1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
3 years ago
11

Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I

nstitute of Standards and Technology as a U.S. Federal Information Processing Standard. What is the block (word) size used by SHA-512 algorithm?
32-bit
64-bit
128-bit
256-bit
Computers and Technology
1 answer:
Naily [24]3 years ago
8 0

Answer:

64 byte.

It's not bit is byte.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the block size used by it is 64 byte or 512 bits.

You might be interested in
You have to communicate a signal in a language that has 3 symbols A, B and C. The probability of observing A is 50% while that o
Vlada [557]

Answer:

Huffman code is use for encoding the language. The entropy when calculated is 1.5.

Explanation:

Using Huffman Coding scheme to encode:

The huffman coding scheme is described in the attachment.

To find entropy; we use the formula given below:

H = ∑p log_{2}  \frac{1}{p}

where H = Entropy and p = probability

p(A) = 50% = 1/2

p(B) = 25% = 1/4

p(C) = 25% = 1/4

H = \frac{1}{2} log_{2} 2 + \frac{1}{4}  log_{2} 4+ \frac{1}{4} log_{2}4\\H = \frac{1}{2}(1) + \frac{1}{4}(2) + \frac{1}{4}(2)\\H = \frac{1}{2} + \frac{2}{4} + \frac{2}{4}\\H = \frac{1}{2} + \frac{1}{2} + \frac{1}{2}\\H = \frac{3}{2}\\H = 1.5

Download pdf
7 0
3 years ago
Many programmers think object-oriented programming is a superior approach to procedural programming. Others think it adds a leve
fgiga [73]

I agree with the programmers who think object-oriented programming is a superior approach to procedural programming.

<h3>Why is OOP better than procedural programming?</h3>

In terms of Security, Object-oriented programming is said to have more of a secure based than procedural programming, due to the level of abstraction or that is due to data hiding property.

Note that  It hinders the access of data to any member functions of the same class and one cannot see a thing like that such as data hiding in the procedural programming framework.

Learn more about object-oriented programming  from

brainly.com/question/12342989

#SPJ1

4 0
2 years ago
When there are items that are out of the control of the programmer that may support or oppose the program goals, this is termed
netineya [11]

Answer:

Option D (External influences) is the correct choice.

Explanation:

  • External factors including certain regulatory changes, the economy, globalization as well as new technologies may determine the effectiveness of such smaller businesses.
  • They are the be the variables that may be out of a corporation's influence. While a company has no power regarding external factors, these factors may have a direct effect on the company.

Other given choices are not related to the given circumstances. So that option D would be the right one.

3 0
4 years ago
What is the ls option to list entries by lines instead of by columns?​
gogolik [260]

Sometimes I just meet some Unintelligen ppl

7 0
3 years ago
Use the drop-down menus to complete the statements about using column breaks in word 2016
Naily [24]

Answer: Breaks in the word 2016 what do you mean

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Consider the following classes:
    8·1 answer
  • Behaving in an acceptable manner within a workplace environment is referred to as having
    9·1 answer
  • What is the purpose of a filename extension? How can you restore a file that you deleted from the hard disk?
    10·1 answer
  • A circuit rated at 6600 watts and 240 volts will draw what ampers.
    6·1 answer
  • The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sumof the previous two, for example: 0, 1
    11·1 answer
  • Do u have to divide or multiply this problem 5300 yd = mi
    9·1 answer
  • What is generation of computer ?​
    7·2 answers
  • I need a Python program that will read a data file, perform an analysis, and write the results to a separate file with a .txt ex
    15·2 answers
  • ..............................................................................
    8·1 answer
  • What do we call the software which programmers use to program?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!