1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
damaskus [11]
3 years ago
15

You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the

sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select
Computers and Technology
1 answer:
Katyanochek1 [597]3 years ago
7 0

Answer:

SHA-1 is used in this case.

Explanation:

You might be interested in
A newly opened law firm in Kirkland decides to create a small website that provides a brief introduction of the firm, its missio
Ivan

Answer:

Flat web architecture

Explanation: A flat web architecture is a type of web Structure where to link chain exists, in this type of web architecture,users can access the web site with few number of clicks such as in one, two or three clicks with a maximum of four clicks.

One of the basic importance when dealing with web pages is the number of clicks before the page requested can be reached. The lower the number of clicks the better.

5 0
3 years ago
The term ____ means that a public information network such as an Internet service provider (ISP) should treat all users, all pla
Softa [21]

Answer:

Domain Name System

Explanation:

The Domain Name System is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities

5 0
3 years ago
A teacher wants to create a list of students in her class. Using the existing Student class in this exercise. Create a static Ar
aleksandr82 [10.1K]

Answer:

Check the explanation

Explanation:

CODE:-

import java.util.ArrayList;

class Student

{

  private String name;

  private int grade;

  private static ArrayList<Student> classList = new ArrayList<Student>();

 

  public Student(String name, int grade)

  {

      this.name = name;

      this.grade = grade;

      classList.add(this);

  }

 

  public String getName()

  {

      return this.name;

  }

 

  /*Don't change the code in this method!

  This method will print out all the Student names in the classList Array

  */

  public static String printClassList()

  {

      String names = "";

      for(Student name: classList)

      {

          names+= name.getName() + "\n";

      }

      return "Student Class List:\n" + names;

  }

}

public class ClassListTester

{

  public static void main(String[] args)

  {

      //You don't need to change anything here, but feel free to add more Students!

      Student alan = new Student("Alan", 11);

      Student kevin = new Student("Kevin", 10);

      Student annie = new Student("Annie", 12);

      Student smith = new Student("Smith", 11);

      Student kane = new Student("Kane", 10);

      Student virat = new Student("Virat", 12);

      Student abd = new Student("ABD", 12);

      Student root = new Student("Root", 12);

      System.out.println(Student.printClassList());

  }

}

Kindly check the attached image below.

4 0
3 years ago
Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
postnew [5]

Answer:

Volatile memory analysis

Explanation:

volatile data analysis in a computer's memory dump memory forensics is used by information security specialists to examine and identify assaults or harmful actions that leave no clearly identifiable trails on hard disk data which os what Carl decides to preserve as much data as possible by capturing data in memory

6 0
2 years ago
Choose the appropriate software category for each specific application shown.
Tom [10]
Python is the correct answer
7 0
2 years ago
Other questions:
  • It is either snoming or below freezing
    10·1 answer
  • What does rwd stand for?
    8·2 answers
  • Which of the following cannot be performed from the windows task manager?
    15·2 answers
  • Janis is preparing a financial document. She needs to use the dollar symbol placed above the number key 4. Which key will Janis
    12·2 answers
  • Are headphones considered a computer? Why or why not?
    13·2 answers
  • What is the difference between simple and complex waveforms?
    10·1 answer
  • List and describe the tools for all the main stages of app/application development.
    11·1 answer
  • Information flows:
    11·1 answer
  • Why should the drives be segregated in a computer?​
    15·1 answer
  • Social media first became popular due to which development?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!