1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miskamm [114]
3 years ago
9

"Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of w

hich are then combined at the end of the process?
a. SHA-384b. HMACc. RIPEMDd. MD5"
Computers and Technology
1 answer:
Galina-37 [17]3 years ago
5 0

Answer:

Option C i.e., RIPEMD is the correct option for the following question.

Explanation:

Because RIPEMD is the algorithm that is used for the hash primary design characteristic which has two independent and unlike parallel chains of the calculation and computation and the outputs of which are then linked to the process at the end. It is also used for the safe process of replacing the 128-bit hash method.

Other options are wrong because these are not related to the following statement.

You might be interested in
Which of the following best explains what the profit motive pushes producers to do
Morgarella [4.7K]
B. minimize cost while maximizing profits
6 0
3 years ago
What have been three technological changes to photography in the past 200 years?
kolbaska11 [484]
I hope this helps but cars, phones and computers.
3 0
3 years ago
Which tasks can a user accomplish by using the Find and Replace feature of Word? Check all that apply.
sveticcg [70]

Answer:

B,C,E your welcome

Explanation: i just took the test

3 0
3 years ago
Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr
Viktor [21]

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

4 0
4 years ago
In the tcp/ip protocol that allows communication across the internet, what does tcp do?
DedPeter [7]

TCP tells or state how applications can make channels of communication across a network.

<h3>What is the role of TCP?</h3>

TCP is known to often help in the management of how a message is put together into smaller packets before they are sent or transmitted over the internet and then put together again in the right way at the arriving or destination address.

Therefore, TCP tells or state how applications can make channels of communication across a network.

Learn more about TCP from

brainly.com/question/17387945

#SPJ11

7 0
2 years ago
Other questions:
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • Ray has to type an invoice using the QWERTY keyboard. Along with letters and numbers, he also has to insert the dollar sign. Whi
    13·1 answer
  • A student who sets a date to finish a goal is using which SMART goal? relevant, specific, attainable or timely
    10·1 answer
  • During the charging of a storage battery, what is the temperature that the electrolyte solution must never exceed?
    6·1 answer
  • For which punctuation symbol will you use the ring finger of your right hand?
    9·1 answer
  • What part of a check is the LEAST important?
    14·2 answers
  • What do you do when your computer shuts down
    15·2 answers
  • Community gardens are public gardens where local residents can grow plants in a plot. They are very popular, so there are often
    7·1 answer
  • For all programs, you should write a small amount of code and _______
    6·1 answer
  • Assume that Publication is the root class of an inheritance tree. You want to form a linked list of different publications in th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!