1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir [108]
3 years ago
6

A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code

with a private key.
Computers and Technology
1 answer:
Maslowich3 years ago
3 0
A Cryptographich hash is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
You might be interested in
Rae is building a website for the local chamber of commerce. this week, rae is designing and completing a page that contains a l
ValentinkaMS [17]
The first step is to Select the text.  Rae is building a website for the local chamber of commerce. this week, rae is designing and completing a page that contains a list, headings, body text, images, and a background. during this process, rae develops a style sheet , inserts appropriate images on the page, enhances the images for maximum effect, checks for non-web-safe colors, and removes any that she finds. to create an unordered list, the first step is to   Select the text.
5 0
3 years ago
Which of the following would be considered the highest risk portfolio?
sashaice [31]

The best option is (C) A portfolio made up of 60% stocks, 30% mutual funds, and 10% Treasury bonds.

There are a lot of risks involved when investing in almost anything. You may end up paying a lot for something that may not be worthwhile and at the end of it all end up losing a lot more than you get. In this case, more than half of the money has been invested in stocks and the prices of stocks change daily. Investing in stocks may give a good return but remains high risk to involve yourself in and should be avoided as much as possible.






4 0
3 years ago
Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can
Mamont248 [21]

Answer:

The right answer will be "Sniffing through a hub".

Explanation:

  • Packet sniffer seems to be a device that listens for transmitted data on what seems like a channel. Sniffing enables the detection of data by individual people as it has been transferred throughout a cable.
  • Appropriate nodes are using this methodology to make a diagnosis of connection issues, or even just harmful programs to obtain confidential information, like authentication and encryption.
6 0
3 years ago
Write a program that calculates and displays the amount ofmoney available in a bank account that initially has $8000 deposited i
Leviafan [203]

Answer:

Written in Python

import math

principal = 8000

rate = 0.025

for i in range(1, 11):

    amount = principal + principal * rate

    principal = amount

    print("Year "+str(i)+": "+str(round(amount,2)))

Explanation:

This line imports math library

import math

This line initializes principal amount to 8000

principal = 8000

This line initializes rate to 0.025

rate = 0.025

The following is an iteration from year 1 to 10

for i in range(1, 11):

    This calculates the amount at the end of the year

    amount = principal + principal * rate

    This calculates the amount at the beginning of the next year

    principal = amount

    This prints the calculated amount

    print("Year "+str(i)+": "+str(round(amount,2)))

6 0
4 years ago
Quiz 2: a _____ is any computer that provides services and connections to other computers on a network.
SIZIF [17.4K]
The answer could be "server"
4 0
3 years ago
Other questions:
  • whats something that u want to do but ur parents wont allow it like having a phone or going to a college ​
    11·2 answers
  • Please I need all the help I can get Thank You So Much
    14·1 answer
  • How to write a program that prompts the user to input two POSITIVE numbers — a dividend (numerator) and a divisor (denominator).
    13·1 answer
  • 1.) You are a digital forensic examiner and have been asked to examine a hard drive for potential evidence. Give examples of how
    13·1 answer
  • Consider the following 32 bit binary representation of the value using IEEE 754 single precision floating point representation.
    15·1 answer
  • Which is the most used operating system? A. Windows B.Linux C.Leopard D. DOS
    14·2 answers
  • If i wanted to change my phones simcard, does anything need transferring, or is it an easy swap?
    13·1 answer
  • How do I delete my brainly account?<br> I don't need anymore.
    13·2 answers
  • A soft news story and a feature story are the same thing.<br> O True<br> O False<br> HELLPP ASSAAAP
    12·2 answers
  • A program that converts a program to binary all at once and runs the entire program when finished with the conversion
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!