1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
3 years ago
11

Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I

nstitute of Standards and Technology as a U.S. Federal Information Processing Standard. What is the block (word) size used by SHA-512 algorithm?
32-bit
64-bit
128-bit
256-bit
Computers and Technology
1 answer:
Naily [24]3 years ago
8 0

Answer:

64 byte.

It's not bit is byte.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the block size used by it is 64 byte or 512 bits.

You might be interested in
Which item is not part of a college application
olga_2 [115]

Answer:

Explanation:

application form and any fees

4 0
3 years ago
What is a computer network?
Contact [7]

Answer:

A computer network is a group of two or more computers that are linked together. Networks are usually used to share resources, exchange files or communicate with other users. so A

Explanation:

7 0
2 years ago
What can Strings store
horsena [70]
A string is generally considered as a data type and is often implemented as an array data structure of bytes (or words) that stores a sequence of elements, typically characters, using some character encoding. String may also denote more general arrays or other sequence (or list) data types and structures.
5 0
4 years ago
Read 2 more answers
Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to ta
disa [49]

Levi can use the bash command to type all the commands on the same line to type one after the other character without requiring input.

<u>Explanation</u>:

  • He wants to run five commands. For one command it will take exactly 20 minutes. So it will take one hour forty minutes.
  • To type all of the commands on the same line Levi should use the bash command. For inserting the bash command Levi should use backslash \ as the last character of the line.
6 0
3 years ago
Which of the following statements accurately describes the early history of digital recording?
Alchen [17]
I would like to say that it was D. If I am not correct, try asking this in history.
6 0
3 years ago
Other questions:
  • Ann is in the middle of completing her first 1040EZ tax form. She has some questions about an instruction on the form. What shou
    8·2 answers
  • Translate each of these statements into logical expressions using predicates, quantifiers, and logical connectives. a) Something
    7·1 answer
  • Direct connections provide continuous access to the Internet. Many bandwidth options are associated with direct connections. Whi
    9·1 answer
  • Impanation stage contain ​
    10·1 answer
  • Which type of computing device is best suited to having a digital pen as an input device?
    9·1 answer
  • 5. Which of the following views is used to run a PowerPoint presentation?
    11·2 answers
  • Each row in a database is a set of unique information called a(n)
    8·2 answers
  • Chantelle wants to change the color scheme for her company's web app, and she needs to get the logos updated. What kind of devel
    8·1 answer
  • Question 1 (1 point)
    9·2 answers
  • Write a recursive decent algorithm for a java while statement, a Javas if statement , an logical/mathematical expression based o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!