1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
3 years ago
8

The birthday attacks are called so because we can only have 365 birthdays (oh well, excluding 2/29). So, if there are 366 people

in a place at least two of them have the same birthday - thus causing collision(s). Same things happens in hash algorithm. The people in birthday attack is the same thing as:___________. 1. hash in the hash algorithm. 2. input in the hash algorithm. 3. the algorithm in hash algorithm. 4. the key
Computers and Technology
1 answer:
vazorg [7]3 years ago
5 0
<h2>Answer:</h2>

2. input in the hash algorithm

<h2>Explanation:</h2>

In a hash algorithm, a function called <em>hash function (say H) </em>is chosen to transform a variable sized input n, and return a fixed size string called the <em>hash value (say h). </em>i.e

H(n) => h

Comparing this to the birthday attacks;

i. the hash function is getting the people's birthdays - H,

ii. the input is each person in the group of people - n,

iii. the hash is the value of the birthday of each person - H(n).

You might be interested in
Outcomes resulting from using incorect requirement specification during system development​
Vlada [557]

Answer:

please give full understandable question buddy

5 0
3 years ago
Write a program that allows the user to continuously input the value n until a negative number is entered
Paul [167]

Answer:

Written in C++

Explanation:

#include <iostream>

using namespace std;

int main()

{

int n;

while(true)

{

cin>>n;

if(n>=0)

continue;

break;

}

return 0;

}

3 0
2 years ago
What is the missing part to have the output as 3 2 1 while count &gt;0 : print(count) count -= 1
Natali [406]

Answer:

Explanation:

16

6 0
2 years ago
________ is a record in a relational database.
leonid [27]

The answer that is a record in a relational database is called; A row

<h3>What is a record in relational database?</h3>

In relational databases, a record is defined as a group of related data held within the same structure. Furthermore, we can say that a record is a grouping of fields within a table that reference one particular object.

Now, in relational database, a row is called a record because each row, contains a unique instance of data or key for the categories defined by the columns.

Read more about Relational Database at; brainly.com/question/13262352

#SPJ12

4 0
1 year ago
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
kumpel [21]

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

8 0
3 years ago
Other questions:
  • What is the force generated by a rocket motor to propel a spacecraft forward?
    14·1 answer
  • _______ refers to the poitically, religiously, or ideologically motivated use of computers (or related technology) by an individ
    15·1 answer
  • Refer to the exhibit. the gigabit interfaces on both routers have been configured with subinterface numbers that match the vlan
    11·1 answer
  • In one to two sentences, explain why citizens pay taxes
    8·1 answer
  • The___provides access to the internet; may also be internal
    11·1 answer
  • What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
    11·1 answer
  • In c++ 11, the ________ tells the compiler to determine the variable's data type from the initialization value.
    6·1 answer
  • In black and white,<br><br> we must be more conscious of image
    11·1 answer
  • What is the web page path on the web server for the URL:
    12·1 answer
  • What is the primary purpose of source code editor features such as keyword hi lighting and auto-completion A.to speed up the cod
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!