1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masha68 [24]
3 years ago
14

What is our goal for a hashing function?

Computers and Technology
2 answers:
Liono4ka [1.6K]3 years ago
7 0

Answer: Hashing function is the function that is concerned with the future use and thus is indexed in the database. This phenomena is done so that whenever the data that is related with the key can be retrieved and used whenever required .

Therefore , as it is a one-way mechanism ,it makes it easy for the reviving data otherwise it would become difficult to search and extract the data from the huge hash tables.

AnnZ [28]3 years ago
3 0

Answer:

 Hash function is basically use to represent and index the actual value and key. It is one way operation in which the data is associate with the value and key in the function.

The main purpose of hash function is to maintain the integrity of the data. It basically consist two properties that are:

  • It is one way property hash function
  • It has property of collision resistance

The main goal of hashing function is to convert the input of variable length into the field length which is known as hash value by using the cryptographic block.  

You might be interested in
A laptop computer is smaller than desktop computer. True or false
alina1380 [7]

Answer:

true

Explanation:

4 0
3 years ago
Read 2 more answers
The number 68 is increased to 73. What is the percentage by which the number was increased, to the nearest tenth of a percent?
Ipatiy [6.2K]
Correct answer should be 1.1%
7 0
2 years ago
Read 2 more answers
Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense's front end
sweet [91]

Answer:

RainbowTables

Explanation:

RainbowTables is the best option when the cracker has limited time.

6 0
3 years ago
A(n) ____ is a secure, private path across a public network that is set up to allow authorized users private, secure access to t
yKpoI14uk [10]
It's VPN(Virtual Private Network). It allows company to have private network at the same time secure. While others are not that secure.
4 0
3 years ago
When you add text to a slide using presentation software, which of the following is important?
katrin [286]
I think the answer is B. The text should be brief. 
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which markup language would be considered the most current for web design? HTLM, HTML5, XHTLM, XHTML 6
    14·2 answers
  • 8 POINTS!!!!!!!!
    6·2 answers
  • An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task schedu
    10·1 answer
  • Which kind of file would be hurt most by lossy compression algorithm
    8·2 answers
  • Analyze the following code. Number[] numberArray = new Integer[2]; numberArray[0] = new Double(1.5); Question 9 options: A) Sinc
    13·1 answer
  • Write a cash register program that calculates change for a restaurant of your choice. Your program should include: Ask the user
    11·1 answer
  • I love science its my favorite subject
    13·2 answers
  • computer hardware without software is useless while computer software without hardware is meaningless. explain what do you under
    13·1 answer
  • Which of the following describes a recording scout's job in the music industry?
    5·2 answers
  • What is command is used to improve the vocabulary and in which tab is it found​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!