1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
3 years ago
8

The birthday attacks are called so because we can only have 365 birthdays (oh well, excluding 2/29). So, if there are 366 people

in a place at least two of them have the same birthday - thus causing collision(s). Same things happens in hash algorithm. The people in birthday attack is the same thing as:___________. 1. hash in the hash algorithm. 2. input in the hash algorithm. 3. the algorithm in hash algorithm. 4. the key
Computers and Technology
1 answer:
vazorg [7]3 years ago
5 0
<h2>Answer:</h2>

2. input in the hash algorithm

<h2>Explanation:</h2>

In a hash algorithm, a function called <em>hash function (say H) </em>is chosen to transform a variable sized input n, and return a fixed size string called the <em>hash value (say h). </em>i.e

H(n) => h

Comparing this to the birthday attacks;

i. the hash function is getting the people's birthdays - H,

ii. the input is each person in the group of people - n,

iii. the hash is the value of the birthday of each person - H(n).

You might be interested in
A(n) _____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.
weqwewe [10]

Answer:

A- Application Service Provider

Explanation:

An application service provider (ASP) is someone that render computer service to his/ her customers or clients over a network by delivering software applications.

It also give access to an application, by charging a usage or subscription fee over the internet.

6 0
3 years ago
Which is the best description of the laws governing IT professionals?
Vinvika [58]

Answer: D, Most laws are directed at the information, data, or intellectual property rather than the IT professional.

Explanation:i just took the test

4 0
3 years ago
Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
lbvjy [14]

Answer:

Algorithm:

1. Declare an integer variable N.

2. Read the value N from user.

3.While(N):

 3.1 find r=N%10;

 3.2 print r in new line.

 3.3 Update N as N=N/10.

4.end program.

Implementation in C++.

// header

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

int N;

cout<<"Enter an Integer:";

   cin>>N;

// find the digits of number

   while(N)

   {

       // last digit

       int r=N%10;

       // print last digit

       cout<<r<<endl;

       // update the number

       N=N/10;

}

return 0;

}

Output:

Enter an Integer:329                                        

9                                                          

2                                                          

3

7 0
3 years ago
When computer network are joined together they form a bigger network called the​
Airida [17]

Answer:

A WAN can be one large network or can consist of two or more lans connected together. The Internet is the world's largest wan.

Explanation:

8 0
3 years ago
Turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is n
Serjik [45]
It needs an Operating System like a cable or something that will help it operate look for more and double check
3 0
3 years ago
Other questions:
  • Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
    10·1 answer
  • Write a program that prompts the user to enter the weight of a person in kilograms and outputs the equivalent weight in pounds.
    8·1 answer
  • I have an LG phone. Since I just bought my phone, my bill to text message isn't paid yet. I texted a couple of things playfully
    5·2 answers
  • Which of the following provides services to hosts on its network?
    9·1 answer
  • What is the decrypted binary
    9·1 answer
  • May someone type this down below just like how it is shown in the picture.
    7·1 answer
  • Write code which takes inputs and creates two Rectangle objects (using the edhesive.shapes.Rectangle class) and compares them us
    7·1 answer
  • Please describe the role of games in modern society!
    5·2 answers
  • Write a python program that will read a number (num) and display all the numbers divisible by 3 or 5
    15·1 answer
  • Which workbook view is used most often in Excel?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!