1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serga [27]
4 years ago
14

Which type of function distill the information contained within a file (small or large) into a single fixed-length number, typic

ally between 128 and 256 bits in length?
a. message-digest

b. private-key

c. random permutation

d. public-key?
Computers and Technology
1 answer:
Luda [366]4 years ago
7 0
As far as I remember, message-digest functions distill the information contained within a file (small or large) into a single fixed-length<span>number, typically between 128 and 256 bits in length. This function is designed to protect the integrity of a piece of data to define changes to any part of a message.</span>
You might be interested in
When a subdomain has been delegated to a zone on another server, the DNS server hosting the parent zone maintains only an NS rec
Vedmedyk [2.9K]

Answer:

True of False?

True

Explanation:

Different sub domains can be directed to different IPs servers but a client server cannot be forced to keep looking at name servers for additional records.

To delegate a subdomain to a zone on another server, one would need to add NS-records for the sub-domain name. This would point to the host names of the DNS servers hosting the sub-domain - in the parent zone.

In the "DNS records" window right-click the parent zone in the left list and select "New NS-record":

8 0
4 years ago
True or false This html element puts the text in the centre of the webpage. "Something really cool "
Romashka [77]

Answer:

true.

Explanation:

i hope it help u

mark me as brainliest

6 0
3 years ago
What is focus of developers interested in the internet of things?
Delicious77 [7]
Investigates the current state of the Internet of things
Explore the opportunities arising for developers
Analyze the quantity and quality of support for developers in this space
Uncover best practices of which developers should have an immediate working knowledge
8 0
3 years ago
Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens
Angelina_Jolie [31]

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

  • Always check the spelling of the URLs in email links before you click or enter sensitive information
  • Watch out for URL redirects, where you're subtly sent to a different website with identical design
  • If you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply.
  • Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media
5 0
3 years ago
) Using newline command : endl
Pavlova-9 [17]

Answer:

The output of the code is following:-

My first C++ program.

The sum of 2 and 3 = 5

7 + 8 = 15

Explanation:

First the program should have #include<iostream>.This is missing in the program.

In the program you have printed My first C++ program first then used newline character endl. After that you have printed The sum of 2 and 3 = 5 this will be printed in the new line.Then you have used endl.Then printed  "7 + 8 = " string and the sum 7+8 that is 15.

Hence the output is like this.

6 0
3 years ago
Other questions:
  • Security testing attempts to verify that protection mechanisms built into a system protect it from improper penetration.
    9·1 answer
  • Question 1
    9·1 answer
  • Examples of environmental technology and good and bad impacts
    13·1 answer
  • The logical view Select one: a. shows how data are organized and structured on the storage media. b. presents an entry screen to
    7·1 answer
  • Write a Java method onlyDigits that takes a string as a parameter. The method should remove from the string all characters, whic
    15·1 answer
  • What is the formula that calculates the session fee for members in excel
    13·1 answer
  • Lara sees her colleague taking a bribe from a customer. What should she do?
    14·2 answers
  • Which is an operational process performed by AWS for data security? a.Background virus scans of EBS volumes and EBS snapshots
    8·1 answer
  • Are all tps dashboards
    15·1 answer
  • What happens when a user clicks Accept on a meeting request?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!