1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
3 years ago
8

A _____ is a number that summarizes an encrypted information. digital certificate hash function message digest hash algorithm

Computers and Technology
1 answer:
arlik [135]3 years ago
3 0
The answer is Message Digest.  <span>A Messae Digest is a number that summarizes an encrypted information. </span>They<span> are designed to protect the integrity of a piece of data or media to detect changes to any part of a </span>message<span>.</span>
You might be interested in
Which of the following is not a factor that affects productivity?
hjlf

<em>The answer is wireless cellular phones. </em>

<em> </em>

<em>Companies use of wireless cellular phones may vary and majority are considered it as optional. Instead of talking via wireless cellular phones, emails and telephone lines conversation are much advisable for cost-effective and formal type of communication process.</em>

5 0
4 years ago
1. The purposes of traffic signs are
Wittaler [7]

Answer:

<em>D. to regulate, to warn, to guide.</em>

3 0
3 years ago
HOW IS THE AUTOFILL FEATURE HELPFUL? A.IT CREATE A NEW FORMULA FOR EVERY CELL IN THE DOCUMENT B.IT CAN SAVE TIME BY ALLOWING YOU
bulgar [2K]
B. it can save time by allowing you to quickly fill cells
4 0
4 years ago
In the value chain concept, upgrading IT is considered what kind of activity?
ANTONII [103]

Answer:

Upgrading IT is considered as B. Support activity

Explanation:

It is considered as support activities because they help the primary activities move smoothly and consistently.

For example, efficient communication between a particular firm and its subsidiaries will be extremely difficult without the necessary IT infrastructure, which will slow down the primary activities that are to be carried out.

6 0
3 years ago
What's the best option if you cant show your power point presentation at all?
Harrizon [31]
My dog ate my power point?
6 0
3 years ago
Read 2 more answers
Other questions:
  • You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believ
    11·1 answer
  • Instructions
    13·1 answer
  • Question 11
    11·1 answer
  • 13 POINTS! Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to
    6·2 answers
  • Which THREE devices can perform both input and output operations?
    8·2 answers
  • Someone wanna be in a meeting with me <br><br><br> Code: rrx-ofrw-ocj
    5·2 answers
  • The mainframe computer are the ____ and most ____ computers..​
    11·1 answer
  • Ayuda pliz es para ya!!!!!<br> nesesito un codigo html que me muestre este texto
    8·1 answer
  • The standard computer keyboard is implemented using_______ A:BCD code B:Gray code C:ASCII code D:reflected code
    5·2 answers
  • What kind of error is there in this line of code: pritn(“Hello, world!”)?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!