1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis23 [38]
3 years ago
13

Look up and list the number of a local taxi or car service in your community. Include the company name and telephone number.

Computers and Technology
1 answer:
gizmo_the_mogwai [7]3 years ago
4 0
Springfield Lincoln Yellow Cab
217-544-1111
You might be interested in
How was the addition of an improvement over early web design?
Vinil7 [7]

Answer:

Early web designs were text oriented.

Explanation:

So the beginning is text and now as the technology has drastically grown the web design also incorporated multimedia like text, audio, video, graphics and animation.

As the improvement started the number visitors, creativity in the content creation, competitiveness and all the other aspect made website creation and design a mandatory factor for any business to grow. How the web design is, it decides the number of visitors and the way the user interacts.

3 0
3 years ago
What are the two features of EDIAC ?​
Sergio [31]

Answer:

By the numbers: “The ENIAC contained 17,468 vacuum tubes, along with 70,000 resistors, 10,000 capacitors, 1,500 relays, 6,000 manual switches and 5 million soldered joints. It covered 1,800 square feet (167 square meters) of floor space, weighed 30 tons, consumed 160 kilowatts of electrical power.” More info

3 0
2 years ago
Write a one-line program to output the following haiku.
Serggg [28]

10 CLEAR: PRINT "A lightning flash: between the forest trees I have seen water.": END

8 0
3 years ago
Read 2 more answers
One of the earlier applications of cryptographic hash functions was the storage
RoseWind [281]

Answer & Explanation:

1.

_Attack A: One way property of hash means that we can't find the input string if given the hash value. The calculation of hash from input string is possible but it is not possible to calculate the input string when given the hash. If the hash function is properly created to have one-way property then there is no way of finding the exact input string. So this attack won't work as the one-way property of hash function can't be broken if hash function is properly created.

_Attack B: Suppose h() is the hash function. And h(x) = m where x is the string and m is the hash. Then trying to find another string y such that h(y) = m is called finding out the second pre-image of the hash.

Although we can't know the exact initial string for sure, we can by using brute force method find out a second pre-image.

This attack will take a very long time. It has the time complexity of 2^{n} . It requires the attacker to have an idea about the kind of passwords that might be used and then brute force all of them to find string that has the same hash. Each try will have a chance of 1/2^{n}  to succeed.

Rainbow attack using rainbow table is often used for such brute force attack. This comprises a rainbow table which contains passwords and their pre-hashed values.

Therefore, it is not possible to determine the second preimages of h so easily.

_Attack C: Collisions refer to finding out m and m' without knowing any of them. Finding out collisions is easier than finding preimages. This is because after finding out 2^{n}  pairs of input/output. The probability of two of them having the same output or hash becomes very high. The disadvantage is that we can't decide which user's hash to break. However if I do not care about a particular user but want to get as many passwords as possible, then this method is the most feasible.

It has time complexity of 2^{n} /2.

Hence, this is the attack which has most success rate in this scenario.

2.

The brute force way of finding out the password usually involves using a rainbow attack. It comprises a rainbow table with millions of passwords and their hashes already computed. By matching that table against the database, the password can be recovered.

Therefore it is often preferred to salt the password. It means we add some random text to the password before calculating the hash.

The salts are usually long strings. Although users usually do not select long passwords, so a rainbow table with hashes of smaller passwords is feasible. But once salt is used, the rainbow table must accommodate for the salt also. This makes it difficult computationally. Although password might be found in the rainbow table. The salt can be anything and thus, make brute force a LOT more difficult computationally.

Therefore salt is preferred to be added to passwords before computing their hash value.

3.

A hash output length of 80 means there can be exactly 2^{80}  different hash values. This means there is at least one collision if 2^{80}+1 random strings are hashed because 2^{80}  values are used to accommodate all the possible strings. It is not hard with today's computation power do match against more than this many strings. And doing so, increases the probability of exposing a probable password of an user.

Hence, 80 is not a very secure value for the hash length.

6 0
3 years ago
Explain whether you think that algorithms should be protected under copyright law, and therefore whether it is possible to ‘stea
valentinak56 [21]

Answer:

no no and no you cant steal them

Explanation:

6 0
3 years ago
Other questions:
  • In three to five sentences, describe how good e-mail work habits increase workplace efficiency and productivity.
    12·1 answer
  • Why is brainly not working it say im logged out rn but im not i cant acces anything but this
    12·2 answers
  • Instructions:Select the correct answer.
    9·1 answer
  • A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriv
    11·1 answer
  • Cómo se llaman los robots que se utilizan para la exploración espacial, en medicina, en la industria, en la agricultura, los que
    13·1 answer
  • Which kind of image is indispensable and needs added text to go with ?
    12·1 answer
  • Change 'What do they do' into passive voice​
    9·2 answers
  • wooooooooo helll yeaaa made it to ACE baby now road to whatever next, lil present imma be doing You tube soon soo ideas will be
    7·2 answers
  • Why is color important for all objects drawn ?​
    5·1 answer
  • which server edition doesn't support any server roles that you would typically use with standard version
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!