Answer:
The correct answer to the following question will be "Cloud computing".
Explanation:
A series of technologies too abstract the specifics of how users are supplied with the software, data, network, and other computing services, called Cloud computing. On-demand, the accessibility of computer resources, database space, and computational complexity, with little or no particular active user administrators.
This term is commonly used to define network infrastructure which is available to several users over the internet.
There are different types of cloud computing. These are as follows:
- Infrastructure-as-a-Service (IaaS).
- Software-as-a-Service (SaaS).
- Platform-as-a-Service (PaaS).
Therefore, Cloud computing is the right answer.
Answer:
The ideal cryptographic hash function has four properties: it is quick to compute the hash value for any given message. it is infeasible to generate a message from its hash value. it is infeasible to modify a message without changing the hash value.
What is the question?????
The answer to 14 is c and the answer to 16 is a