1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masha68 [24]
3 years ago
14

What is our goal for a hashing function?

Computers and Technology
2 answers:
Liono4ka [1.6K]3 years ago
7 0

Answer: Hashing function is the function that is concerned with the future use and thus is indexed in the database. This phenomena is done so that whenever the data that is related with the key can be retrieved and used whenever required .

Therefore , as it is a one-way mechanism ,it makes it easy for the reviving data otherwise it would become difficult to search and extract the data from the huge hash tables.

AnnZ [28]3 years ago
3 0

Answer:

 Hash function is basically use to represent and index the actual value and key. It is one way operation in which the data is associate with the value and key in the function.

The main purpose of hash function is to maintain the integrity of the data. It basically consist two properties that are:

  • It is one way property hash function
  • It has property of collision resistance

The main goal of hashing function is to convert the input of variable length into the field length which is known as hash value by using the cryptographic block.  

You might be interested in
Do AirPods Pro have a green flashing light when charging?
olasank [31]

Answer:

yes

Explanation:

3 0
3 years ago
Read 2 more answers
Write 4 types of viruses , explain them briefly.
wariber [46]

I can help with two.

Web Scripting Virus, A sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.

FILE INFECTOR, targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.

8 0
2 years ago
Which TranscribeMe tag should you use if you are unable to make out a word or phrase due to a difficult accent, poor audio, or a
Lady bird [3.3K]

Answer:

[inaudible]

Explanation:

TranscribeMe is an online transcription company. It employs people all over the world to render transcription services to clients. They have a style guideline which must be strictly adhered to by the transcribers. The guidelines specifically states the "do's " and "dont's" during transcription. Now, when transcribing a word or phrase that cannot be heard or understood due to poor audio or difficult answer, the transcriber uses the tag [inaudible].

5 0
3 years ago
Select the correct answer.
galben [10]

Answer:

the RAM if i am not mistaking

8 0
3 years ago
Jane sold many notebooks at her school fair and earned a good amount of cash. To keep a record, she entered all the cash values
pantera1 [17]
Use tab key & shift+$
6 0
3 years ago
Other questions:
  • The first time you start Outlook on a home computer, the ____ feature guides you to provide information that Outlook needs to se
    11·1 answer
  • Jason works as an accountant in a department store. He needs to keep a daily record of all the invoices issued by the store. Whi
    13·2 answers
  • Why did Simon bring Michael home?​
    9·2 answers
  • John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the dat
    10·1 answer
  • To implement a small database, a database designer must know the "1" and the "M" sides of each relationship and whether the rela
    13·1 answer
  • . An access specifier is one of three keywords:
    14·1 answer
  • Which tab do you select to change how you see your Word document on screen?
    9·2 answers
  • In _____, a program running on a Web server creates a Web page in response to a request for specific information from a Web clie
    7·1 answer
  • write a function named get majority last name that accepts as its parameter a dictionary from strings to strings the keys of the
    11·1 answer
  • a functional policy declares an organization's management direction for security in such specific functional areas as email, rem
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!