1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
3 years ago
12

Discuss Hashing and how it is utilized within the IT industry. Also, discuss how Hashing can improve our sorting and searching r

outines and how it can affect the running time or Big-O of our algorithms. g
Computers and Technology
1 answer:
shusha [124]3 years ago
5 0

Answer:

Hashing can be termed as the alteration of a string of characters into a frequently smaller fixed-length value or key that represents the original string.

Explanation:

Hashing are utilized to catalog and recover digital items in a database since it is quicker to find the item using the shorter hashed key than finding the items using the original value.

You might be interested in
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
2 years ago
What does the term "technical skills" refer to and how do they help in the field of computers?
noname [10]
Technical skills is when you are advanced or know lots in Electronics. You are able to diagnose problems and fix them. They help in the computer field so much because they help fix everything if no one had these skills we wouldn’t be able to even use brainly
8 0
3 years ago
The background image does not affect any cell’s format or content. _______
Korvikt [17]
Hmmm...that is true 
Here a quizlet about if you need it!
https://quizlet.com/15207805/csci-241-flash-cards/
3 0
3 years ago
If wire rope guardrails are used, what also must be done?
inn [45]
Some sort of security  pole to hold the 2 ends together firmly <span />
6 0
3 years ago
Read 2 more answers
You have been asked to decouple an application by utilizing SQS. The application dictates that messages on the queue can be deli
LuckyWell [14K]

Answer:

Option B is the correct option.

Explanation:

When using SQS the user request to separate a query. The specification specifies that updates on the list may have been transmitted multiple times, but it must be transmitted throughout the sequence in which they appeared, and therefore should require secure, repetitive queue polling.

So, They configure a First In First Out SQS queue and allow long-polling which is suitable for AWS services.

8 0
3 years ago
Other questions:
  • The ip address 221.1.10.53 /24 is a what type of address?
    6·1 answer
  • The option to add the date and time to a document is located in the
    9·2 answers
  • What is the name of the interface that uses graphics as compared to a command-driven interface?
    11·1 answer
  • The second step when using the problem-solving process is to
    7·1 answer
  • HELP 25 POINTS!!!!!
    6·2 answers
  • Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize th
    13·1 answer
  • Ethical design refers to...
    13·1 answer
  • Write a Python function called readlinesmton that accepts the name of the file (i.e. filename), starting line number (i.e. m) an
    7·1 answer
  • HELP TIMED!!!!!!!!!!!!!!!!!!!!
    5·2 answers
  • ____ is a technology that exists inside another device
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!