Answer:
c. your friend can hash all possible options and discover your secret.
Explanation:
SHA-256 is a set of hash functions that was designed by the NSA. SHA-2 is considered an upgrade on the set that was its predecessor, SHA-1. A hash is a mathematical function that condenses data in a process of one-way encryption. SHA-256 creates hash algoritms that are considered irreversible and unique. However, one of the properties of hashing algorithms is determinism, which means that any computer in the world would be able to compute a particular hash and get the same answer.
Answer:B. Are used to create, organize, and manage databases
Explanation: Database management system (DBMS) is a computer software which is used to collect, analyse or evaluate and retrieve data from a database. It is essential to the flow of businesses or other activities of an organisation.
Examples of database management system softwares MICROSOFT ACCESS,FOXPRO,ORACLE etc all this are effective as it helps to manipulate the data structure,field names,the file formats etc.
Answer:
8 Standard Computer Components and What They Do
Explanation:
Motherboard. The motherboard is an important computer component because it’s what everything else connects to!
Power Supply. True to its name, the power supply powers all other components of the machine.
Central Processing Unit (CPU)
Random-access Memory (RAM)
Hard Disk Drive / Solid State Drive.
Video Card.
Optical Drives.