower. Normally SHA-1 method been used. Basically there four methods

MD5 is a methods where it checked regularly whether the file system or altered or not. RIPEMD is a method where it store or converts value to 160 bits. SHA1 methods following some security algorithms where it keeps bits in 160 bits with some security crypto or signature

SHA2- this method following some security algorithms where it keeps bit in 256 bits and we have sha384 and sha512. SHA 2 method is not used now days.

You might be interested in
Which sns gets its names from one of its unique features
Komok [63]

Answer:

no

Explanation:

3 0
3 years ago
What are examples of macro events related to a form? Check all that apply.
Westkost [7]

Answer:

A form is closed

A form is resized.

A form is opened

A user presses a key

A user moves the mouse

Explanation:

There are different events in a form, and we can use them in different situations like:

  • We can use On Resize to resize our form.
  • If we On Load the form will be displayed.
  • On Clicked, If there was a click in an object
  • On Unload to close the form.
  • On Mouse Enter and On Mouse Leave, in this case, the mouse enters or leaves the object.

6 0
4 years ago
Suppose you have two RAID arrays, one implementing RAID 3, the other RAID 5. Each has 9 disk drives in its array. If the RAID 5
Snezhnost [94]

Answer:

48 is the answer

Explanation:

16×3 is the explanation for your question

8 0
3 years ago
Which is an example of a variable name written in camelcase?
stiv31 [10]

Answer: songName

-DoggyMan5

4 0
3 years ago
Read 2 more answers
Two circuits are created using two identical light bulbs. In the circuit A, the bulbs are hooked up in series. In circuit B, the
Ulleksa [173]
C is not correct since in the case of circuits that are lined up in series, if one or them dies they all die.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Who controls communication ethics?
    13·1 answer
  • Your friends know that you understand a lot about computers, both the technical details of how they operate as well as informati
    12·1 answer
  • Barat explains that if you have a cell that is the sales price of a given product, the value of which will change to produce the
    9·1 answer
  • Write a program that lets the Michigan Popcorn Company keep track of their sales for seven different types of popcorn they produ
    6·1 answer
  • Which is one use for a hyperlink? A. to create a heading style B. to animate important text C. to create a link to a website. D.
    7·1 answer
  • What tab on the ribbon do I go into to create new database objects in Access?
    13·1 answer
  • A potentiometer a three wire variable resistor is used in which type of sensor ?
    13·1 answer
  • Files and folders in UNIX can be removed using the
    8·1 answer
  • What is the output of the first and second print statements?
    13·1 answer
  • what is the keyboard shortcut to display formulas on the worksheet : a. CTRL+ B. CTRL+: C. CTRL+; D. ALL THE ABOVE
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!